3n-icx-xxv710

25ge2p1xxv710-avf-ethip4ipsec10000tnlsw-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t2c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-8t4c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t1c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t2c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-8t4c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec10000tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t2c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-8t4c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t1c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t2c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-8t4c-avf-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec1000tnlsw-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t2c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-8t4c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t1c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t2c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-8t4c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec1000tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t2c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-8t4c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t1c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t2c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-8t4c-avf-ethip4ipsec1000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t2c-avf-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’RhKjYAEcQdmcjXER’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LouhpsNTUkKkQrJhRAGQnqdQLVHSpmYMtgkrkjzpGKlimWLUZCAMKwWlyaTWZkEz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’RhKjYAEcQdmcjXER’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LouhpsNTUkKkQrJhRAGQnqdQLVHSpmYMtgkrkjzpGKlimWLUZCAMKwWlyaTWZkEz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t3c-avf-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UekaqKgMVGUFchps’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uktcgMmmFfEiMxgojaLzCeDmZZAWeDBbxODLjvCXbPuINnYJQNWXPTuFwFZKzVYd’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’UekaqKgMVGUFchps’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uktcgMmmFfEiMxgojaLzCeDmZZAWeDBbxODLjvCXbPuINnYJQNWXPTuFwFZKzVYd’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t4c-avf-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jCHXtkrOkQVKvYNu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SyQsoExYhiOJSAsRDvpsdmzkjrZPgVVHQGqWLiyyFudChskGJRjmUmXLcuclzVNU’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’jCHXtkrOkQVKvYNu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SyQsoExYhiOJSAsRDvpsdmzkjrZPgVVHQGqWLiyyFudChskGJRjmUmXLcuclzVNU’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-avf-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ohNLmlgEBFautznZ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ttXhvPdnKFvGEHyMaLJVcqjWeTLsuGoreLEJiujrYVthbCaDLqghLNpcprellvsM’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ohNLmlgEBFautznZ’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ttXhvPdnKFvGEHyMaLJVcqjWeTLsuGoreLEJiujrYVthbCaDLqghLNpcprellvsM’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t3c-avf-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KlZFLWAjeHHjsWaB’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mbKiqhHFYAMMyVVgvFZPSgDojNIRDQkGfUrOngabAfZrgLODIIJdFgLmDUVGkhGC’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KlZFLWAjeHHjsWaB’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mbKiqhHFYAMMyVVgvFZPSgDojNIRDQkGfUrOngabAfZrgLODIIJdFgLmDUVGkhGC’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t4c-avf-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’RlBsnrqBilKtHrvq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ssSumxvJtCBTebYHerJZYygRmDSnjwLjcsEjptYYwOlVGxOcOdzJMwdOjvlNnNEZ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’RlBsnrqBilKtHrvq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ssSumxvJtCBTebYHerJZYygRmDSnjwLjcsEjptYYwOlVGxOcOdzJMwdOjvlNnNEZ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t2c-avf-ethip4ipsec1tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fjwXmNaVxQXMSuCdmaKUOiwHJZiKgRlf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fjwXmNaVxQXMSuCdmaKUOiwHJZiKgRlf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t3c-avf-ethip4ipsec1tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OFHlovZoGnjLEEcyTKiRuWbnjDtBBPNC’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OFHlovZoGnjLEEcyTKiRuWbnjDtBBPNC’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t4c-avf-ethip4ipsec1tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’kllDUHJxabFRilIXNPQDUXAHIkyWpoVV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’kllDUHJxabFRilIXNPQDUXAHIkyWpoVV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-avf-ethip4ipsec1tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’dsDAZnxulYGJuSUAUGHjsmkUSwlqNCFn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’dsDAZnxulYGJuSUAUGHjsmkUSwlqNCFn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t3c-avf-ethip4ipsec1tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KRIYWeSocDAKOgjKVvGQDgnxzTfmSsMO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KRIYWeSocDAKOgjKVvGQDgnxzTfmSsMO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t4c-avf-ethip4ipsec1tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vTKsqvhJtxoLUdpGBzsQpOGxkKmSsAWu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vTKsqvhJtxoLUdpGBzsQpOGxkKmSsAWu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec40tnlsw-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 6e42526b454f75437247694743546d47 integ-alg sha-512-256 integ-key 4d6d435746625461586a6848784579414e5877527258484b754766566a5844566b517076774c48584d596f55656d544243436358714544705259566b744e556c esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 6e42526b454f75437247694743546d47 integ-alg sha-512-256 integ-key 4d6d435746625461586a6848784579414e5877527258484b754766566a5844566b517076774c48584d596f55656d544243436358714544705259566b744e556c esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 59666c4a6d6756434567597058457044 integ-alg sha-512-256 integ-key 45447754525670614e53475a7a444b5372454b614f715372616974577373774265756557466449794f4e55577759645a4b4c6f58685777504e694655676b736c esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 59666c4a6d6756434567597058457044 integ-alg sha-512-256 integ-key 45447754525670614e53475a7a444b5372454b614f715372616974577373774265756557466449794f4e55577759645a4b4c6f58685777504e694655676b736c esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 624e494577724f6b494272434f67654c integ-alg sha-512-256 integ-key 59765354645571414b784d4e6261765367507349666c774676616a6c63676f487655716e4c4e675043766343745a65647a717a4f42715147754371476c6c5346 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 624e494577724f6b494272434f67654c integ-alg sha-512-256 integ-key 59765354645571414b784d4e6261765367507349666c774676616a6c63676f487655716e4c4e675043766343745a65647a717a4f42715147754371476c6c5346 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 4a4478616751724a416e41507443466d integ-alg sha-512-256 integ-key 6157487a756a734954637a574965734171424d70646b7647766e54674d6c67556675486d48745a4167595273584b4a58517a636878777059737a514659654d50 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 4a4478616751724a416e41507443466d integ-alg sha-512-256 integ-key 6157487a756a734954637a574965734171424d70646b7647766e54674d6c67556675486d48745a4167595273584b4a58517a636878777059737a514659654d50 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 50565a71594d4d4a6c58634b61416568 integ-alg sha-512-256 integ-key 434f56724354555954596649686e4a545154444a787a7052756742485062567161756a504455684c5a587245664d5978494d464344516161595a6665774a505a esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 50565a71594d4d4a6c58634b61416568 integ-alg sha-512-256 integ-key 434f56724354555954596649686e4a545154444a787a7052756742485062567161756a504455684c5a587245664d5978494d464344516161595a6665774a505a esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 536d51566d6d735863786d4166555a6a integ-alg sha-512-256 integ-key 626c4279595648516852527a4e5375746c6b56637142635648676471566e764f5544456e4d435548485558556b53494c4a75654464687867554b4a4a44684f43 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 536d51566d6d735863786d4166555a6a integ-alg sha-512-256 integ-key 626c4279595648516852527a4e5375746c6b56637142635648676471566e764f5544456e4d435548485558556b53494c4a75654464687867554b4a4a44684f43 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 6b796c686d43494f6b625a4156645156 integ-alg sha-512-256 integ-key 4b6d64797259526f7348687855527a45565173794e577250645947664b72754d764b6e4e61534c50794d4f7653654a4a65497779756f5578416a546b666e4762 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 6b796c686d43494f6b625a4156645156 integ-alg sha-512-256 integ-key 4b6d64797259526f7348687855527a45565173794e577250645947664b72754d764b6e4e61534c50794d4f7653654a4a65497779756f5578416a546b666e4762 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 576274564d55555658777a7754544b69 integ-alg sha-512-256 integ-key 687a70754266774f7773724c6c6a7364594450666a4a6a7553547a52455578516764764568634643715a62554d444d727271664e676a4d6973477042444a5a4a esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 576274564d55555658777a7754544b69 integ-alg sha-512-256 integ-key 687a70754266774f7773724c6c6a7364594450666a4a6a7553547a52455578516764764568634643715a62554d444d727271664e676a4d6973477042444a5a4a esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 414c494754536772416a6b6d6f6f7356 integ-alg sha-512-256 integ-key 55697a476b42795050486742574976566b4f506b46586279544d55494d416f4d44634342584d476b624f6b73444f44494c574c686d7162584c7264624461626f esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 414c494754536772416a6b6d6f6f7356 integ-alg sha-512-256 integ-key 55697a476b42795050486742574976566b4f506b46586279544d55494d416f4d44634342584d476b624f6b73444f44494c574c686d7162584c7264624461626f esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 454e4e6862624f44547368724b474871 integ-alg sha-512-256 integ-key 71447165714943476757694d7541535a4e4b4f51437554566c634870577a4c6d727a73625771617176696774637a4d506964506e574e577a4f56534e6a777764 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 454e4e6862624f44547368724b474871 integ-alg sha-512-256 integ-key 71447165714943476757694d7541535a4e4b4f51437554566c634870577a4c6d727a73625771617176696774637a4d506964506e574e577a4f56534e6a777764 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 57546478505851597459676c696d7159 integ-alg sha-512-256 integ-key 7053436472676f766852585553414c4d444f4645614d466b5762586f68787476494952686f756f474562424a58786f596b6b4c726876586445477a544c764367 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 57546478505851597459676c696d7159 integ-alg sha-512-256 integ-key 7053436472676f766852585553414c4d444f4645614d466b5762586f68787476494952686f756f474562424a58786f596b6b4c726876586445477a544c764367 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 756c4f71654d647448506861724a4767 integ-alg sha-512-256 integ-key 5472694e6a6b694e6c6b5362514f784f654567706b745245416f58636b6d44687162756356456d70626f6e4b7876434e506641596e65555665564e4456486171 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 756c4f71654d647448506861724a4767 integ-alg sha-512-256 integ-key 5472694e6a6b694e6c6b5362514f784f654567706b745245416f58636b6d44687162756356456d70626f6e4b7876434e506641596e65555665564e4456486171 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 57556278794d706649497a4e434c684d integ-alg sha-512-256 integ-key 49436178654e62744976564d4c4c6f4874597971564c556c6352664e6f6f755462517268686e594c754e4d425266616f5263526b45776379725a746f46696b79 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 57556278794d706649497a4e434c684d integ-alg sha-512-256 integ-key 49436178654e62744976564d4c4c6f4874597971564c556c6352664e6f6f755462517268686e594c754e4d425266616f5263526b45776379725a746f46696b79 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 764658786c727763616d54586b694b45 integ-alg sha-512-256 integ-key 544772734a46677a694475696a434c6548716c4a4a6253524753614f656562495666426f5544466d535167594c76704a4a52746176426c5a6f5a7470656f7559 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 764658786c727763616d54586b694b45 integ-alg sha-512-256 integ-key 544772734a46677a694475696a434c6548716c4a4a6253524753614f656562495666426f5544466d535167594c76704a4a52746176426c5a6f5a7470656f7559 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 4146775148694c79536f6c6c44537447 integ-alg sha-512-256 integ-key 417a714e687a534d434a456a4d5972424647797956466c4644457242626c4671676179655a4b69716a6e55545146746e594e547243546a425a4c715271584c74 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 4146775148694c79536f6c6c44537447 integ-alg sha-512-256 integ-key 417a714e687a534d434a456a4d5972424647797956466c4644457242626c4671676179655a4b69716a6e55545146746e594e547243546a425a4c715271584c74 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 484c70556e416e467178625a5354544f integ-alg sha-512-256 integ-key 6c6b57486878544659504f446b74436276765a5762495766786d71596a757866666b4a45546178654c71764465566c5250786f674f716a485a726c76416d446d esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 484c70556e416e467178625a5354544f integ-alg sha-512-256 integ-key 6c6b57486878544659504f446b74436276765a5762495766786d71596a757866666b4a45546178654c71764465566c5250786f674f716a485a726c76416d446d esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 62486f76635a4d626f7855525477457a integ-alg sha-512-256 integ-key 69654265647059546948536b576f5254426a4f64766159664b6e4c59486d654f5366476b6f6146776e464a4a564b535461465774764f6a4953415a5556545353 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 62486f76635a4d626f7855525477457a integ-alg sha-512-256 integ-key 69654265647059546948536b576f5254426a4f64766159664b6e4c59486d654f5366476b6f6146776e464a4a564b535461465774764f6a4953415a5556545353 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 6c4c4b717366566a4e564f724c64646b integ-alg sha-512-256 integ-key 446a496a4f54436e5764425a497769686f4e774679686e626471685273696e44746f4c6467456f646b684a73686b7261465a4d506d6f6357594350566250456c esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 6c4c4b717366566a4e564f724c64646b integ-alg sha-512-256 integ-key 446a496a4f54436e5764425a497769686f4e774679686e626471685273696e44746f4c6467456f646b684a73686b7261465a4d506d6f6357594350566250456c esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 71696351585a625373546c4943514176 integ-alg sha-512-256 integ-key 6e6a67707a4a53525153564b724d476c6a5049416b6f6a4d446472506c596c73507a6575797845584a494d6753735845565466625656746f4e5a7a527a5a4755 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 71696351585a625373546c4943514176 integ-alg sha-512-256 integ-key 6e6a67707a4a53525153564b724d476c6a5049416b6f6a4d446472506c596c73507a6575797845584a494d6753735845565466625656746f4e5a7a527a5a4755 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 4777695a477749747644654a614b4771 integ-alg sha-512-256 integ-key 4b4742726676705754786e485a6c584e454c6c53476c6d566a50714a6550776c596f414f6e675475594b736c6347536f74466c574458485743476a7368676f6b esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 4777695a477749747644654a614b4771 integ-alg sha-512-256 integ-key 4b4742726676705754786e485a6c584e454c6c53476c6d566a50714a6550776c596f414f6e675475594b736c6347536f74466c574458485743476a7368676f6b esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 566465526f424649754b4272494b5245 integ-alg sha-512-256 integ-key 656e4c4c54567267554359425263757a7a746b4449444c72456776576b744d79745376637048557575464d78674b566e576d6e4d7479644d436d4e4b6e787249 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 566465526f424649754b4272494b5245 integ-alg sha-512-256 integ-key 656e4c4c54567267554359425263757a7a746b4449444c72456776576b744d79745376637048557575464d78674b566e576d6e4d7479644d436d4e4b6e787249 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 4f716942444b567669626f6466536652 integ-alg sha-512-256 integ-key 4f4e584b6b707059774746574b43677765786c6f495a524862706964434d544a49564c4b4564444357796e6165445759766a69666576466370745a4769477848 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 4f716942444b567669626f6466536652 integ-alg sha-512-256 integ-key 4f4e584b6b707059774746574b43677765786c6f495a524862706964434d544a49564c4b4564444357796e6165445759766a69666576466370745a4769477848 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 76424f434c6658436270594d43427a4c integ-alg sha-512-256 integ-key 7959424b70754b72614370724d676371695657707657596c4a726c6a584e4d5a78655159687941627a786f4d614c76704459457153747a4c7665764173614943 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 76424f434c6658436270594d43427a4c integ-alg sha-512-256 integ-key 7959424b70754b72614370724d676371695657707657596c4a726c6a584e4d5a78655159687941627a786f4d614c76704459457153747a4c7665764173614943 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 746d4a6d64715a4a6a595a476c55515a integ-alg sha-512-256 integ-key 4c71675a4c4564734f52634355796c474d6759766b584b6467444e7951694e6b7a4f434b53456d526c4b5657786c4f786b57524e63677568755a617242565461 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 746d4a6d64715a4a6a595a476c55515a integ-alg sha-512-256 integ-key 4c71675a4c4564734f52634355796c474d6759766b584b6467444e7951694e6b7a4f434b53456d526c4b5657786c4f786b57524e63677568755a617242565461 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 6663697565694941467372634878426c integ-alg sha-512-256 integ-key 7a634f794577476468674e61577a5367566b637a484c72585a567265646f67675a6c45764466796378614259797457596848506b786e7679764f50715854534d esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 6663697565694941467372634878426c integ-alg sha-512-256 integ-key 7a634f794577476468674e61577a5367566b637a484c72585a567265646f67675a6c45764466796378614259797457596848506b786e7679764f50715854534d esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 70755370795543724a73506f52716347 integ-alg sha-512-256 integ-key 6965585659616862427941676443716765784947577859736675676f4b6c444f7276477074655368527061504e5545514374484c6f786c484b59736a636a694c esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 70755370795543724a73506f52716347 integ-alg sha-512-256 integ-key 6965585659616862427941676443716765784947577859736675676f4b6c444f7276477074655368527061504e5545514374484c6f786c484b59736a636a694c esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 565a7458644a556e5253707a696f516b integ-alg sha-512-256 integ-key 614e767a71786d71476444476a576c4f65664e42507353665959747362546c45434f6f6f64616b5166444a4746485843546b5159496c67736b444f776f545069 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 565a7458644a556e5253707a696f516b integ-alg sha-512-256 integ-key 614e767a71786d71476444476a576c4f65664e42507353665959747362546c45434f6f6f64616b5166444a4746485843546b5159496c67736b444f776f545069 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 4d5a4c477153764d6b6a537a4a494870 integ-alg sha-512-256 integ-key 6f5851426c4c594b794d616a5459726554565874476d6856734d6663714d6b7058726d6e6f48504768696948654369536d67584250716a68504e4c6377664151 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 4d5a4c477153764d6b6a537a4a494870 integ-alg sha-512-256 integ-key 6f5851426c4c594b794d616a5459726554565874476d6856734d6663714d6b7058726d6e6f48504768696948654369536d67584250716a68504e4c6377664151 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 6b4e586a616a4b5a7a74686b786f586e integ-alg sha-512-256 integ-key 7674475161786673575656516f444a7952457570475276424d41695963576e74426a52586c576e6c4e4d477a4565424272616b41524767636662634c674a7a62 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 6b4e586a616a4b5a7a74686b786f586e integ-alg sha-512-256 integ-key 7674475161786673575656516f444a7952457570475276424d41695963576e74426a52586c576e6c4e4d477a4565424272616b41524767636662634c674a7a62 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 4e4d494c576e466c7062454a41446557 integ-alg sha-512-256 integ-key 4d46657a6b72745746544b4252514a4d7671724a767a76544a52454d6d6c656c647977456c71514e4c54617261677962766973724a7175786e714e6664777557 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 4e4d494c576e466c7062454a41446557 integ-alg sha-512-256 integ-key 4d46657a6b72745746544b4252514a4d7671724a767a76544a52454d6d6c656c647977456c71514e4c54617261677962766973724a7175786e714e6664777557 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 69464a72596a796755765073706f7551 integ-alg sha-512-256 integ-key 4f586e41444f45515a43435a705676616b496f68784b48636964416d46487658616a756378656f56736f556662636b7247785355616775466554544f70656373 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 69464a72596a796755765073706f7551 integ-alg sha-512-256 integ-key 4f586e41444f45515a43435a705676616b496f68784b48636964416d46487658616a756378656f56736f556662636b7247785355616775466554544f70656373 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 4478486c4d616c416c527946714c5567 integ-alg sha-512-256 integ-key 49776a4a456a4e744e564b5947466a444a6c6f666b737449624f5976635549666c6e7963615a4169464a416f706366755661596b694f46596866524175745070 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 4478486c4d616c416c527946714c5567 integ-alg sha-512-256 integ-key 49776a4a456a4e744e564b5947466a444a6c6f666b737449624f5976635549666c6e7963615a4169464a416f706366755661596b694f46596866524175745070 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 70505676474572754f5377797a45776f integ-alg sha-512-256 integ-key 724b4f597247525a6148737a6969506b53736e4c4d6d4162437366494a42726251455a4f676c69556e6c76595a7959566254634945474a575856557767554b4b esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 70505676474572754f5377797a45776f integ-alg sha-512-256 integ-key 724b4f597247525a6148737a6969506b53736e4c4d6d4162437366494a42726251455a4f676c69556e6c76595a7959566254634945474a575856557767554b4b esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 6d766379417a42534a655a4573416f4e integ-alg sha-512-256 integ-key 5157634a514e684d7a495966656d76466f74567845514c47745379556143786e54764e76726a5274554a65686a7856766a79625a566f6b4662536b796d525178 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 6d766379417a42534a655a4573416f4e integ-alg sha-512-256 integ-key 5157634a514e684d7a495966656d76466f74567845514c47745379556143786e54764e76726a5274554a65686a7856766a79625a566f6b4662536b796d525178 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 68544e68476f7a666a51424446736c54 integ-alg sha-512-256 integ-key 48556e786141617348446b6b5768675361796f4f546476686a6666426d665a6d6150666375486f4451464945675662504243584561584741524f4f446d50494a esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 68544e68476f7a666a51424446736c54 integ-alg sha-512-256 integ-key 48556e786141617348446b6b5768675361796f4f546476686a6666426d665a6d6150666375486f4451464945675662504243584561584741524f4f446d50494a esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 654c45766e5471544877696c73516b63 integ-alg sha-512-256 integ-key 57465579457174546b4966444c5647416979496f566b4b51484953486a68677674594c4e59704b5562457665596c6b6c56426d7955704348514d5567664b6a49 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 654c45766e5471544877696c73516b63 integ-alg sha-512-256 integ-key 57465579457174546b4966444c5647416979496f566b4b51484953486a68677674594c4e59704b5562457665596c6b6c56426d7955704348514d5567664b6a49 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 4544654152704971674259716d524270 integ-alg sha-512-256 integ-key 414d4c5666746e5941567058636d6d4f7658716f45564b7376586e44527a4d7a414f477663446f6c6a744979504e484276534d4f4e55486e766f7a4a41666356 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 4544654152704971674259716d524270 integ-alg sha-512-256 integ-key 414d4c5666746e5941567058636d6d4f7658716f45564b7376586e44527a4d7a414f477663446f6c6a744979504e484276534d4f4e55486e766f7a4a41666356 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 4e7975576e424f7256684a6e74517568 integ-alg sha-512-256 integ-key 70514447596851694d4f4a6e635053684d44627862506f674e746c67706a6a4d6f724e5a4745655a4254586c74766343416f5a43617262664165414255516866 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 4e7975576e424f7256684a6e74517568 integ-alg sha-512-256 integ-key 70514447596851694d4f4a6e635053684d44627862506f674e746c67706a6a4d6f724e5a4745655a4254586c74766343416f5a43617262664165414255516866 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 574e6268784b43507459464b6a5a764c integ-alg sha-512-256 integ-key 47504a4964696f6851526f6f75744355516d5a7768686373754b596d514d57506f496d62615150796b67466a6875694872554a72595a6e7a68637172764b7363 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 574e6268784b43507459464b6a5a764c integ-alg sha-512-256 integ-key 47504a4964696f6851526f6f75744355516d5a7768686373754b596d514d57506f496d62615150796b67466a6875694872554a72595a6e7a68637172764b7363 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 4a436a4e6b6776567068507752524b43 integ-alg sha-512-256 integ-key 536d677444596a4457494c56594754766b5273557541554f50715054656f696d426774616f4841664f67744a74595344536f796949777043666f756d51535263 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 4a436a4e6b6776567068507752524b43 integ-alg sha-512-256 integ-key 536d677444596a4457494c56594754766b5273557541554f50715054656f696d426774616f4841664f67744a74595344536f796949777043666f756d51535263 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-4t2c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 664e4f4c41554d6c515150626c6a4a67 integ-alg sha-512-256 integ-key 53787577446862644479414368556c5a4c71496d527361616748687976745375535a5375744c56577443417a74484d464f464e5171556e664b57554171676645 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 664e4f4c41554d6c515150626c6a4a67 integ-alg sha-512-256 integ-key 53787577446862644479414368556c5a4c71496d527361616748687976745375535a5375744c56577443417a74484d464f464e5171556e664b57554171676645 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 5847744747667a616157485968475658 integ-alg sha-512-256 integ-key 41537655646b4e695871486e446a5a4b644b504d424657756345557a75466e49787161504e6b47554a7872556e79506f71596c71776542544c456d4d6c66676b esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 5847744747667a616157485968475658 integ-alg sha-512-256 integ-key 41537655646b4e695871486e446a5a4b644b504d424657756345557a75466e49787161504e6b47554a7872556e79506f71596c71776542544c456d4d6c66676b esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 59706371596f6b4b5755577469516f79 integ-alg sha-512-256 integ-key 6657634c796550474c4242586a4777555a67654970725350745358796d4f76514e506b6753786f48617a546749464d727574764542774a415569526c554c5456 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 59706371596f6b4b5755577469516f79 integ-alg sha-512-256 integ-key 6657634c796550474c4242586a4777555a67654970725350745358796d4f76514e506b6753786f48617a546749464d727574764542774a415569526c554c5456 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 4d6651714a76597265684a5372696b62 integ-alg sha-512-256 integ-key 5542596254537765517474776a514d627149747866745568465a6a484c524e616f706e635362634164686659624452757a4f4d696564714d6e72637a4c534545 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 4d6651714a76597265684a5372696b62 integ-alg sha-512-256 integ-key 5542596254537765517474776a514d627149747866745568465a6a484c524e616f706e635362634164686659624452757a4f4d696564714d6e72637a4c534545 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 5871425965564b79417869654d764a68 integ-alg sha-512-256 integ-key 6769436a5967674f43574c6a5348694769535172554c506a726e7176486f434c4f734a77556a4a626d5972435159456666654b79454a557a4f5163726f695371 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 5871425965564b79417869654d764a68 integ-alg sha-512-256 integ-key 6769436a5967674f43574c6a5348694769535172554c506a726e7176486f434c4f734a77556a4a626d5972435159456666654b79454a557a4f5163726f695371 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 64456163506a71725a68544547784964 integ-alg sha-512-256 integ-key 6d436345466470684344414c756d50706b595a65705452686d57526c5a5742516a64666e434b716a6c784b6f706d7a6c6d4d576c6f614d4e52446d62416a6869 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 64456163506a71725a68544547784964 integ-alg sha-512-256 integ-key 6d436345466470684344414c756d50706b595a65705452686d57526c5a5742516a64666e434b716a6c784b6f706d7a6c6d4d576c6f614d4e52446d62416a6869 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 756a524464686b657744746853714858 integ-alg sha-512-256 integ-key 6e6461565562554551594267736a566d515274556a67744f4b7656727a5a45536f4c7974566b52584a7a426a475a7672705a4f69497a6271524d444f53565059 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 756a524464686b657744746853714858 integ-alg sha-512-256 integ-key 6e6461565562554551594267736a566d515274556a67744f4b7656727a5a45536f4c7974566b52584a7a426a475a7672705a4f69497a6271524d444f53565059 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 557763646c6d4c4e484a6c626946427a integ-alg sha-512-256 integ-key 776558767478544b747a6f59784c4c716573684a755a514768424c7a6d44714e76677a4e4471737550487470747169634f506b546b745655576377776275756f esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 557763646c6d4c4e484a6c626946427a integ-alg sha-512-256 integ-key 776558767478544b747a6f59784c4c716573684a755a514768424c7a6d44714e76677a4e4471737550487470747169634f506b546b745655576377776275756f esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 6f5179725470564f6d76675067765275 integ-alg sha-512-256 integ-key 626d506f5076484276554d4c5355647354585641664c414678426157564269674469794b7053624957464751465a5254504c567a414b677941424a4a704f616b esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 6f5179725470564f6d76675067765275 integ-alg sha-512-256 integ-key 626d506f5076484276554d4c5355647354585641664c414678426157564269674469794b7053624957464751465a5254504c567a414b677941424a4a704f616b esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 624250764c6a63584353624c42706973 integ-alg sha-512-256 integ-key 466476455353795472424e44484d53737a614a535367675248464869696f44634c4d7171534a5855765067767277797a4f446256686e62434a56775852597944 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 624250764c6a63584353624c42706973 integ-alg sha-512-256 integ-key 466476455353795472424e44484d53737a614a535367675248464869696f44634c4d7171534a5855765067767277797a4f446256686e62434a56775852597944 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 624642585158784c41656461626b6d46 integ-alg sha-512-256 integ-key 626c5a494a70717062444a4a6655634c6c734d48446c6161764a79477149644d4d774966466e68425a78764e684a6345756861466d4575737065486b7576556b esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 624642585158784c41656461626b6d46 integ-alg sha-512-256 integ-key 626c5a494a70717062444a4a6655634c6c734d48446c6161764a79477149644d4d774966466e68425a78764e684a6345756861466d4575737065486b7576556b esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 7346644547584e52477a50625a6d6d47 integ-alg sha-512-256 integ-key 6679455a636b6d784f744b4f477a5a4864525156746177786570536942636748576d72465649637056686e4666544a5554666e6e49724c62576c444c4974784b esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 7346644547584e52477a50625a6d6d47 integ-alg sha-512-256 integ-key 6679455a636b6d784f744b4f477a5a4864525156746177786570536942636748576d72465649637056686e4666544a5554666e6e49724c62576c444c4974784b esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 466158784c434f41554e6b7a62764167 integ-alg sha-512-256 integ-key 77764c4b6d756b5275496b6b764f6a644e4c646379685a6c44577a6f4973774c447246796a7954796c504f624c556a54415274795563424f6b485174724e5966 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 466158784c434f41554e6b7a62764167 integ-alg sha-512-256 integ-key 77764c4b6d756b5275496b6b764f6a644e4c646379685a6c44577a6f4973774c447246796a7954796c504f624c556a54415274795563424f6b485174724e5966 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 49784e4f456177795661795946774b53 integ-alg sha-512-256 integ-key 55426b7571465548774551546470436b577a697448416a586e48614c4f7154716a44426a62796f48504458416f6651514e497556716473764f6f4b6155615156 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 49784e4f456177795661795946774b53 integ-alg sha-512-256 integ-key 55426b7571465548774551546470436b577a697448416a586e48614c4f7154716a44426a62796f48504458416f6651514e497556716473764f6f4b6155615156 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 647367705a42716759556f67776e7a63 integ-alg sha-512-256 integ-key 656f54526259556d534e52716a7874784b635163516a41524754646968646c4f4c504f496e476d53735070494c6e6e514d4a4f456346416a444f797478455653 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 647367705a42716759556f67776e7a63 integ-alg sha-512-256 integ-key 656f54526259556d534e52716a7874784b635163516a41524754646968646c4f4c504f496e476d53735070494c6e6e514d4a4f456346416a444f797478455653 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 5052536e4d7741735955496e4a776755 integ-alg sha-512-256 integ-key 5879536d677a5549654e424d52776e6d794c5245496e516d7a636b564f546d5468704955515a6a616f654c586f504266454762546365476b714d437a4d705175 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 5052536e4d7741735955496e4a776755 integ-alg sha-512-256 integ-key 5879536d677a5549654e424d52776e6d794c5245496e516d7a636b564f546d5468704955515a6a616f654c586f504266454762546365476b714d437a4d705175 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 5677466e7379784c70734858596c4664 integ-alg sha-512-256 integ-key 6e617641435a4368427072506b6e654d4a6b7a436f53536a6643734665426c4f514446426a55597347486f474b746f4b4755766141707a4954485070656a5672 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 5677466e7379784c70734858596c4664 integ-alg sha-512-256 integ-key 6e617641435a4368427072506b6e654d4a6b7a436f53536a6643734665426c4f514446426a55597347486f474b746f4b4755766141707a4954485070656a5672 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 7278414e67656f425047587352674150 integ-alg sha-512-256 integ-key 7a4c43486b5964725a7668455571477557706345525a4852754c6d4d6273526553526f4f6c736d6571777245776d726c5474597a6a4c594475464d557a4b754e esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 7278414e67656f425047587352674150 integ-alg sha-512-256 integ-key 7a4c43486b5964725a7668455571477557706345525a4852754c6d4d6273526553526f4f6c736d6571777245776d726c5474597a6a4c594475464d557a4b754e esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 4b4e67704c4a6668705842546b445244 integ-alg sha-512-256 integ-key 5379506869536d677553787548456d7a6f554d78474d6859567764716878626c697865677a515a69544f7446736f49704855795047567a4d4b4d714c7652674b esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 4b4e67704c4a6668705842546b445244 integ-alg sha-512-256 integ-key 5379506869536d677553787548456d7a6f554d78474d6859567764716878626c697865677a515a69544f7446736f49704855795047567a4d4b4d714c7652674b esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 61587a46424c4a684f707a596c6e5452 integ-alg sha-512-256 integ-key 7552644354456a794d73655674437a50716d4d514a515a6c544f744a77614465764f7849757345686d567a5a7a597148594a69534b6948554e4a4b7a4d47685a esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 61587a46424c4a684f707a596c6e5452 integ-alg sha-512-256 integ-key 7552644354456a794d73655674437a50716d4d514a515a6c544f744a77614465764f7849757345686d567a5a7a597148594a69534b6948554e4a4b7a4d47685a esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 4a4d6956644a73667376724e79586874 integ-alg sha-512-256 integ-key 705a494148764d726b6d6a66796e7a61616b49624e505962784273465a627265435a79755056657657564d566b477a726e6f6b4c4b42766a6b7241634d684766 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 4a4d6956644a73667376724e79586874 integ-alg sha-512-256 integ-key 705a494148764d726b6d6a66796e7a61616b49624e505962784273465a627265435a79755056657657564d566b477a726e6f6b4c4b42766a6b7241634d684766 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 486d464c42435867547358527a6d4e76 integ-alg sha-512-256 integ-key 6e45477a41726d627752615159455a536163496c73616f66564e516c4a61706e7571425875746558726d6268726845454b4e627972696e777a546e6b424b6b43 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 486d464c42435867547358527a6d4e76 integ-alg sha-512-256 integ-key 6e45477a41726d627752615159455a536163496c73616f66564e516c4a61706e7571425875746558726d6268726845454b4e627972696e777a546e6b424b6b43 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 654a4258667362595653785162617965 integ-alg sha-512-256 integ-key 4d786649656359574d77756e52444c5a50674e4b62796c664b6a704c6376456e7a7779796b544946697572445643505a574d6753624564474e746c54546a6872 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 654a4258667362595653785162617965 integ-alg sha-512-256 integ-key 4d786649656359574d77756e52444c5a50674e4b62796c664b6a704c6376456e7a7779796b544946697572445643505a574d6753624564474e746c54546a6872 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 78724a5962564561786c6c6f72466772 integ-alg sha-512-256 integ-key 42545574426e69595159774a76485069686d50516279524f5464705967585353597058556c4f50756565766770427057534446566347634e5670615445655546 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 78724a5962564561786c6c6f72466772 integ-alg sha-512-256 integ-key 42545574426e69595159774a76485069686d50516279524f5464705967585353597058556c4f50756565766770427057534446566347634e5670615445655546 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 626b79776a637a59446247655856646d integ-alg sha-512-256 integ-key 4f506f564e576e6a684678766f51614b617a53664750626d7a736e586d6b4a68494a794e636f66665542457050754f49546f4b61734468555946434a614b644a esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 626b79776a637a59446247655856646d integ-alg sha-512-256 integ-key 4f506f564e576e6a684678766f51614b617a53664750626d7a736e586d6b4a68494a794e636f66665542457050754f49546f4b61734468555946434a614b644a esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 506a6b6768775349704d434269454b58 integ-alg sha-512-256 integ-key 48544c44474c79594f6c444f667464524c51657149556f50636750746e4d54717653595a4d42657870466b77576254726e7a6f4d4a7275744958536756665874 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 506a6b6768775349704d434269454b58 integ-alg sha-512-256 integ-key 48544c44474c79594f6c444f667464524c51657149556f50636750746e4d54717653595a4d42657870466b77576254726e7a6f4d4a7275744958536756665874 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 4d6c74687a6a7a6b57644d4d694b716d integ-alg sha-512-256 integ-key 6b6f414d5059706c574a6a796d765948456e716d4a4f76465a564b69465254646466504864576442664443797a74505366574d4b4d58747a564b775254716b65 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 4d6c74687a6a7a6b57644d4d694b716d integ-alg sha-512-256 integ-key 6b6f414d5059706c574a6a796d765948456e716d4a4f76465a564b69465254646466504864576442664443797a74505366574d4b4d58747a564b775254716b65 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 6646546d424f6168596a6c544b7a4449 integ-alg sha-512-256 integ-key 596a516a464d436b4142756c47736374665a44624a554c786d6b4472445a666342724b586167576a62696a4c734b4e4a7a504f5250536c7069416156566d6d66 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 6646546d424f6168596a6c544b7a4449 integ-alg sha-512-256 integ-key 596a516a464d436b4142756c47736374665a44624a554c786d6b4472445a666342724b586167576a62696a4c734b4e4a7a504f5250536c7069416156566d6d66 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 7a554767516c4b636d56504678776567 integ-alg sha-512-256 integ-key 486f59586c794878536e76656d766b584b5259674d4765505064635a73795153444574744e584362756b706f415466545869624843617048434e564675575258 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 7a554767516c4b636d56504678776567 integ-alg sha-512-256 integ-key 486f59586c794878536e76656d766b584b5259674d4765505064635a73795153444574744e584362756b706f415466545869624843617048434e564675575258 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 58686e614350654e6d486571516d424d integ-alg sha-512-256 integ-key 4d47586679426a6f48444f735142454d6d674378716379564c5a494f4977637877736d4553556d51564a4c44614d525870444a6f614c636f794856634a766f4e esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 58686e614350654e6d486571516d424d integ-alg sha-512-256 integ-key 4d47586679426a6f48444f735142454d6d674378716379564c5a494f4977637877736d4553556d51564a4c44614d525870444a6f614c636f794856634a766f4e esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 5a794d6279736b7a46647a67586f4a75 integ-alg sha-512-256 integ-key 796772514b576b67424d484741724e53444a715057627646544c526853694b644669667a51464646435648536c534a677477716b614f495a44434b4272536267 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 5a794d6279736b7a46647a67586f4a75 integ-alg sha-512-256 integ-key 796772514b576b67424d484741724e53444a715057627646544c526853694b644669667a51464646435648536c534a677477716b614f495a44434b4272536267 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 5562744d4e67654451566a4768677256 integ-alg sha-512-256 integ-key 6a716a7a65764166494a4e4a646b775167784d4c786b5246694b4b58594d766d6f65734a5679624369724c4c516a664b42584b4d77504c48736a6772454b4b4e esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 5562744d4e67654451566a4768677256 integ-alg sha-512-256 integ-key 6a716a7a65764166494a4e4a646b775167784d4c786b5246694b4b58594d766d6f65734a5679624369724c4c516a664b42584b4d77504c48736a6772454b4b4e esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 7556496244454e4b56504a616f785261 integ-alg sha-512-256 integ-key 615a6979724d456f666361645654494c5579676d5066666376787752756544696976457762755573624b6173566a6958544f494c546569596658415051727575 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 7556496244454e4b56504a616f785261 integ-alg sha-512-256 integ-key 615a6979724d456f666361645654494c5579676d5066666376787752756544696976457762755573624b6173566a6958544f494c546569596658415051727575 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 79555463757a57566978656d586d4271 integ-alg sha-512-256 integ-key 6e68767a684477485a734c6c417573714a426d48706d6c537a4d4c6b4f62694e544a6b57557a42674f74484d6642544f67435376464f726348726675676a424c esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 79555463757a57566978656d586d4271 integ-alg sha-512-256 integ-key 6e68767a684477485a734c6c417573714a426d48706d6c537a4d4c6b4f62694e544a6b57557a42674f74484d6642544f67435376464f726348726675676a424c esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 796455514b714b54536a494767564e73 integ-alg sha-512-256 integ-key 67594243786d66664d514370787357517275586879717a6b64556368796b6b616f514b647664556d76726752554a49474c644476557661526e456c716f577475 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 796455514b714b54536a494767564e73 integ-alg sha-512-256 integ-key 67594243786d66664d514370787357517275586879717a6b64556368796b6b616f514b647664556d76726752554a49474c644476557661526e456c716f577475 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 624951546750726e7550476244476647 integ-alg sha-512-256 integ-key 6c6668646569614253716357537453746b4641584d434f43547561536e786575716c4672475a71716350427855477947746a4351474f6378527863724d705a51 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 624951546750726e7550476244476647 integ-alg sha-512-256 integ-key 6c6668646569614253716357537453746b4641584d434f43547561536e786575716c4672475a71716350427855477947746a4351474f6378527863724d705a51 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 774e565569696b74664f44417557596f integ-alg sha-512-256 integ-key 62716c5a5848677978496e7077585a414555514e4c68644a757041746174644a616e7a4f53785a47757379674144745a6c6445426159534b476b716365686753 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 774e565569696b74664f44417557596f integ-alg sha-512-256 integ-key 62716c5a5848677978496e7077585a414555514e4c68644a757041746174644a616e7a4f53785a47757379674144745a6c6445426159534b476b716365686753 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 50706e4c57684d784c7a417170694b69 integ-alg sha-512-256 integ-key 71466b4d717a75666c587778616d525243597a6268746d514762547a7374696d575a54626c6c50577662446373486a6b454664414f485467475159687a496165 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 50706e4c57684d784c7a417170694b69 integ-alg sha-512-256 integ-key 71466b4d717a75666c587778616d525243597a6268746d514762547a7374696d575a54626c6c50577662446373486a6b454664414f485467475159687a496165 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 55724778436371774c6b427849624577 integ-alg sha-512-256 integ-key 616a43456c5058496c7155534f536a585a61546e677343535a486b647651667754484d524f6a56737675445149476f6a684d646b5641576e595849744b4d4f56 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 55724778436371774c6b427849624577 integ-alg sha-512-256 integ-key 616a43456c5058496c7155534f536a585a61546e677343535a486b647651667754484d524f6a56737675445149476f6a684d646b5641576e595849744b4d4f56 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 74695978574b7677555a574c61794844 integ-alg sha-512-256 integ-key 59454a6e6e616d4d764e714d4e4d666973654775456d75754e494678786364656242657172444857437941456f5244566f7070566c4276416e566b4c6b705462 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 74695978574b7677555a574c61794844 integ-alg sha-512-256 integ-key 59454a6e6e616d4d764e714d4e4d666973654775456d75754e494678786364656242657172444857437941456f5244566f7070566c4276416e566b4c6b705462 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-8t4c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 63426c6f7a52664674454c75545a5847 integ-alg sha-512-256 integ-key 446b4c72574474477366476c4e416c43686f7a4f476b614b6b6a6c6350677355774e4a5573676a4f747a4a61527a664c4b534176764c536c5a54475379515154 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 63426c6f7a52664674454c75545a5847 integ-alg sha-512-256 integ-key 446b4c72574474477366476c4e416c43686f7a4f476b614b6b6a6c6350677355774e4a5573676a4f747a4a61527a664c4b534176764c536c5a54475379515154 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 6470594778734a774c694c6a6c61434e integ-alg sha-512-256 integ-key 555a506e48495873556c7a685574485055756d684e5a434557556d4469535a50687354556872497352676861424f7251487559644e676e4d4669685955796e62 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 6470594778734a774c694c6a6c61434e integ-alg sha-512-256 integ-key 555a506e48495873556c7a685574485055756d684e5a434557556d4469535a50687354556872497352676861424f7251487559644e676e4d4669685955796e62 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 69766c6345454a50747456757972796e integ-alg sha-512-256 integ-key 46457466696b636b76574758694b656f6f6144736c76626d79557461457a4f636e686e6e696f7753765074756477686c46777a58445352506753784565566156 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 69766c6345454a50747456757972796e integ-alg sha-512-256 integ-key 46457466696b636b76574758694b656f6f6144736c76626d79557461457a4f636e686e6e696f7753765074756477686c46777a58445352506753784565566156 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 6d7647737456577366726a5765686e78 integ-alg sha-512-256 integ-key 6e6c7145464b466277534964794b56724b507471584a516b6f574c486a4f41556578496868764d784e6c527952694a4c67444a6a4944656e6b716d546d756765 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 6d7647737456577366726a5765686e78 integ-alg sha-512-256 integ-key 6e6c7145464b466277534964794b56724b507471584a516b6f574c486a4f41556578496868764d784e6c527952694a4c67444a6a4944656e6b716d546d756765 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 5673624e55504641417349694e6e4854 integ-alg sha-512-256 integ-key 53494b77654a495551666c4e587767724a575a416875535a7152714c446f4758714e6e716e4e554d47777776656d5a44747458664b5a534b754f4e4e5059634d esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 5673624e55504641417349694e6e4854 integ-alg sha-512-256 integ-key 53494b77654a495551666c4e587767724a575a416875535a7152714c446f4758714e6e716e4e554d47777776656d5a44747458664b5a534b754f4e4e5059634d esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 706143454b53674d66774a746c646747 integ-alg sha-512-256 integ-key 6d447141496b546b57677872647943786a49616e676445464e456b756851796755706b51434b5169754d6b51586d7a79644e71756d6c53647a4b6c54556c7465 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 706143454b53674d66774a746c646747 integ-alg sha-512-256 integ-key 6d447141496b546b57677872647943786a49616e676445464e456b756851796755706b51434b5169754d6b51586d7a79644e71756d6c53647a4b6c54556c7465 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 78756d42624f62774b74434f66647662 integ-alg sha-512-256 integ-key 4a435055787a444b6e676d6944514456615668674d547849634b624f536464794a5770565369435348504d6571634c797968436e776b436973706a4c73416471 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 78756d42624f62774b74434f66647662 integ-alg sha-512-256 integ-key 4a435055787a444b6e676d6944514456615668674d547849634b624f536464794a5770565369435348504d6571634c797968436e776b436973706a4c73416471 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 4c71434d586d42716c5572696863766d integ-alg sha-512-256 integ-key 526d6a7746617a6741636f484771476a55506478687445785179447158595a44724e6c58456153554d59636a6465527449654c4f565058665075637959584f55 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 4c71434d586d42716c5572696863766d integ-alg sha-512-256 integ-key 526d6a7746617a6741636f484771476a55506478687445785179447158595a44724e6c58456153554d59636a6465527449654c4f565058665075637959584f55 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 6b6251714f5255544e724b5668484c46 integ-alg sha-512-256 integ-key 614b62436c6469505062456a414e48615a4647484b4b6d736d58747064704d4b4f67646266486b576a756b70736852775a537841496754766150774166666c63 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 6b6251714f5255544e724b5668484c46 integ-alg sha-512-256 integ-key 614b62436c6469505062456a414e48615a4647484b4b6d736d58747064704d4b4f67646266486b576a756b70736852775a537841496754766150774166666c63 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 4842525841705242514474744d527853 integ-alg sha-512-256 integ-key 484b4c6a5a7446674d66554c4673564f6579504e567a6c754f6178586f757144534766694c6e58644c595a54504262617742754159456b434646684e617a5a76 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 4842525841705242514474744d527853 integ-alg sha-512-256 integ-key 484b4c6a5a7446674d66554c4673564f6579504e567a6c754f6178586f757144534766694c6e58644c595a54504262617742754159456b434646684e617a5a76 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 4f56634a4c6265594d47796458566679 integ-alg sha-512-256 integ-key 654f5046714d7a464154495561666c78695a6e4a5144636367487642554972534e4146585a484871414747456a594a6579726b796d4d4d6243504f6b47415742 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 4f56634a4c6265594d47796458566679 integ-alg sha-512-256 integ-key 654f5046714d7a464154495561666c78695a6e4a5144636367487642554972534e4146585a484871414747456a594a6579726b796d4d4d6243504f6b47415742 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 7142624e4d6d4761474b556f71676665 integ-alg sha-512-256 integ-key 5549495445546c75716f564c727141416177456c6366417a4c534350424e6d79516342776d4453556c496f41414f437179536370784541677a587a514f4a534d esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 7142624e4d6d4761474b556f71676665 integ-alg sha-512-256 integ-key 5549495445546c75716f564c727141416177456c6366417a4c534350424e6d79516342776d4453556c496f41414f437179536370784541677a587a514f4a534d esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 4159444f6b596a5372694f5a7a495877 integ-alg sha-512-256 integ-key 4668744f6a5450766449527a50747850656c79596e766e64674c6f78426e7942676b6f6b4a48527978704c4863487041517046727a6d624f424c627966686476 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 4159444f6b596a5372694f5a7a495877 integ-alg sha-512-256 integ-key 4668744f6a5450766449527a50747850656c79596e766e64674c6f78426e7942676b6f6b4a48527978704c4863487041517046727a6d624f424c627966686476 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 507a78564665795365447049784b7258 integ-alg sha-512-256 integ-key 51664846456e4c51644f70754f594e69454f6154686a6d4e51725a54485a687051744973785a43464f414a4e6763784d746148536c567859796e6b6157537668 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 507a78564665795365447049784b7258 integ-alg sha-512-256 integ-key 51664846456e4c51644f70754f594e69454f6154686a6d4e51725a54485a687051744973785a43464f414a4e6763784d746148536c567859796e6b6157537668 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 65427948536f624a49694272645a416d integ-alg sha-512-256 integ-key 6871476b784644714552436278644376425664594c41414d656a627a41614e634e50554e45757a6963464947707959587753495754497646706c4a48566c654e esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 65427948536f624a49694272645a416d integ-alg sha-512-256 integ-key 6871476b784644714552436278644376425664594c41414d656a627a41614e634e50554e45757a6963464947707959587753495754497646706c4a48566c654e esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 7a436e57696a4a41625a5371586d7266 integ-alg sha-512-256 integ-key 5261717a67766574426e746f72674543626d6e43786d744f576c457a7667486578556a587a6a6446596957694d48426b486a57514d7343696e67474171726a6f esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 7a436e57696a4a41625a5371586d7266 integ-alg sha-512-256 integ-key 5261717a67766574426e746f72674543626d6e43786d744f576c457a7667486578556a587a6a6446596957694d48426b486a57514d7343696e67474171726a6f esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 48714f545579547264574e6545674544 integ-alg sha-512-256 integ-key 786f49716a4b766e6b5173435878577166747847636663447a58554b516b7a6c667669584c7864646969544e505969556f516c4e6176595478647346544a4d64 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 48714f545579547264574e6545674544 integ-alg sha-512-256 integ-key 786f49716a4b766e6b5173435878577166747847636663447a58554b516b7a6c667669584c7864646969544e505969556f516c4e6176595478647346544a4d64 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 686d74666867417a52764c485a526d73 integ-alg sha-512-256 integ-key 7a656b7a736f49707763487575506c53494d47736441486b794f4175464743426f615862475142486542657066644372495274686c4b457654424454664e6961 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 686d74666867417a52764c485a526d73 integ-alg sha-512-256 integ-key 7a656b7a736f49707763487575506c53494d47736441486b794f4175464743426f615862475142486542657066644372495274686c4b457654424454664e6961 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 46716d7a564d764577464e5549664459 integ-alg sha-512-256 integ-key 70784b546e6b65667667656e4d42724268784565456e536175715753696e65474753574668626b705a467a61424f47716d71716744496258456d724249746d4e esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 46716d7a564d764577464e5549664459 integ-alg sha-512-256 integ-key 70784b546e6b65667667656e4d42724268784565456e536175715753696e65474753574668626b705a467a61424f47716d71716744496258456d724249746d4e esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 7351486456636352424c766366454e6e integ-alg sha-512-256 integ-key 617862796a786c4977544b5457786e70555977657270714c496454574856416f64595272795273775a4746795877616775796a726b7374776746536d4b434d6f esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 7351486456636352424c766366454e6e integ-alg sha-512-256 integ-key 617862796a786c4977544b5457786e70555977657270714c496454574856416f64595272795273775a4746795877616775796a726b7374776746536d4b434d6f esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 6f64766859514c4b63524c7650516971 integ-alg sha-512-256 integ-key 644e6e4d56787077684d65584e706f6951795a555a4c6f55634654586f717367684c58746f42657674494d4e4d58574c69654f62734b6c776c46436a6c6b4848 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 6f64766859514c4b63524c7650516971 integ-alg sha-512-256 integ-key 644e6e4d56787077684d65584e706f6951795a555a4c6f55634654586f717367684c58746f42657674494d4e4d58574c69654f62734b6c776c46436a6c6b4848 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 455862424c4b4d46776c6251666c6476 integ-alg sha-512-256 integ-key 514e534a445470517873754e4755776f486e6254756b46674c6b5266646f5656577276516d7472484157626f51664f6c797552764777715456666b6e506a4574 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 455862424c4b4d46776c6251666c6476 integ-alg sha-512-256 integ-key 514e534a445470517873754e4755776f486e6254756b46674c6b5266646f5656577276516d7472484157626f51664f6c797552764777715456666b6e506a4574 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 614967704c757969466967566a436c4c integ-alg sha-512-256 integ-key 5946534f71696d536c477966594644516d6a7957546a71704153426f485a43634748506a6e746b57504c46454f53646c5568636467584b75547779594f676370 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 614967704c757969466967566a436c4c integ-alg sha-512-256 integ-key 5946534f71696d536c477966594644516d6a7957546a71704153426f485a43634748506a6e746b57504c46454f53646c5568636467584b75547779594f676370 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 74526a50476859746c7973477251536f integ-alg sha-512-256 integ-key 7561466b795673496652706d46466747634f556450554d62777968614a624d4f634f49735044495677446971636e4c6873496d69734d46736e585276764a6e71 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 74526a50476859746c7973477251536f integ-alg sha-512-256 integ-key 7561466b795673496652706d46466747634f556450554d62777968614a624d4f634f49735044495677446971636e4c6873496d69734d46736e585276764a6e71 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 727a6f46526a69514d7a686f584c6572 integ-alg sha-512-256 integ-key 5a5257754e7543596262764a794e416a7463555a424c4d464c5164584c43564762517958497543706c6b737573764f6c6f47714b797456425073416678446570 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 727a6f46526a69514d7a686f584c6572 integ-alg sha-512-256 integ-key 5a5257754e7543596262764a794e416a7463555a424c4d464c5164584c43564762517958497543706c6b737573764f6c6f47714b797456425073416678446570 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 46694b56554751457a62456c7170786d integ-alg sha-512-256 integ-key 57514e685a57447364576f684d6d464369474e715361634e5a52494a64456b5257414b4c69697470714b42547a777471425241735844755a59554a6f454f476f esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 46694b56554751457a62456c7170786d integ-alg sha-512-256 integ-key 57514e685a57447364576f684d6d464369474e715361634e5a52494a64456b5257414b4c69697470714b42547a777471425241735844755a59554a6f454f476f esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 6c564770677572455a6d6c557a415564 integ-alg sha-512-256 integ-key 6f4d6b6d4b71707141716c7755466a4a6569627a4465744270516c63424251654862705277596a536262646672756d4d6b614b7a78577378664e6f7452546577 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 6c564770677572455a6d6c557a415564 integ-alg sha-512-256 integ-key 6f4d6b6d4b71707141716c7755466a4a6569627a4465744270516c63424251654862705277596a536262646672756d4d6b614b7a78577378664e6f7452546577 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 474c46684b714b595243675a7a614448 integ-alg sha-512-256 integ-key 50456656566f7251776c4d42796266475557476f43784f484d4354614953727157695058736b75745449694d4c6a56437961547648696169617379507349714d esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 474c46684b714b595243675a7a614448 integ-alg sha-512-256 integ-key 50456656566f7251776c4d42796266475557476f43784f484d4354614953727157695058736b75745449694d4c6a56437961547648696169617379507349714d esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 55535a6b4f644f66556a694f736f4269 integ-alg sha-512-256 integ-key 7a4561566c66584248657541556a6d6e44735853457769724267507451507848756c62705859426a6e425363757751715049677643494a7a796556584b6f5350 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 55535a6b4f644f66556a694f736f4269 integ-alg sha-512-256 integ-key 7a4561566c66584248657541556a6d6e44735853457769724267507451507848756c62705859426a6e425363757751715049677643494a7a796556584b6f5350 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 454f6e52674264477452475752644577 integ-alg sha-512-256 integ-key 4e774a615872596a6151644d555a434b486f645742784459686a4354436556746167764b53474772554c4d71776b79476c70784847756a63465a78744c42556d esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 454f6e52674264477452475752644577 integ-alg sha-512-256 integ-key 4e774a615872596a6151644d555a434b486f645742784459686a4354436556746167764b53474772554c4d71776b79476c70784847756a63465a78744c42556d esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 567473466d684d7a41524c75507a5041 integ-alg sha-512-256 integ-key 6d614c5a4774766b6b74714272464547704f41596a767a7753496249667258495a6678556a7943746f455073425946507543545976666f42674d675769426259 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 567473466d684d7a41524c75507a5041 integ-alg sha-512-256 integ-key 6d614c5a4774766b6b74714272464547704f41596a767a7753496249667258495a6678556a7943746f455073425946507543545976666f42674d675769426259 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 6857536e47726a5370765a4e48516c4f integ-alg sha-512-256 integ-key 4474594a67507142736c6a70704e76457573614a55725469786b4f6f547342614e7a6f496c4e6e4d66415a52544d447274736d5250445058744a744147614161 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 6857536e47726a5370765a4e48516c4f integ-alg sha-512-256 integ-key 4474594a67507142736c6a70704e76457573614a55725469786b4f6f547342614e7a6f496c4e6e4d66415a52544d447274736d5250445058744a744147614161 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 444d504664676f6e5378446642577a59 integ-alg sha-512-256 integ-key 4363726b617456595273486e6f6c6b7a584d746c4a48765465727877564768666578576e686759524a4863756c53456c5a506f776552726f7252516c55704147 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 444d504664676f6e5378446642577a59 integ-alg sha-512-256 integ-key 4363726b617456595273486e6f6c6b7a584d746c4a48765465727877564768666578576e686759524a4863756c53456c5a506f776552726f7252516c55704147 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 61426d654350537773666f4c4b676271 integ-alg sha-512-256 integ-key 68426b74764e6e78464e596c6d73484953645075535441426177546a4f4c5578507078664d487252416b574665774e51624a6d5466664c41754b4277444e7077 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 61426d654350537773666f4c4b676271 integ-alg sha-512-256 integ-key 68426b74764e6e78464e596c6d73484953645075535441426177546a4f4c5578507078664d487252416b574665774e51624a6d5466664c41754b4277444e7077 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 67794446684e565a7573556144586745 integ-alg sha-512-256 integ-key 4154496741447449786e7852456a6b69574b736a4d4a47725a4c46584668697853476b746f774358677a4b616d526c644f5a4b7353426661616d6c6b5765585a esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 67794446684e565a7573556144586745 integ-alg sha-512-256 integ-key 4154496741447449786e7852456a6b69574b736a4d4a47725a4c46584668697853476b746f774358677a4b616d526c644f5a4b7353426661616d6c6b5765585a esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 64776e6851636753424a56786d705550 integ-alg sha-512-256 integ-key 4578645158665a4b4d66695662704c77505468546645416273725a514474437569437255685458436a784c495a4a654376757571504e43434877594576696d76 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 64776e6851636753424a56786d705550 integ-alg sha-512-256 integ-key 4578645158665a4b4d66695662704c77505468546645416273725a514474437569437255685458436a784c495a4a654376757571504e43434877594576696d76 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 796964586e7274766a5776546d41676f integ-alg sha-512-256 integ-key 774a6c47527445724e6a6b4e657a7a54486a6a6d766c70476576645846724862517a494e48546369586d6d595a687849516e49766d7a4644446769686e505459 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 796964586e7274766a5776546d41676f integ-alg sha-512-256 integ-key 774a6c47527445724e6a6b4e657a7a54486a6a6d766c70476576645846724862517a494e48546369586d6d595a687849516e49766d7a4644446769686e505459 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 626b657256446673595857576d6c6544 integ-alg sha-512-256 integ-key 477261706f595759664f584e6c6f77656b535856664d78726763565a5864714e78734545417275784d585a504158786f595241416861476d734b46714c6f4147 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 626b657256446673595857576d6c6544 integ-alg sha-512-256 integ-key 477261706f595759664f584e6c6f77656b535856664d78726763565a5864714e78734545417275784d585a504158786f595241416861476d734b46714c6f4147 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 4e6a41457847466f55484a5177644d55 integ-alg sha-512-256 integ-key 4a6d4f554f556f75586b6171644f684d646c625854736356714e67437a6d485352424c457577624f4f4e68744f7279695343686e6d656b6d494b576b41676a58 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 4e6a41457847466f55484a5177644d55 integ-alg sha-512-256 integ-key 4a6d4f554f556f75586b6171644f684d646c625854736356714e67437a6d485352424c457577624f4f4e68744f7279695343686e6d656b6d494b576b41676a58 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 5473516648624154496c455361674556 integ-alg sha-512-256 integ-key 764b6f47715367676a4f4151457769426a5251584e445365765857704f7741786145706b575857456b4a4f5848676e7076425870504c786f575175666843436c esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 5473516648624154496c455361674556 integ-alg sha-512-256 integ-key 764b6f47715367676a4f4151457769426a5251584e445365765857704f7741786145706b575857456b4a4f5848676e7076425870504c786f575175666843436c esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-2t1c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 42495352526a68445455505241685544 integ-alg sha-512-256 integ-key 4a71776c527a4778594d4d50476a634a4c545a724174416f59466758486567705475667952574257714b46766b6f574d794543786b59495250427044716d6274 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 42495352526a68445455505241685544 integ-alg sha-512-256 integ-key 4a71776c527a4778594d4d50476a634a4c545a724174416f59466758486567705475667952574257714b46766b6f574d794543786b59495250427044716d6274 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 704676664c7a4f624d42506b746e504c integ-alg sha-512-256 integ-key 57517472414f6e63646c4e494b4d46476e5466784b4e636f66724c4a71476a79446171646f794a4876526e63616268456141414b6973764f544a624964435841 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 704676664c7a4f624d42506b746e504c integ-alg sha-512-256 integ-key 57517472414f6e63646c4e494b4d46476e5466784b4e636f66724c4a71476a79446171646f794a4876526e63616268456141414b6973764f544a624964435841 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 705562554e5853767557534248526377 integ-alg sha-512-256 integ-key 4d7572624b55736b434c62646b4f56697154586a44426f4a4f494d7363444c6d5976546e654d4f434f72426169727275426c59544f61524a524a6f636f72744f esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 705562554e5853767557534248526377 integ-alg sha-512-256 integ-key 4d7572624b55736b434c62646b4f56697154586a44426f4a4f494d7363444c6d5976546e654d4f434f72426169727275426c59544f61524a524a6f636f72744f esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 56496e505a6d47514644566b4a457045 integ-alg sha-512-256 integ-key 4f777a754779455259784d6e4161774a6e77555145667565566e4871626b4e4263485a6c544175704e47566750617a5270654a7345446f7551624d5147796f6c esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 56496e505a6d47514644566b4a457045 integ-alg sha-512-256 integ-key 4f777a754779455259784d6e4161774a6e77555145667565566e4871626b4e4263485a6c544175704e47566750617a5270654a7345446f7551624d5147796f6c esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 6a6155757155486d6151517868626c75 integ-alg sha-512-256 integ-key 67665364756761796b474e416f77657870715776516e46647a4f48454354475073566c557a58446954454c7648796e5746426f53487550417a44766e6c6b7677 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 6a6155757155486d6151517868626c75 integ-alg sha-512-256 integ-key 67665364756761796b474e416f77657870715776516e46647a4f48454354475073566c557a58446954454c7648796e5746426f53487550417a44766e6c6b7677 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 475674776255745475446d6f53445750 integ-alg sha-512-256 integ-key 695178557a4e7369686e56766b6378747967694c546679536c734875756a575952477a466277425749744f595678795554586a6b677268535652756445725070 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 475674776255745475446d6f53445750 integ-alg sha-512-256 integ-key 695178557a4e7369686e56766b6378747967694c546679536c734875756a575952477a466277425749744f595678795554586a6b677268535652756445725070 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 68416a6f6b4a64584954714d74787542 integ-alg sha-512-256 integ-key 796e6179415773415156504c4a785147716c76664a6a747a7a515a6b746e4c62796256644b727775755359666e6a786f647a5942735145417068476f63517547 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 68416a6f6b4a64584954714d74787542 integ-alg sha-512-256 integ-key 796e6179415773415156504c4a785147716c76664a6a747a7a515a6b746e4c62796256644b727775755359666e6a786f647a5942735145417068476f63517547 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 4c6b575351485870546f647a55726366 integ-alg sha-512-256 integ-key 64567453664b46614f47707168587652675a724c466858626568724d535a4f7967515571657469756e416474704d414c65724667594957736a6e416147745079 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 4c6b575351485870546f647a55726366 integ-alg sha-512-256 integ-key 64567453664b46614f47707168587652675a724c466858626568724d535a4f7967515571657469756e416474704d414c65724667594957736a6e416147745079 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 544d7067617167764c4b6c4a79426b72 integ-alg sha-512-256 integ-key 70476f706b615478694a50486d78484c7647456844726a45705a75684b4d44464570534d765844424f44724d42624b624f48544342596b6b506b6553726d4b72 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 544d7067617167764c4b6c4a79426b72 integ-alg sha-512-256 integ-key 70476f706b615478694a50486d78484c7647456844726a45705a75684b4d44464570534d765844424f44724d42624b624f48544342596b6b506b6553726d4b72 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 65754d4b6b546f7756534b6b716e6963 integ-alg sha-512-256 integ-key 644349765148514e47636a5179464e57674a53485648764244424e68454d564e524f764b6e584d516f7369676e7673624372775a48576f46577361656d574373 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 65754d4b6b546f7756534b6b716e6963 integ-alg sha-512-256 integ-key 644349765148514e47636a5179464e57674a53485648764244424e68454d564e524f764b6e584d516f7369676e7673624372775a48576f46577361656d574373 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 514d68654a7a4e764557704951485a77 integ-alg sha-512-256 integ-key 4b7259744c5a5549734e6469794a664c567665784d766d4c746f59614e4875624761456f4575417a54485378767177535a666f51735646657346546b61674763 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 514d68654a7a4e764557704951485a77 integ-alg sha-512-256 integ-key 4b7259744c5a5549734e6469794a664c567665784d766d4c746f59614e4875624761456f4575417a54485378767177535a666f51735646657346546b61674763 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 4d484f637676535566757a4c696d4269 integ-alg sha-512-256 integ-key 67635478424a737a6668776e636f656b68555a48664e734c6465554679557655654f69576d437456417252415a66425a6d6c696c52475949456c72536f457641 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 4d484f637676535566757a4c696d4269 integ-alg sha-512-256 integ-key 67635478424a737a6668776e636f656b68555a48664e734c6465554679557655654f69576d437456417252415a66425a6d6c696c52475949456c72536f457641 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 687a5a76725a6d56674e7454526e5373 integ-alg sha-512-256 integ-key 49507278485362454152646155726e6144454941756958554e6463525944464d654f7762664d564a634579587a715957716174576c7a71775271594d73794653 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 687a5a76725a6d56674e7454526e5373 integ-alg sha-512-256 integ-key 49507278485362454152646155726e6144454941756958554e6463525944464d654f7762664d564a634579587a715957716174576c7a71775271594d73794653 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 61666a6c6c6c767041707271554b5845 integ-alg sha-512-256 integ-key 47504f786b7361447a784844414c596a53645546454170514d41764c784e7a4676454f4e4443744c537649494b6d69475859544543646145495547574a614262 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 61666a6c6c6c767041707271554b5845 integ-alg sha-512-256 integ-key 47504f786b7361447a784844414c596a53645546454170514d41764c784e7a4676454f4e4443744c537649494b6d69475859544543646145495547574a614262 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 7646486a4768686a4d4b4d784e6a414a integ-alg sha-512-256 integ-key 4c73776f6b4363774f484f614c667a774253486b5a416a714d4a4b59656e696b6b6378487063515562796b79774f4a6b625565786a4e426b4a49727241787669 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 7646486a4768686a4d4b4d784e6a414a integ-alg sha-512-256 integ-key 4c73776f6b4363774f484f614c667a774253486b5a416a714d4a4b59656e696b6b6378487063515562796b79774f4a6b625565786a4e426b4a49727241787669 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 4472775665635775414949544c706243 integ-alg sha-512-256 integ-key 6e6f456e41616b6d4374624474715a6144747a49696d676a5a684a72626d6a6b44434150707541734d627a5a5572537364714d72645876695a594d5870534163 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 4472775665635775414949544c706243 integ-alg sha-512-256 integ-key 6e6f456e41616b6d4374624474715a6144747a49696d676a5a684a72626d6a6b44434150707541734d627a5a5572537364714d72645876695a594d5870534163 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 656c666f44777952554767746a586543 integ-alg sha-512-256 integ-key 79574a4459504379614a4f4a755648565a6a52774b6152694c5856504541544274654673446859544f56694f616955556d6d57496c52486b7a57517452545062 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 656c666f44777952554767746a586543 integ-alg sha-512-256 integ-key 79574a4459504379614a4f4a755648565a6a52774b6152694c5856504541544274654673446859544f56694f616955556d6d57496c52486b7a57517452545062 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 615341786143627151745177424a7666 integ-alg sha-512-256 integ-key 5a706f564e5255674d664451467177465a72676b44715647614475675a4466476c4b4a73566e474b554d6858494449526f59776f76534c4d6c4e4670457a5361 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 615341786143627151745177424a7666 integ-alg sha-512-256 integ-key 5a706f564e5255674d664451467177465a72676b44715647614475675a4466476c4b4a73566e474b554d6858494449526f59776f76534c4d6c4e4670457a5361 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 7a4b616f6a6e59696953634571585068 integ-alg sha-512-256 integ-key 645a6841464d695853586c547455427352716c517052546f4250575548547348614d68585847746950514e6f7974554a4a4d674645554b746e5058664d745677 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 7a4b616f6a6e59696953634571585068 integ-alg sha-512-256 integ-key 645a6841464d695853586c547455427352716c517052546f4250575548547348614d68585847746950514e6f7974554a4a4d674645554b746e5058664d745677 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 4e664a524b6f4247764154475063756e integ-alg sha-512-256 integ-key 6261697665425958454343434d6f747073524264455542426a6c417851514e745647555a594f44577645677045576d52796b796542584e626145534c6c657869 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 4e664a524b6f4247764154475063756e integ-alg sha-512-256 integ-key 6261697665425958454343434d6f747073524264455542426a6c417851514e745647555a594f44577645677045576d52796b796542584e626145534c6c657869 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 49546f534c4f4a46554f667a4b726e75 integ-alg sha-512-256 integ-key 4c5376536c54527644506253724253497044757a6b63787977597449535a4e7a417776624b5655524c68706d5157487a4a4c745559736d754a6846576a564955 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 49546f534c4f4a46554f667a4b726e75 integ-alg sha-512-256 integ-key 4c5376536c54527644506253724253497044757a6b63787977597449535a4e7a417776624b5655524c68706d5157487a4a4c745559736d754a6846576a564955 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 4f5a735a4758454269654649544f6861 integ-alg sha-512-256 integ-key 62684d4f4d6e577353564e427061557776704c6a4978496d797362424f727a64736e4165776269785156476157486575716a6a68626a6e76454b706b79765044 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 4f5a735a4758454269654649544f6861 integ-alg sha-512-256 integ-key 62684d4f4d6e577353564e427061557776704c6a4978496d797362424f727a64736e4165776269785156476157486575716a6a68626a6e76454b706b79765044 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 4b48565958506271566776564c6d5578 integ-alg sha-512-256 integ-key 71556b665978556f48444647757077527756645571774b76486667646157624f63774b6e7a6b676c786c6e774f7279417075736768425962576d794447447348 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 4b48565958506271566776564c6d5578 integ-alg sha-512-256 integ-key 71556b665978556f48444647757077527756645571774b76486667646157624f63774b6e7a6b676c786c6e774f7279417075736768425962576d794447447348 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 6b6d6478634543676157727244457371 integ-alg sha-512-256 integ-key 656e59437a6a56654d52676e4c4261454e45584c794f724b43564546494e7761774a70496b444f4d47594d6f4c484c6e4d776361637a7a68466e454841416866 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 6b6d6478634543676157727244457371 integ-alg sha-512-256 integ-key 656e59437a6a56654d52676e4c4261454e45584c794f724b43564546494e7761774a70496b444f4d47594d6f4c484c6e4d776361637a7a68466e454841416866 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 49656c587a7a5469645a44486c467479 integ-alg sha-512-256 integ-key 4e63726849516f597446527a56634c6775474a446a47766a6c5641584251704a6562434b6b6c71767175495453476166686d6a71576867736d4245766b767063 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 49656c587a7a5469645a44486c467479 integ-alg sha-512-256 integ-key 4e63726849516f597446527a56634c6775474a446a47766a6c5641584251704a6562434b6b6c71767175495453476166686d6a71576867736d4245766b767063 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 505074674b417357746452596842726d integ-alg sha-512-256 integ-key 704d6e465955554c6c4c4c4a436a4349557168435a7554574f48694c674c62746a4b4b477a74664c74584a65434d787744726a67687059776159674969534c47 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 505074674b417357746452596842726d integ-alg sha-512-256 integ-key 704d6e465955554c6c4c4c4a436a4349557168435a7554574f48694c674c62746a4b4b477a74664c74584a65434d787744726a67687059776159674969534c47 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 4a6b527568574c6457786c7557594365 integ-alg sha-512-256 integ-key 4e4157676f4e6f61564a5843736753506a77537a65596a636841657966754e7955414b7a6246494157617a537151417569624b4b70734b5074514d726c706662 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 4a6b527568574c6457786c7557594365 integ-alg sha-512-256 integ-key 4e4157676f4e6f61564a5843736753506a77537a65596a636841657966754e7955414b7a6246494157617a537151417569624b4b70734b5074514d726c706662 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 614b705673646a57434d684a49577255 integ-alg sha-512-256 integ-key 6c61586d775979446c70514d6645484442694f56424d5353724f64705042546663646453584e76586f61447943745a69617050585453487672546b636a595256 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 614b705673646a57434d684a49577255 integ-alg sha-512-256 integ-key 6c61586d775979446c70514d6645484442694f56424d5353724f64705042546663646453584e76586f61447943745a69617050585453487672546b636a595256 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 59654f784a5468427349574159664571 integ-alg sha-512-256 integ-key 4653545144446e59676b50624943796a4b5a4a446b5a6774784e696b78576a6d6e644944416174614c6d4f447357707370627258526364554e546e647564485a esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 59654f784a5468427349574159664571 integ-alg sha-512-256 integ-key 4653545144446e59676b50624943796a4b5a4a446b5a6774784e696b78576a6d6e644944416174614c6d4f447357707370627258526364554e546e647564485a esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 4d72535545766b4c5679464c6e474964 integ-alg sha-512-256 integ-key 6c495a5a4f616779536a57436374767144414158664f7279415a414e455953464e4c6c437177634b4e62466e4f505962624451526c59574a7553767a51764363 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 4d72535545766b4c5679464c6e474964 integ-alg sha-512-256 integ-key 6c495a5a4f616779536a57436374767144414158664f7279415a414e455953464e4c6c437177634b4e62466e4f505962624451526c59574a7553767a51764363 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 664541494b414d756846676c716d7a55 integ-alg sha-512-256 integ-key 524a76756d57464b6b584a63697378775069464c717a78726454546b786e6f704e63637443765755544e6e6277736742474b586c774c5056617362464f657948 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 664541494b414d756846676c716d7a55 integ-alg sha-512-256 integ-key 524a76756d57464b6b584a63697378775069464c717a78726454546b786e6f704e63637443765755544e6e6277736742474b586c774c5056617362464f657948 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 4965446d6b7a74416d414c4941644650 integ-alg sha-512-256 integ-key 45716d6e4c61417667616e634e526770534f6a794864446143764f4c624a695261727373544a4b73436d4c534c6d4a514b7a4e614a42527361647a6c6b626e4a esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 4965446d6b7a74416d414c4941644650 integ-alg sha-512-256 integ-key 45716d6e4c61417667616e634e526770534f6a794864446143764f4c624a695261727373544a4b73436d4c534c6d4a514b7a4e614a42527361647a6c6b626e4a esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 6274617071634753494e46467169576e integ-alg sha-512-256 integ-key 53467952746c5a796d6a447a597757517a46764d6f4e4c696a736d65697a574e595650444d5a77656a7441746d5a4b455a62707873686b54747979675248436f esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 6274617071634753494e46467169576e integ-alg sha-512-256 integ-key 53467952746c5a796d6a447a597757517a46764d6f4e4c696a736d65697a574e595650444d5a77656a7441746d5a4b455a62707873686b54747979675248436f esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 515573666676526d6a546b6f576b4e68 integ-alg sha-512-256 integ-key 5747466865454955666f5a7665445648484b7a7a57796f757759565a7478756a744a7658536e5949486d655a66474e6f51636f68456d61567855454f4c765847 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 515573666676526d6a546b6f576b4e68 integ-alg sha-512-256 integ-key 5747466865454955666f5a7665445648484b7a7a57796f757759565a7478756a744a7658536e5949486d655a66474e6f51636f68456d61567855454f4c765847 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 4e504b4a4d4d504b514755724c6f4659 integ-alg sha-512-256 integ-key 4a4d6466494c5855747049576466614b754a596f556e654a655565766f53484961694a784359715144744b534b6541777462725263496370736f485968484747 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 4e504b4a4d4d504b514755724c6f4659 integ-alg sha-512-256 integ-key 4a4d6466494c5855747049576466614b754a596f556e654a655565766f53484961694a784359715144744b534b6541777462725263496370736f485968484747 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 66707a466c6d5779677a4c516a475549 integ-alg sha-512-256 integ-key 66475a7963577341627a597066556c68656d547753616d4678714a4941766367726949694b6c484a466e4f4c5165425a565855704e44744245654e58464f7542 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 66707a466c6d5779677a4c516a475549 integ-alg sha-512-256 integ-key 66475a7963577341627a597066556c68656d547753616d4678714a4941766367726949694b6c484a466e4f4c5165425a565855704e44744245654e58464f7542 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 716a5a69446e6c6d6d4457786e637749 integ-alg sha-512-256 integ-key 485a4f6473704b5945695a49474b7449437951614854414e6e4c77784b4653576b426547775466674a6e4f4f6a4c7a6d7a6c426d447369414d4a6d467968674f esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 716a5a69446e6c6d6d4457786e637749 integ-alg sha-512-256 integ-key 485a4f6473704b5945695a49474b7449437951614854414e6e4c77784b4653576b426547775466674a6e4f4f6a4c7a6d7a6c426d447369414d4a6d467968674f esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 677168674455454a637268735254584e integ-alg sha-512-256 integ-key 6167534f554b4779784e56696c6e5a5176517442474f555361554672774452716177506f624c4e77626c537657557953707371644d7851626857684f5949524b esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 677168674455454a637268735254584e integ-alg sha-512-256 integ-key 6167534f554b4779784e56696c6e5a5176517442474f555361554672774452716177506f624c4e77626c537657557953707371644d7851626857684f5949524b esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 56784a536a62454e4255756a61734f69 integ-alg sha-512-256 integ-key 6a766a4c504469646d507a6e7a68716e76474d444942467a6f63764e4e544b48656b506b68706f4f624579564b4963614a626871486879506d4f76744f53424b esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 56784a536a62454e4255756a61734f69 integ-alg sha-512-256 integ-key 6a766a4c504469646d507a6e7a68716e76474d444942467a6f63764e4e544b48656b506b68706f4f624579564b4963614a626871486879506d4f76744f53424b esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 456a6865634d6c7568567a6c63774f63 integ-alg sha-512-256 integ-key 714b466a437254586a6b4e526a495752474c7367414a787370494a6e436b586e4870645670455a4a4a6b7355686e4271596270767469594d6e666f676b704e47 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 456a6865634d6c7568567a6c63774f63 integ-alg sha-512-256 integ-key 714b466a437254586a6b4e526a495752474c7367414a787370494a6e436b586e4870645670455a4a4a6b7355686e4271596270767469594d6e666f676b704e47 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-4t2c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 714a58446852676373434b73524a7151 integ-alg sha-512-256 integ-key 50765943796e4f6d777569646b506f73534c4653466a43476b794671427958624264484a4368426f58715a776762614c594a704f796d59785a705a654179686f esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 714a58446852676373434b73524a7151 integ-alg sha-512-256 integ-key 50765943796e4f6d777569646b506f73534c4653466a43476b794671427958624264484a4368426f58715a776762614c594a704f796d59785a705a654179686f esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 63514953694a467758644d684d6c4778 integ-alg sha-512-256 integ-key 77776951504c636e687a6e754e7855646f5575764d5672596c664149736e4e486177685a46726f784d4f6f417341677472516b5278756d6362476b794959696f esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 63514953694a467758644d684d6c4778 integ-alg sha-512-256 integ-key 77776951504c636e687a6e754e7855646f5575764d5672596c664149736e4e486177685a46726f784d4f6f417341677472516b5278756d6362476b794959696f esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 776f544b5445566d767148784f765547 integ-alg sha-512-256 integ-key 4d4657787650617565534157536f656e534453634e755a614e46554c72697a6a505076774644575768474f4578454c497178644846504e63436b654c654f7a4f esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 776f544b5445566d767148784f765547 integ-alg sha-512-256 integ-key 4d4657787650617565534157536f656e534453634e755a614e46554c72697a6a505076774644575768474f4578454c497178644846504e63436b654c654f7a4f esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 614578654a4f7247534d6c416a52654d integ-alg sha-512-256 integ-key 69636c6b474d79634243774a496d48486a544b706e4b6372757458676b6851437a7342774b61656d6e4a50495071594f774f5a69697648496c4f4a4c424f546c esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 614578654a4f7247534d6c416a52654d integ-alg sha-512-256 integ-key 69636c6b474d79634243774a496d48486a544b706e4b6372757458676b6851437a7342774b61656d6e4a50495071594f774f5a69697648496c4f4a4c424f546c esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 50754d79484168484a694772786f5359 integ-alg sha-512-256 integ-key 4d6d4851695743636f6a416658547569417943674355485778524944526155415362594d686c636466536157754d4d4a49447a6b61616157434f4e4746634b65 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 50754d79484168484a694772786f5359 integ-alg sha-512-256 integ-key 4d6d4851695743636f6a416658547569417943674355485778524944526155415362594d686c636466536157754d4d4a49447a6b61616157434f4e4746634b65 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 6b4e75756e4a716d4a44474d61694453 integ-alg sha-512-256 integ-key 644659466a416a626b7a746c4478657a7a67557350476f5750717675485a57716954544667787479535461566861585557705a4d456c744570706f4b64536766 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 6b4e75756e4a716d4a44474d61694453 integ-alg sha-512-256 integ-key 644659466a416a626b7a746c4478657a7a67557350476f5750717675485a57716954544667787479535461566861585557705a4d456c744570706f4b64536766 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 4266436e586b435756707a7a7a70507a integ-alg sha-512-256 integ-key 554b567173474767734e6a706e666b4c786f426f4b6852696a48454f4e7a524e526f4d7a53457742784443716f64437373725578517a55434867484b4e637546 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 4266436e586b435756707a7a7a70507a integ-alg sha-512-256 integ-key 554b567173474767734e6a706e666b4c786f426f4b6852696a48454f4e7a524e526f4d7a53457742784443716f64437373725578517a55434867484b4e637546 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 797042595777585374734f48486e4c66 integ-alg sha-512-256 integ-key 496e53445044756e64724f6e547145625a6f797866426a4d4a46464b46676c6a6e5258514b49424761764d6f5555696b49705a56496d6b6c47666f7358796253 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 797042595777585374734f48486e4c66 integ-alg sha-512-256 integ-key 496e53445044756e64724f6e547145625a6f797866426a4d4a46464b46676c6a6e5258514b49424761764d6f5555696b49705a56496d6b6c47666f7358796253 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 5644656d554948585a4171674a765463 integ-alg sha-512-256 integ-key 47797343476174446c52574b4e7263536e5a507753434d68794f5254504652436f61546c477941696f42526e6c51475a46566a715553737453786c6b41776752 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 5644656d554948585a4171674a765463 integ-alg sha-512-256 integ-key 47797343476174446c52574b4e7263536e5a507753434d68794f5254504652436f61546c477941696f42526e6c51475a46566a715553737453786c6b41776752 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 507567544f435a4468754f6943495263 integ-alg sha-512-256 integ-key 7268466c6b76477944486b434c655873745a584a63446c787641657859654d74624f4e7462796341476957536c42565a6d736b4b6a63456e694555777465534e esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 507567544f435a4468754f6943495263 integ-alg sha-512-256 integ-key 7268466c6b76477944486b434c655873745a584a63446c787641657859654d74624f4e7462796341476957536c42565a6d736b4b6a63456e694555777465534e esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 706b4a4c4c4b636c7a79704c6145747a integ-alg sha-512-256 integ-key 7354544d69484b72474f6270416f74436264566572494b4f6b784a734661765445526f6e4c6c69436e4461506f6456524a767374656d65454c4a584244457354 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 706b4a4c4c4b636c7a79704c6145747a integ-alg sha-512-256 integ-key 7354544d69484b72474f6270416f74436264566572494b4f6b784a734661765445526f6e4c6c69436e4461506f6456524a767374656d65454c4a584244457354 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 7164636848564b4c5271527776636154 integ-alg sha-512-256 integ-key 6e4c49425a506f727948534c4b424a71527557766d5a7765574b504d715974427959625a774b4a74657a6a59674d4257534c6352464c577371424c5275495371 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 7164636848564b4c5271527776636154 integ-alg sha-512-256 integ-key 6e4c49425a506f727948534c4b424a71527557766d5a7765574b504d715974427959625a774b4a74657a6a59674d4257534c6352464c577371424c5275495371 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 71555757574d5141575157747a6f7072 integ-alg sha-512-256 integ-key 626f696945517177494d786f684b72486149456a546a50584373777a78585863456c457a4d46697a567077436b54617759674b7a5667476272564b71624e5973 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 71555757574d5141575157747a6f7072 integ-alg sha-512-256 integ-key 626f696945517177494d786f684b72486149456a546a50584373777a78585863456c457a4d46697a567077436b54617759674b7a5667476272564b71624e5973 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 49576e474f44667762716f4c6e545474 integ-alg sha-512-256 integ-key 6f65505667486d4d76525769686558615468544d514c7a6e49625646557a42766459564547644272775a445458516367686462594d4c595447577a7375504777 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 49576e474f44667762716f4c6e545474 integ-alg sha-512-256 integ-key 6f65505667486d4d76525769686558615468544d514c7a6e49625646557a42766459564547644272775a445458516367686462594d4c595447577a7375504777 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 586a7154575468506474536a6a764e6d integ-alg sha-512-256 integ-key 4850416e666f4b44714369544e6275694f7275656b6b62474448626968786d655149545677756876496175506f4e5a4f6b6c44484f634d674761696861585246 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 586a7154575468506474536a6a764e6d integ-alg sha-512-256 integ-key 4850416e666f4b44714369544e6275694f7275656b6b62474448626968786d655149545677756876496175506f4e5a4f6b6c44484f634d674761696861585246 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 54484e784d6546436655784e66576f63 integ-alg sha-512-256 integ-key 626d5859794e4849506b697372626848784b6f526b767655754b4b7a436454644d42486b7079425476445344667355535041764b54506e6242614c6a5a676477 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 54484e784d6546436655784e66576f63 integ-alg sha-512-256 integ-key 626d5859794e4849506b697372626848784b6f526b767655754b4b7a436454644d42486b7079425476445344667355535041764b54506e6242614c6a5a676477 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 5169776470616f6d626a66474a564c41 integ-alg sha-512-256 integ-key 4c4f684c7171537070766a7341516858544d4d6b5547784271705747744c6f54536670776c4b6944597876566361526b745045456153696d724568694d486767 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 5169776470616f6d626a66474a564c41 integ-alg sha-512-256 integ-key 4c4f684c7171537070766a7341516858544d4d6b5547784271705747744c6f54536670776c4b6944597876566361526b745045456153696d724568694d486767 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 534d624a6a68445a6d576c48717a556c integ-alg sha-512-256 integ-key 4d5672545178514556724c70446a4f48797157627265676d434f5773696367485a787a48734a526668616371597851636f676b4e66437a45704e5854786f636b esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 534d624a6a68445a6d576c48717a556c integ-alg sha-512-256 integ-key 4d5672545178514556724c70446a4f48797157627265676d434f5773696367485a787a48734a526668616371597851636f676b4e66437a45704e5854786f636b esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 55464e4e6a575a62626d7a666b434b52 integ-alg sha-512-256 integ-key 6a426e4556496b4a65707355516d72494666545a73544f6742716b4c4374694c6f6757564846526b49667974757a53496475504d796a6675656c734f424d6f4d esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 55464e4e6a575a62626d7a666b434b52 integ-alg sha-512-256 integ-key 6a426e4556496b4a65707355516d72494666545a73544f6742716b4c4374694c6f6757564846526b49667974757a53496475504d796a6675656c734f424d6f4d esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 6b78587970506243514c63796e537974 integ-alg sha-512-256 integ-key 4f5764564c5a78546a4d757972597648546b44484942646a4f6e415551776c74726e6c72455170434b4f6d5474734c6a4758557649636a6752616b735267544a esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 6b78587970506243514c63796e537974 integ-alg sha-512-256 integ-key 4f5764564c5a78546a4d757972597648546b44484942646a4f6e415551776c74726e6c72455170434b4f6d5474734c6a4758557649636a6752616b735267544a esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 734f6e5971446d4d4d45526d76636448 integ-alg sha-512-256 integ-key 6a716750786f6459666d54586a796c79414d68436b654761626a734e566c74634c6553444c7559624f656c6e6e7a7161444c77504e764b4d52517a425541716f esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 734f6e5971446d4d4d45526d76636448 integ-alg sha-512-256 integ-key 6a716750786f6459666d54586a796c79414d68436b654761626a734e566c74634c6553444c7559624f656c6e6e7a7161444c77504e764b4d52517a425541716f esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 51624c704b686d6a544748616666465a integ-alg sha-512-256 integ-key 426a4163554f705572414a53456168487a546f4d575159726d6f6b776f59574d634b586274777273444865444b4d4d6f596847636e736c7674634743447a4361 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 51624c704b686d6a544748616666465a integ-alg sha-512-256 integ-key 426a4163554f705572414a53456168487a546f4d575159726d6f6b776f59574d634b586274777273444865444b4d4d6f596847636e736c7674634743447a4361 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 70775977654d45615852774769727172 integ-alg sha-512-256 integ-key 546c6e477848584f674f6c6f46475866577176507168496a567a7846414a776b4e4a59787545536e426c6754716248504c646d4f42716d624f4e485161724149 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 70775977654d45615852774769727172 integ-alg sha-512-256 integ-key 546c6e477848584f674f6c6f46475866577176507168496a567a7846414a776b4e4a59787545536e426c6754716248504c646d4f42716d624f4e485161724149 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 4f75576e6d5150466550467a624e7779 integ-alg sha-512-256 integ-key 66474d47526256435071786a504d4c6a6257655671566c524c6d55756a4567566d4b7447736e6b567268596d4677536e414e74625745506d5868504f55784a67 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 4f75576e6d5150466550467a624e7779 integ-alg sha-512-256 integ-key 66474d47526256435071786a504d4c6a6257655671566c524c6d55756a4567566d4b7447736e6b567268596d4677536e414e74625745506d5868504f55784a67 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 6f72556769567765474b6f7347437965 integ-alg sha-512-256 integ-key 664c52564243436e756a4b5368684c574b656c6c486877496272416561617647636b50644270506e7a534a4c634c55476b646d6e6761634d59535a424b77656b esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 6f72556769567765474b6f7347437965 integ-alg sha-512-256 integ-key 664c52564243436e756a4b5368684c574b656c6c486877496272416561617647636b50644270506e7a534a4c634c55476b646d6e6761634d59535a424b77656b esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 564d73426f62716e4a61706b43565047 integ-alg sha-512-256 integ-key 6355664a45656d526957506452494d7741774e7061795578774968526e4b466e4c5a727057704c7461426241414276566d64546643654856764a786d7a474d6d esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 564d73426f62716e4a61706b43565047 integ-alg sha-512-256 integ-key 6355664a45656d526957506452494d7741774e7061795578774968526e4b466e4c5a727057704c7461426241414276566d64546643654856764a786d7a474d6d esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 50655661594d6f4376486e6a59684a44 integ-alg sha-512-256 integ-key 51564151504b48634f59475051464f63706e6875676d7079544a46716b716b44775a5a56485379747378784d4275797a59466e476c4f4f6e4f5244436c6e6b7a esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 50655661594d6f4376486e6a59684a44 integ-alg sha-512-256 integ-key 51564151504b48634f59475051464f63706e6875676d7079544a46716b716b44775a5a56485379747378784d4275797a59466e476c4f4f6e4f5244436c6e6b7a esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 504a43756a53564c53715a4f6a696852 integ-alg sha-512-256 integ-key 7a716b665164726f454875646d6f7445456f666a767a5356534f796d714d6350594f647377686f6e6d76546c4f6b516d4155554678665654726661746748526a esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 504a43756a53564c53715a4f6a696852 integ-alg sha-512-256 integ-key 7a716b665164726f454875646d6f7445456f666a767a5356534f796d714d6350594f647377686f6e6d76546c4f6b516d4155554678665654726661746748526a esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 636d78544567524d4c796e7a664e536e integ-alg sha-512-256 integ-key 62585177576a70706f6553555464587748796c4254706e4a68597962597a5152637153727067474b516f6e4246586a794e797a6a734a706144736d57774d7465 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 636d78544567524d4c796e7a664e536e integ-alg sha-512-256 integ-key 62585177576a70706f6553555464587748796c4254706e4a68597962597a5152637153727067474b516f6e4246586a794e797a6a734a706144736d57774d7465 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 716565704861696f6a4f53504d574c42 integ-alg sha-512-256 integ-key 706d51484d4d61445948746d57536a4b474f49724244437943556563625a5752466f69634250526e416353436f43494b4844746951745a66514a67486c656249 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 716565704861696f6a4f53504d574c42 integ-alg sha-512-256 integ-key 706d51484d4d61445948746d57536a4b474f49724244437943556563625a5752466f69634250526e416353436f43494b4844746951745a66514a67486c656249 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 734753614578506d4f474b6745417257 integ-alg sha-512-256 integ-key 4b5a62436a614d6f517a646c666268547578696c4473534f4f446462787263795a666766586671796f596f676672596865594a58696b4f414b4244626e7a7465 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 734753614578506d4f474b6745417257 integ-alg sha-512-256 integ-key 4b5a62436a614d6f517a646c666268547578696c4473534f4f446462787263795a666766586671796f596f676672596865594a58696b4f414b4244626e7a7465 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 53544c4b6846434f736b774642686e75 integ-alg sha-512-256 integ-key 684a71586d63476e4c504b6b7544544e6c51484e534f6a6755734278666d776e76674c67737272466b637566714371687642526b4467447368417a6c7a597a4f esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 53544c4b6846434f736b774642686e75 integ-alg sha-512-256 integ-key 684a71586d63476e4c504b6b7544544e6c51484e534f6a6755734278666d776e76674c67737272466b637566714371687642526b4467447368417a6c7a597a4f esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 524d7a764466574a596e734b726e486f integ-alg sha-512-256 integ-key 48594e4877586c6a7450514a4269674762585057687461616d4e48747051764d78466a4946476c51705a73665a744f7661626f4762475070695a4e63454f5348 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 524d7a764466574a596e734b726e486f integ-alg sha-512-256 integ-key 48594e4877586c6a7450514a4269674762585057687461616d4e48747051764d78466a4946476c51705a73665a744f7661626f4762475070695a4e63454f5348 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 64444b58737a4951474547786e447546 integ-alg sha-512-256 integ-key 4b55545943424d534e4249727347507046576663795249614f41725755574876444b587548615a72674b55635a706c764a49496a50714562464a504150685048 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 64444b58737a4951474547786e447546 integ-alg sha-512-256 integ-key 4b55545943424d534e4249727347507046576663795249614f41725755574876444b587548615a72674b55635a706c764a49496a50714562464a504150685048 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 62717256546461414b547a4464634766 integ-alg sha-512-256 integ-key 6a6c5a48475266586f494a576844715a507749775242757058476761664f4345456f4f4a444c734f447744444c674e59676d4b71484862547673687a4a575a45 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 62717256546461414b547a4464634766 integ-alg sha-512-256 integ-key 6a6c5a48475266586f494a576844715a507749775242757058476761664f4345456f4f4a444c734f447744444c674e59676d4b71484862547673687a4a575a45 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 4c53764b527170636e70486e6e416e4f integ-alg sha-512-256 integ-key 476c5668486769615272567161714e4b6d6953797157724e444169657a7a676d4b657843614179794d42486c684f5a7464766e746f7648786b67664468554441 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 4c53764b527170636e70486e6e416e4f integ-alg sha-512-256 integ-key 476c5668486769615272567161714e4b6d6953797157724e444169657a7a676d4b657843614179794d42486c684f5a7464766e746f7648786b67664468554441 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 716c70756263546342656f6b776a6a64 integ-alg sha-512-256 integ-key 6353575a55576d6b52506d594b4d645059647654534a626e5068454d6178457a6859774b6267735161614f465478745845677a7649477158617a716255474c45 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 716c70756263546342656f6b776a6a64 integ-alg sha-512-256 integ-key 6353575a55576d6b52506d594b4d645059647654534a626e5068454d6178457a6859774b6267735161614f465478745845677a7649477158617a716255474c45 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 6d47767a464e556f55566c6f50565361 integ-alg sha-512-256 integ-key 4e7673627968724551447178485358636d44737955644a4c6551476d7a7746597865665045485845436358766a737a6b715571436b41564c5158417845497857 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 6d47767a464e556f55566c6f50565361 integ-alg sha-512-256 integ-key 4e7673627968724551447178485358636d44737955644a4c6551476d7a7746597865665045485845436358766a737a6b715571436b41564c5158417845497857 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 594848664e45486f476e437771657055 integ-alg sha-512-256 integ-key 6d7353656f7347445a725371424f787a4a7744516c6d45634d6d5a61566a4a636d51554e7872455563697564754d50616873724778557058686a67634e486777 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 594848664e45486f476e437771657055 integ-alg sha-512-256 integ-key 6d7353656f7347445a725371424f787a4a7744516c6d45634d6d5a61566a4a636d51554e7872455563697564754d50616873724778557058686a67634e486777 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 635048466b50684a45664b7359514176 integ-alg sha-512-256 integ-key 457277494e6e6275766d4772576e69414873455870464d586849627a7a4875504b78454d736b795a7a61677666695878684f6c7947505576454a4c5666574a59 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 635048466b50684a45664b7359514176 integ-alg sha-512-256 integ-key 457277494e6e6275766d4772576e69414873455870464d586849627a7a4875504b78454d736b795a7a61677666695878684f6c7947505576454a4c5666574a59 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-8t4c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-cbc-128 crypto-key 576d4e5945654d465759724875666976 integ-alg sha-512-256 integ-key 5a4a59564a5a7359777a64497a6a56777162645a516e50434d55656d4c49436c765a66486a6e6c444b6e4775584259747056494765715965427045766b485449 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-cbc-128 crypto-key 576d4e5945654d465759724875666976 integ-alg sha-512-256 integ-key 5a4a59564a5a7359777a64497a6a56777162645a516e50434d55656d4c49436c765a66486a6e6c444b6e4775584259747056494765715965427045766b485449 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-cbc-128 crypto-key 4c514461446d584850567a6c4a466c73 integ-alg sha-512-256 integ-key 46657662614447745a7274566f587a68496f4e6a535157446b4b52706e72644f4b4d5654785963636555414c48746874516846546152556a755054677a4e6f41 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-cbc-128 crypto-key 4c514461446d584850567a6c4a466c73 integ-alg sha-512-256 integ-key 46657662614447745a7274566f587a68496f4e6a535157446b4b52706e72644f4b4d5654785963636555414c48746874516846546152556a755054677a4e6f41 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-cbc-128 crypto-key 61724c56474d55775759727945466552 integ-alg sha-512-256 integ-key 586a6f6a42586967597453726549504e53714757654e56546155716f4a467a46454b714456616d49617474436747646f536d4f52794a51546b51594d74646461 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-cbc-128 crypto-key 61724c56474d55775759727945466552 integ-alg sha-512-256 integ-key 586a6f6a42586967597453726549504e53714757654e56546155716f4a467a46454b714456616d49617474436747646f536d4f52794a51546b51594d74646461 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-cbc-128 crypto-key 7673445a635376624b6a425343784f4e integ-alg sha-512-256 integ-key 737978505058435a504b4149564f76726c596a59684c566148546c6b476961776e64746762527066485a516f685855644f6577455768687276464a6a57616144 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-cbc-128 crypto-key 7673445a635376624b6a425343784f4e integ-alg sha-512-256 integ-key 737978505058435a504b4149564f76726c596a59684c566148546c6b476961776e64746762527066485a516f685855644f6577455768687276464a6a57616144 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-cbc-128 crypto-key 5976537268486c466743445964537644 integ-alg sha-512-256 integ-key 51517961644248677965647479674a5161706b5943737a4d7576585a6461756d54666e4e72697a586c554c76734759787458556341464b7846614b517471426f esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-cbc-128 crypto-key 5976537268486c466743445964537644 integ-alg sha-512-256 integ-key 51517961644248677965647479674a5161706b5943737a4d7576585a6461756d54666e4e72697a586c554c76734759787458556341464b7846614b517471426f esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-cbc-128 crypto-key 6a736162516e63655750427543745869 integ-alg sha-512-256 integ-key 555543466e4c61705a4c516c694a467a4e56724f6d746b474b5743614b474f644b535452797879676b4e4c776c5364676467526845786250757546576f514572 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-cbc-128 crypto-key 6a736162516e63655750427543745869 integ-alg sha-512-256 integ-key 555543466e4c61705a4c516c694a467a4e56724f6d746b474b5743614b474f644b535452797879676b4e4c776c5364676467526845786250757546576f514572 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-cbc-128 crypto-key 6e50457463466679416e6155574e6754 integ-alg sha-512-256 integ-key 68594350494e76464f494f664c5a79627159414172745458444e75434245697555536352447a5a4659755342506662594b527858766945747a7341634972736e esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-cbc-128 crypto-key 6e50457463466679416e6155574e6754 integ-alg sha-512-256 integ-key 68594350494e76464f494f664c5a79627159414172745458444e75434245697555536352447a5a4659755342506662594b527858766945747a7341634972736e esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-cbc-128 crypto-key 505a64524153724d4377517159757349 integ-alg sha-512-256 integ-key 62555359516678574f5a7a7653714a6d53756e7941426b516e755278794d706b5442645a71464453434c627a50514e4445475a427a4f4c494255756c75656571 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-cbc-128 crypto-key 505a64524153724d4377517159757349 integ-alg sha-512-256 integ-key 62555359516678574f5a7a7653714a6d53756e7941426b516e755278794d706b5442645a71464453434c627a50514e4445475a427a4f4c494255756c75656571 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-cbc-128 crypto-key 424258774c527a5755696959575a5971 integ-alg sha-512-256 integ-key 416d697a5351796c774355756d717453675268646c6e434d7755594a614f4363764852457561595063516141787a5364516f634744787178777553546a75556e esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-cbc-128 crypto-key 424258774c527a5755696959575a5971 integ-alg sha-512-256 integ-key 416d697a5351796c774355756d717453675268646c6e434d7755594a614f4363764852457561595063516141787a5364516f634744787178777553546a75556e esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-cbc-128 crypto-key 45796b574b7a59436f6245754d4d764d integ-alg sha-512-256 integ-key 6750444b4b724b54586b7961726a516570436d69426b59516c5053686a41764d657a6a4a5652594545504f54565953484c45666a51687a476461717873777343 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-cbc-128 crypto-key 45796b574b7a59436f6245754d4d764d integ-alg sha-512-256 integ-key 6750444b4b724b54586b7961726a516570436d69426b59516c5053686a41764d657a6a4a5652594545504f54565953484c45666a51687a476461717873777343 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-cbc-128 crypto-key 69796570696d475a75496962676c6843 integ-alg sha-512-256 integ-key 4c725974777775774876745a50416d76455a426b49494d78556576487966786e617177417857705a675a4d487961486f6c4d724377474a467159416146675341 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-cbc-128 crypto-key 69796570696d475a75496962676c6843 integ-alg sha-512-256 integ-key 4c725974777775774876745a50416d76455a426b49494d78556576487966786e617177417857705a675a4d487961486f6c4d724377474a467159416146675341 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-cbc-128 crypto-key 7475636a516f5658694a575041626269 integ-alg sha-512-256 integ-key 41477a4a4d5a59614d57697a4857554564554d4354704f635167684670667647757148675362454e664245416e6d7272556352704f73444a696d6b554675716b esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-cbc-128 crypto-key 7475636a516f5658694a575041626269 integ-alg sha-512-256 integ-key 41477a4a4d5a59614d57697a4857554564554d4354704f635167684670667647757148675362454e664245416e6d7272556352704f73444a696d6b554675716b esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-cbc-128 crypto-key 5554656d6370524d6c78566f4d546d41 integ-alg sha-512-256 integ-key 49574c6c706c7764654759765674717a7953696845466b55534d43656a694b786d586e786867566f5241474f794f716176476e68664b70786e7851616159786d esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-cbc-128 crypto-key 5554656d6370524d6c78566f4d546d41 integ-alg sha-512-256 integ-key 49574c6c706c7764654759765674717a7953696845466b55534d43656a694b786d586e786867566f5241474f794f716176476e68664b70786e7851616159786d esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-cbc-128 crypto-key 64656f41594646726179567a4e735673 integ-alg sha-512-256 integ-key 6746694a586a6c4b64564d417952447454506c674c67734650466d5545424c7449457942734e49454a4f6150414956546e72736e624f4970624e77566b515261 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-cbc-128 crypto-key 64656f41594646726179567a4e735673 integ-alg sha-512-256 integ-key 6746694a586a6c4b64564d417952447454506c674c67734650466d5545424c7449457942734e49454a4f6150414956546e72736e624f4970624e77566b515261 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-cbc-128 crypto-key 5a725861524568726e65664655775151 integ-alg sha-512-256 integ-key 4c626d47734348744c704d7077444150636155696a4c796e6f4d6656534567446f6c48544f5578495669637268554576776b744c43465459674f477152656277 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-cbc-128 crypto-key 5a725861524568726e65664655775151 integ-alg sha-512-256 integ-key 4c626d47734348744c704d7077444150636155696a4c796e6f4d6656534567446f6c48544f5578495669637268554576776b744c43465459674f477152656277 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-cbc-128 crypto-key 695178436f7263577a6c744d646c6256 integ-alg sha-512-256 integ-key 626b4d45516f644e655a6c4f716d6c576257505a4e704f56726e4a4f4b6e6e766164436a734e576873575979584770526c796b6f544e65424c4a494243536670 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-cbc-128 crypto-key 695178436f7263577a6c744d646c6256 integ-alg sha-512-256 integ-key 626b4d45516f644e655a6c4f716d6c576257505a4e704f56726e4a4f4b6e6e766164436a734e576873575979584770526c796b6f544e65424c4a494243536670 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-cbc-128 crypto-key 4e48577646554b78695074636f754449 integ-alg sha-512-256 integ-key 6370484e4251744f47676b627077526962724f5247587763466942646b655469774f495551695872646a62614548536d59486a657a626d4e6a4b6d734c486f7a esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-cbc-128 crypto-key 4e48577646554b78695074636f754449 integ-alg sha-512-256 integ-key 6370484e4251744f47676b627077526962724f5247587763466942646b655469774f495551695872646a62614548536d59486a657a626d4e6a4b6d734c486f7a esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-cbc-128 crypto-key 4a6b595a6c79476a766c72786551664d integ-alg sha-512-256 integ-key 67714b4c434c515748624a4b785a427961536451435976475477557374624c6e686c69436e70684f4d414c575a747254596e57545a706f6b756a556c4e6a6353 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-cbc-128 crypto-key 4a6b595a6c79476a766c72786551664d integ-alg sha-512-256 integ-key 67714b4c434c515748624a4b785a427961536451435976475477557374624c6e686c69436e70684f4d414c575a747254596e57545a706f6b756a556c4e6a6353 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-cbc-128 crypto-key 6b736d4e7a4a5a535a736b73724b4b62 integ-alg sha-512-256 integ-key 55696243417755474d547a797876576662656e566d524a44517054417a754569784e6f77555a435a45536b5a4269614f7271426e786169474e7a46426a6b764c esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-cbc-128 crypto-key 6b736d4e7a4a5a535a736b73724b4b62 integ-alg sha-512-256 integ-key 55696243417755474d547a797876576662656e566d524a44517054417a754569784e6f77555a435a45536b5a4269614f7271426e786169474e7a46426a6b764c esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-cbc-128 crypto-key 526766766d6b7748516f734655446663 integ-alg sha-512-256 integ-key 5945794b4f5879504d4a4976624955726568634a486a6e7744465a414b4a444a6857616b6e524f634a6f4f71446c4d6d65557a4e696e576b65526555446c4e50 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-cbc-128 crypto-key 526766766d6b7748516f734655446663 integ-alg sha-512-256 integ-key 5945794b4f5879504d4a4976624955726568634a486a6e7744465a414b4a444a6857616b6e524f634a6f4f71446c4d6d65557a4e696e576b65526555446c4e50 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-cbc-128 crypto-key 6b71707248766c43456a506d786e5067 integ-alg sha-512-256 integ-key 4b615246427050697155576f5a6b724e726e4743765752736c6f50634454486a786161454d5471515a44526f5a6f686b7a6d797666716c536a73467967646f47 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-cbc-128 crypto-key 6b71707248766c43456a506d786e5067 integ-alg sha-512-256 integ-key 4b615246427050697155576f5a6b724e726e4743765752736c6f50634454486a786161454d5471515a44526f5a6f686b7a6d797666716c536a73467967646f47 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-cbc-128 crypto-key 7842724765614f77695265556f465a49 integ-alg sha-512-256 integ-key 5a45586e7444595a5972754c5674707a586c6a424d43766e797a7a5648784674495842746e4d416b6b6f75784e56474b794c50546f695847534d6e51664a6564 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-cbc-128 crypto-key 7842724765614f77695265556f465a49 integ-alg sha-512-256 integ-key 5a45586e7444595a5972754c5674707a586c6a424d43766e797a7a5648784674495842746e4d416b6b6f75784e56474b794c50546f695847534d6e51664a6564 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-cbc-128 crypto-key 5745496551436a5471585152594d6f55 integ-alg sha-512-256 integ-key 5a756d4d526a556877795a4361594a74676c764849656464427a624d5568414a43616a7751456c464271484b444973726d4871564b5a627045576f777477617a esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-cbc-128 crypto-key 5745496551436a5471585152594d6f55 integ-alg sha-512-256 integ-key 5a756d4d526a556877795a4361594a74676c764849656464427a624d5568414a43616a7751456c464271484b444973726d4871564b5a627045576f777477617a esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-cbc-128 crypto-key 6858644d595555464e68755255504146 integ-alg sha-512-256 integ-key 4b5256687a5678465357676a726c5967727648776855536146506f716b557152517251666f66474b507a557770775369686f776274795a4f77544d43776a556e esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-cbc-128 crypto-key 6858644d595555464e68755255504146 integ-alg sha-512-256 integ-key 4b5256687a5678465357676a726c5967727648776855536146506f716b557152517251666f66474b507a557770775369686f776274795a4f77544d43776a556e esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-cbc-128 crypto-key 696e4161586341634c524e6342777341 integ-alg sha-512-256 integ-key 4a6f706f6c6558744b7a46467a4f4663556961466c586c744c7245575a4770446574547551786367616366794f4d667672415a657871706d6d78597154774d4c esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-cbc-128 crypto-key 696e4161586341634c524e6342777341 integ-alg sha-512-256 integ-key 4a6f706f6c6558744b7a46467a4f4663556961466c586c744c7245575a4770446574547551786367616366794f4d667672415a657871706d6d78597154774d4c esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-cbc-128 crypto-key 4a556b5174716d49716e745847546548 integ-alg sha-512-256 integ-key 4a6d684a6f6a506658715759736d6656497857636d727659726f6b436775554a695a4f624e706f6a70664b68695059556d457944754c74425554756a75755462 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-cbc-128 crypto-key 4a556b5174716d49716e745847546548 integ-alg sha-512-256 integ-key 4a6d684a6f6a506658715759736d6656497857636d727659726f6b436775554a695a4f624e706f6a70664b68695059556d457944754c74425554756a75755462 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-cbc-128 crypto-key 41564a4b75494a68686a656d52537169 integ-alg sha-512-256 integ-key 5847647a74434f415a436e50775646664f4b706257715777434f4942486c42764a6164594e677a58447a64487a6351774a756a6270766b6549476b695053556f esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-cbc-128 crypto-key 41564a4b75494a68686a656d52537169 integ-alg sha-512-256 integ-key 5847647a74434f415a436e50775646664f4b706257715777434f4942486c42764a6164594e677a58447a64487a6351774a756a6270766b6549476b695053556f esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-cbc-128 crypto-key 6d494f596f48447076547445506c4676 integ-alg sha-512-256 integ-key 49716c65486a4355456848474d6857664f6d654457596c4478727944687049497a5372536c4a52465070677a6648436676716445666f4170734c755372766561 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-cbc-128 crypto-key 6d494f596f48447076547445506c4676 integ-alg sha-512-256 integ-key 49716c65486a4355456848474d6857664f6d654457596c4478727944687049497a5372536c4a52465070677a6648436676716445666f4170734c755372766561 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-cbc-128 crypto-key 585667516471507347414a4768465474 integ-alg sha-512-256 integ-key 79544d71475755534864726f6f4f4f4b52594f684d6f4e4f514f524f564643716d737948456748676550556473477a495a636654466f76706e4c564644725162 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-cbc-128 crypto-key 585667516471507347414a4768465474 integ-alg sha-512-256 integ-key 79544d71475755534864726f6f4f4f4b52594f684d6f4e4f514f524f564643716d737948456748676550556473477a495a636654466f76706e4c564644725162 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-cbc-128 crypto-key 485848547a7a51414772496846536f70 integ-alg sha-512-256 integ-key 776173554c43506a525a7a5962754c74527657517175694a5a4857424f6e74526c4b454a787142424f58776675756c7a47644578776f524c4d61546b53507a6c esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-cbc-128 crypto-key 485848547a7a51414772496846536f70 integ-alg sha-512-256 integ-key 776173554c43506a525a7a5962754c74527657517175694a5a4857424f6e74526c4b454a787142424f58776675756c7a47644578776f524c4d61546b53507a6c esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-cbc-128 crypto-key 48774143535350665165656b6f535953 integ-alg sha-512-256 integ-key 48767249636a724762656b454a4c6b68674f4e6d4e72426c6b796d574369537644597851635a6b744b54457541767355624d5850734a65495777626c44684962 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-cbc-128 crypto-key 48774143535350665165656b6f535953 integ-alg sha-512-256 integ-key 48767249636a724762656b454a4c6b68674f4e6d4e72426c6b796d574369537644597851635a6b744b54457541767355624d5850734a65495777626c44684962 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-cbc-128 crypto-key 4478656f4e44415a6b48456c6476484d integ-alg sha-512-256 integ-key 6f734a56577968514873775a4f7069515273494669496d4a5256414444514c73596a514664617a505a596669626463736a617049674f6554464f794e58554944 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-cbc-128 crypto-key 4478656f4e44415a6b48456c6476484d integ-alg sha-512-256 integ-key 6f734a56577968514873775a4f7069515273494669496d4a5256414444514c73596a514664617a505a596669626463736a617049674f6554464f794e58554944 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-cbc-128 crypto-key 64664b6346776e705663705061727a68 integ-alg sha-512-256 integ-key 424864414142484e77486c674e6c6459466a664b41626769634f554d4549454f58597846516e6d48517374696e596250457653734f43576a62594f4662484a4c esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-cbc-128 crypto-key 64664b6346776e705663705061727a68 integ-alg sha-512-256 integ-key 424864414142484e77486c674e6c6459466a664b41626769634f554d4549454f58597846516e6d48517374696e596250457653734f43576a62594f4662484a4c esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-cbc-128 crypto-key 5179485645696f4b6b6e505a4a4e6e49 integ-alg sha-512-256 integ-key 72507a6563674b7876784c56465647526a66496e42786842777172554c4a746d646441595854685866624c74616e62726442786e6e4a7a636c456d634d495365 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-cbc-128 crypto-key 5179485645696f4b6b6e505a4a4e6e49 integ-alg sha-512-256 integ-key 72507a6563674b7876784c56465647526a66496e42786842777172554c4a746d646441595854685866624c74616e62726442786e6e4a7a636c456d634d495365 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-cbc-128 crypto-key 6849766b496d4c4e6b55796c44657474 integ-alg sha-512-256 integ-key 7770564b707070554d6d4f597161685464766b79494a536a6e7072666245754c4776664476577578574b584245485548784474666844646952546b5855434b4a esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-cbc-128 crypto-key 6849766b496d4c4e6b55796c44657474 integ-alg sha-512-256 integ-key 7770564b707070554d6d4f597161685464766b79494a536a6e7072666245754c4776664476577578574b584245485548784474666844646952546b5855434b4a esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-cbc-128 crypto-key 46474e584c747655546277534d725a49 integ-alg sha-512-256 integ-key 6c4c5a6b484a4e76637968664a68455a43586f75724f68747855634d4e44474e444c794747667a6e737768634c7a7a4142784e6c7a6b755555526867716e6e4f esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-cbc-128 crypto-key 46474e584c747655546277534d725a49 integ-alg sha-512-256 integ-key 6c4c5a6b484a4e76637968664a68455a43586f75724f68747855634d4e44474e444c794747667a6e737768634c7a7a4142784e6c7a6b755555526867716e6e4f esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-cbc-128 crypto-key 4d6e4d7569555a6a5161724f43436274 integ-alg sha-512-256 integ-key 6a53456f5446655967506258514f514773564467504d487555654a7671665a5375594771696452686259576c464c5a6a476c61774a7352517372475370475749 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-cbc-128 crypto-key 4d6e4d7569555a6a5161724f43436274 integ-alg sha-512-256 integ-key 6a53456f5446655967506258514f514773564467504d487555654a7671665a5375594771696452686259576c464c5a6a476c61774a7352517372475370475749 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-cbc-128 crypto-key 62497168467a6246484b694874654b46 integ-alg sha-512-256 integ-key 74757a514e6a64424d497146504d456969686d4c517044675445417966705a445a50424a694258564d597967795267544669656c416958646c45415968776b71 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-cbc-128 crypto-key 62497168467a6246484b694874654b46 integ-alg sha-512-256 integ-key 74757a514e6a64424d497146504d456969686d4c517044675445417966705a445a50424a694258564d597967795267544669656c416958646c45415968776b71 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-cbc-128 crypto-key 6b6366457153744d54444b69625a4661 integ-alg sha-512-256 integ-key 4f6271716c656f54754a547368476e57744b6346645a5442626652474e4e466b6a577a776648556f4c6f6c574e455759466f4b43784d784a6579497372556675 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-cbc-128 crypto-key 6b6366457153744d54444b69625a4661 integ-alg sha-512-256 integ-key 4f6271716c656f54754a547368476e57744b6346645a5442626652474e4e466b6a577a776648556f4c6f6c574e455759466f4b43784d784a6579497372556675 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-cbc-128 crypto-key 756341524850646a7062734d78797249 integ-alg sha-512-256 integ-key 4f4b68755a50616471724b67515664626d6a6a53527943666d596e6e5565796d486f4371626e5662685158544d7258456d505878714c6b41736f584370515272 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-cbc-128 crypto-key 756341524850646a7062734d78797249 integ-alg sha-512-256 integ-key 4f4b68755a50616471724b67515664626d6a6a53527943666d596e6e5565796d486f4371626e5662685158544d7258456d505878714c6b41736f584370515272 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

25ge2p1xxv710-avf-ethip4ipsec40tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 43464d724b4c6a444d55564f7062644264546c73445a504e636d6674764a7550 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 43464d724b4c6a444d55564f7062644264546c73445a504e636d6674764a7550 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 44515579714c444c4d616f664b6562594f5475695a6377776753555a5075694a esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 44515579714c444c4d616f664b6562594f5475695a6377776753555a5075694a esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 427563634c4b67636f72704f68556d55787977775665744d616770626e454f73 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 427563634c4b67636f72704f68556d55787977775665744d616770626e454f73 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 61584e6a6775745763736b6c625161715a74456f7672724a444d6868594d6f58 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 61584e6a6775745763736b6c625161715a74456f7672724a444d6868594d6f58 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 58796e625368464b4878716e736563774345576941694b4c574b454b434c5052 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 58796e625368464b4878716e736563774345576941694b4c574b454b434c5052 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 4a596c6d4945496a684d6b7175525779414a456b6964456c737971746d797547 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 4a596c6d4945496a684d6b7175525779414a456b6964456c737971746d797547 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 55614a4356424e74514949714c7578495051547a48587545657a5a554464466d esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 55614a4356424e74514949714c7578495051547a48587545657a5a554464466d esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 494e4c535a6d67454b797a4c596e4a744379684e706251534648776a444c4c41 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 494e4c535a6d67454b797a4c596e4a744379684e706251534648776a444c4c41 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 466a74536554427a677347724a7847624e7a5263465a6c54727559444b657062 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 466a74536554427a677347724a7847624e7a5263465a6c54727559444b657062 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 54445443415649496c6959475563454b4e766167536279787275695446515a63 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 54445443415649496c6959475563454b4e766167536279787275695446515a63 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 5754644c4946646863546e6a5a4e75684852665147614c50457665416958486a esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 5754644c4946646863546e6a5a4e75684852665147614c50457665416958486a esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 50656754517361655149665864776f646447634e4a5351586d70654456686369 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 50656754517361655149665864776f646447634e4a5351586d70654456686369 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 755a5a5161445055536f72714b4f755a57724c564950455246444d4a79444575 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 755a5a5161445055536f72714b4f755a57724c564950455246444d4a79444575 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 69716a4a4e6c567a586f7674747154757562716d697751455250716256536d6b esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 69716a4a4e6c567a586f7674747154757562716d697751455250716256536d6b esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 54717654427942524e47796c4163586444474c715258575555476e4e6c585a59 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 54717654427942524e47796c4163586444474c715258575555476e4e6c585a59 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 4a686a4751506472724f4e644f4a7073694a4a7169696e6a6b5a66644b727371 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 4a686a4751506472724f4e644f4a7073694a4a7169696e6a6b5a66644b727371 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 63677a4b5a676a775a496878785a71494d6575494a767a426e564f4a73546143 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 63677a4b5a676a775a496878785a71494d6575494a767a426e564f4a73546143 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 6f59496462586b53524e636c736963657167614d426559515361626e784e7542 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 6f59496462586b53524e636c736963657167614d426559515361626e784e7542 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 5165456d4c6d786547654f665672686175644b78616a6d5374716871426c6b61 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 5165456d4c6d786547654f665672686175644b78616a6d5374716871426c6b61 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6e576b7466484469754c5150557a53426145587449566c6c55776c666f45417a esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6e576b7466484469754c5150557a53426145587449566c6c55776c666f45417a esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 78794945585453634c4a77754866695a674f73695a61426c4156636679767772 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 78794945585453634c4a77754866695a674f73695a61426c4156636679767772 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 495a506e74554c416d51634875624e6b7373645842556a6956794746534b5062 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 495a506e74554c416d51634875624e6b7373645842556a6956794746534b5062 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 6a58676a6146697364524f456e47724363764244577753546878547744505848 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 6a58676a6146697364524f456e47724363764244577753546878547744505848 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 57587261634d4d676a79655755535148706f534a6c564a425259675244767558 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 57587261634d4d676a79655755535148706f534a6c564a425259675244767558 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 744442724e486f4f6a634d526a6366674276666f6b4679715561447256624547 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 744442724e486f4f6a634d526a6366674276666f6b4679715561447256624547 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 475641494873487070435447464168426f6c785845446d6366586c7a78475a56 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 475641494873487070435447464168426f6c785845446d6366586c7a78475a56 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 41717775506449575350436d465679416f74524274744a4e446e6e686e684446 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 41717775506449575350436d465679416f74524274744a4e446e6e686e684446 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 446d6c516e5a6f7a74434678795679534379766366774e416e47707a76786148 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 446d6c516e5a6f7a74434678795679534379766366774e416e47707a76786148 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 64414a756b79626d534b566663535842684c69706c656c494f59545066575747 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 64414a756b79626d534b566663535842684c69706c656c494f59545066575747 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 53724f594564766848585053715845625848446f754c46714d5a736e74794b68 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 53724f594564766848585053715845625848446f754c46714d5a736e74794b68 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 624a63656c4673537864486855686c636765617664664c5a4b50426b6f4d4979 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 624a63656c4673537864486855686c636765617664664c5a4b50426b6f4d4979 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 527a64414449447168777761794774584b6c6650457745687351546b69425242 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 527a64414449447168777761794774584b6c6650457745687351546b69425242 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 63725977654d6746496f496579734842635a7a4c6f4965554c7150485056726f esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 63725977654d6746496f496579734842635a7a4c6f4965554c7150485056726f esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 524a634d436a49616e6b524a4e644479784a48647255447a6a54556e4b6e6f79 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 524a634d436a49616e6b524a4e644479784a48647255447a6a54556e4b6e6f79 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 5246686e74694f4e534b4b744d746164567263445943704f456b4a5768796d6d esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 5246686e74694f4e534b4b744d746164567263445943704f456b4a5768796d6d esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 70727479497263726c597450584b514f69424952434d4f5a67725a7748465968 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 70727479497263726c597450584b514f69424952434d4f5a67725a7748465968 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 756f446c754e5a65587841645163656869665a666e4274724b6856546843514b esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 756f446c754e5a65587841645163656869665a666e4274724b6856546843514b esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 664c6355736874707974424e564f7447435a46516b4c506a754464746950444b esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 664c6355736874707974424e564f7447435a46516b4c506a754464746950444b esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 5a66734272714d78774569457978424b6f4b6951674673697762455563476d41 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 5a66734272714d78774569457978424b6f4b6951674673697762455563476d41 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 754e61706d4869784249756f5542655a704b67574f6478576d5353716a536159 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 754e61706d4869784249756f5542655a704b67574f6478576d5353716a536159 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-8t4c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 655975497142664f56466178436d6b4a46654d74625072615162694b41446a4a esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 655975497142664f56466178436d6b4a46654d74625072615162694b41446a4a esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 614d52764b5865714c4556654469586a675372534a734a434b574e7a63464853 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 614d52764b5865714c4556654469586a675372534a734a434b574e7a63464853 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 646958504952506657665148505a6d62614c7057547a447468476f7950617551 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 646958504952506657665148505a6d62614c7057547a447468476f7950617551 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 6777745951614d757a576c43657277664d704e7069656a44444d545259534777 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 6777745951614d757a576c43657277664d704e7069656a44444d545259534777 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4e4b4179466d556772547646654f766c644961795975704e514c6362616b7379 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4e4b4179466d556772547646654f766c644961795975704e514c6362616b7379 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 466c794c5665636d616b7551646144646d6669457a4c434f4644476b58485953 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 466c794c5665636d616b7551646144646d6669457a4c434f4644476b58485953 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 50577756695958516f4743665a79615447534775474a676a554a4747736d4a78 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 50577756695958516f4743665a79615447534775474a676a554a4747736d4a78 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 73615667535a775455507575655167585a59446a655a6a6876614b4874747856 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 73615667535a775455507575655167585a59446a655a6a6876614b4874747856 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 42596d545674744c616141417864694271594a74706c46427346566e75745171 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 42596d545674744c616141417864694271594a74706c46427346566e75745171 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 41654e6d786a665770774c5647494b6b6d6a7168564455444b686972534e6d52 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 41654e6d786a665770774c5647494b6b6d6a7168564455444b686972534e6d52 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 6248706f6f66776c736a79485a4b7665737252766c6343756b7457566561636b esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 6248706f6f66776c736a79485a4b7665737252766c6343756b7457566561636b esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 50526b7754614c56684b62734b687a4863526d6e6562534d4e49626c4847724a esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 50526b7754614c56684b62734b687a4863526d6e6562534d4e49626c4847724a esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 69676a4f726d507256796d6d444c584c58644b6a52674c486d6878546a464261 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 69676a4f726d507256796d6d444c584c58644b6a52674c486d6878546a464261 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6146447653777265456e6f4d62756d75744b6a6652544f4a67507a5557415258 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6146447653777265456e6f4d62756d75744b6a6652544f4a67507a5557415258 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 474d72726253794147445366496a4a546d51694e45414d704366714877714959 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 474d72726253794147445366496a4a546d51694e45414d704366714877714959 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 6f4f696d495679487065696b65696a5259665a6970464c6a496565786f4f4c48 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 6f4f696d495679487065696b65696a5259665a6970464c6a496565786f4f4c48 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 675571714a496b534b444c67506d6448634250654e57614b6550564a67696a47 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 675571714a496b534b444c67506d6448634250654e57614b6550564a67696a47 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 72694e705a7649424c5a4c4b4250737462694a4f4b56595a576a6e4f6a49686d esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 72694e705a7649424c5a4c4b4250737462694a4f4b56595a576a6e4f6a49686d esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 42716b425858424f584f535a78615167676d6d416e514b59686451735062524b esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 42716b425858424f584f535a78615167676d6d416e514b59686451735062524b esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6b726976684b67506a6474446372544363466e4668546d4d6873685478704661 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6b726976684b67506a6474446372544363466e4668546d4d6873685478704661 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 4e61706a5657554c41695a786348736e597558647a735478714f637670415464 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 4e61706a5657554c41695a786348736e597558647a735478714f637670415464 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 43424b6d6258626d5563557468695068786963634f7a445042754b636c6f455a esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 43424b6d6258626d5563557468695068786963634f7a445042754b636c6f455a esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 426f544a6475777952596a6b644750787170516e6b5548734a4a575377776d4a esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 426f544a6475777952596a6b644750787170516e6b5548734a4a575377776d4a esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 67526348626d4141524b4d6f4d4b4841657949746b476e654746727272795176 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 67526348626d4141524b4d6f4d4b4841657949746b476e654746727272795176 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 7a616d6e69646f47504f75616d566a6b624979667374426a6171734466495a6d esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 7a616d6e69646f47504f75616d566a6b624979667374426a6171734466495a6d esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 71787962694a7a6d667674514c6f486e4470545375536f4a50784a61414f4149 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 71787962694a7a6d667674514c6f486e4470545375536f4a50784a61414f4149 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 7449676a41796871484d6d664c71565445624249614c50716a69646f50446650 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 7449676a41796871484d6d664c71565445624249614c50716a69646f50446650 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 726d5041756745536c657154457366574f575a5645676772716c4b665071665a esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 726d5041756745536c657154457366574f575a5645676772716c4b665071665a esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 664b5347704169674a57796a49776c664347645a4577746f4c445174414a6a72 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 664b5347704169674a57796a49776c664347645a4577746f4c445174414a6a72 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 76587448544a7a456b48484872416c6878545466714e6a595177434e6e794d79 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 76587448544a7a456b48484872416c6878545466714e6a595177434e6e794d79 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 497a4d526c70465a4559734f59656d5659466d7a634e7053526d707167456850 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 497a4d526c70465a4559734f59656d5659466d7a634e7053526d707167456850 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 56555452526e4c664452756a735a725973594271714c536751764a68644f6b5a esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 56555452526e4c664452756a735a725973594271714c536751764a68644f6b5a esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 71716b6c4c734a6d795562787771474e6349477578437a734f414d7343577a75 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 71716b6c4c734a6d795562787771474e6349477578437a734f414d7343577a75 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 4472474e497a4b514d644a74726c7a6d486d52424f584f617179745275654458 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 4472474e497a4b514d644a74726c7a6d486d52424f584f617179745275654458 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 6a574962476966456c745368617a645a6d6f68646b684d4d4c44475275786c46 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 6a574962476966456c745368617a645a6d6f68646b684d4d4c44475275786c46 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 5567676b6b4d4b65656378727a6845554647764173504f534853756a6e71726a esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 5567676b6b4d4b65656378727a6845554647764173504f534853756a6e71726a esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 4a65584c75694c4e554c76687a476a57635a626f777858564e43415249707363 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 4a65584c75694c4e554c76687a476a57635a626f777858564e43415249707363 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 41477775636f4547776a784749756970735a68505848724d43584c6b6f765361 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 41477775636f4547776a784749756970735a68505848724d43584c6b6f765361 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 54457a716861734c7575646741644359796f4b41506262694c636e4343575865 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 54457a716861734c7575646741644359796f4b41506262694c636e4343575865 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 506873426f764c4874686672676a5671547874534d6d46744b664e4e51787949 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 506873426f764c4874686672676a5671547874534d6d46744b664e4e51787949 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-2t1c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 6169487962426e6962714a4c794b596b6164746d49627054575045486c535177 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 6169487962426e6962714a4c794b596b6164746d49627054575045486c535177 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 6a436a70464b557754414a5254536a4770646f4579534b4a676b44437168624b esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 6a436a70464b557754414a5254536a4770646f4579534b4a676b44437168624b esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 455873566e676e5176685675446b6f4b59536d53435079485054644655644d6e esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 455873566e676e5176685675446b6f4b59536d53435079485054644655644d6e esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 73564e46624745577a517158715973456c49666679564e6c5379434f48777745 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 73564e46624745577a517158715973456c49666679564e6c5379434f48777745 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 62667a494e73434a7651614376705249456a4c4856685250554944584d49526e esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 62667a494e73434a7651614376705249456a4c4856685250554944584d49526e esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 754c657868414144424c6a775a58596545716b58564564735746674568427869 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 754c657868414144424c6a775a58596545716b58564564735746674568427869 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 59766d5367464c6552694f707563685756586f71494c674d765865564954526e esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 59766d5367464c6552694f707563685756586f71494c674d765865564954526e esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 6153436678756474727163724e504a4967427479564d4f685545637a4c4a576c esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 6153436678756474727163724e504a4967427479564d4f685545637a4c4a576c esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 59626c524771466f55724f5871735a69526e4446556e56756d6964775a67527a esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 59626c524771466f55724f5871735a69526e4446556e56756d6964775a67527a esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 6a53474e7762415749706b415878454479724e59487955786c756e67506a454c esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 6a53474e7762415749706b415878454479724e59487955786c756e67506a454c esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 4e43784a7573716849656e6e50674565564b466b507161486247736d5a535344 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 4e43784a7573716849656e6e50674565564b466b507161486247736d5a535344 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4f534476666379787a6b5843545577515662677554516161675258504957564e esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4f534476666379787a6b5843545577515662677554516161675258504957564e esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 584b4879504b4b4650764e7a45556556494e667350774a6461675070684c7955 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 584b4879504b4b4650764e7a45556556494e667350774a6461675070684c7955 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6f616a445a454c414851417050674d7550546568476d78746d55504f4773774c esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6f616a445a454c414851417050674d7550546568476d78746d55504f4773774c esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 6654667250435a736c7474726d5561576d7a6343584a6d454b4d6e646c627562 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 6654667250435a736c7474726d5561576d7a6343584a6d454b4d6e646c627562 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 76616a4c6564565464625378594d58785266634b61476463565a746e4e664e68 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 76616a4c6564565464625378594d58785266634b61476463565a746e4e664e68 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 496f6e7948625164516467495072704258796474466d6e4c6f61524753517272 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 496f6e7948625164516467495072704258796474466d6e4c6f61524753517272 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 706f435061707a72575a5a51726c44516b6c6a44634e4b4d6b4b746f634b4972 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 706f435061707a72575a5a51726c44516b6c6a44634e4b4d6b4b746f634b4972 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 49634c66667061657445765a5a546e6f4d434c51484b4e71435744736a627278 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 49634c66667061657445765a5a546e6f4d434c51484b4e71435744736a627278 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 7a4146626751676e466b6177506e4e546c6c4f514753716e4b45545867695477 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 7a4146626751676e466b6177506e4e546c6c4f514753716e4b45545867695477 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 564c4d634342766d73487164546f696a5550764d6d69454179756658436c4d78 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 564c4d634342766d73487164546f696a5550764d6d69454179756658436c4d78 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 736657577152496a6378724c52415a7177705043566c7247694e62686c7a6643 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 736657577152496a6378724c52415a7177705043566c7247694e62686c7a6643 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 72586162516e4a7052555a5878504659474176655667686f7a4b4757514d6865 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 72586162516e4a7052555a5878504659474176655667686f7a4b4757514d6865 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 554969786d6a725048584771627651427166795a4a484c734e6a6b4767514c68 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 554969786d6a725048584771627651427166795a4a484c734e6a6b4767514c68 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 62474d774e72746f7a4b46634e6b6b567475765444426d6d50474a65614b7673 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 62474d774e72746f7a4b46634e6b6b567475765444426d6d50474a65614b7673 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 554c6e645275644c505a764942584a7466756f50527641766b4f764b72427377 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 554c6e645275644c505a764942584a7466756f50527641766b4f764b72427377 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 776a435651467a4f797548524d4f6f44734158425465426f6654684d58676c42 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 776a435651467a4f797548524d4f6f44734158425465426f6654684d58676c42 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 457473694344506d67524c54705052417774446b4d7846505669616f5152434a esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 457473694344506d67524c54705052417774446b4d7846505669616f5152434a esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 6e436b586470706f687862456273524b7570576b5878776c5858474d76644c64 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 6e436b586470706f687862456273524b7570576b5878776c5858474d76644c64 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 6d414e53674964575255574e5a70754c5959585273577451476d6673706e4e63 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 6d414e53674964575255574e5a70754c5959585273577451476d6673706e4e63 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 4a715154754b7869696161776c787858727765674468664d4f67706d777a4d77 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 4a715154754b7869696161776c787858727765674468664d4f67706d777a4d77 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 76534377624c617450594f78745755794c6b6e44506c5457755243456e787456 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 76534377624c617450594f78745755794c6b6e44506c5457755243456e787456 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 6e4352737a4f646f5653435668644a754943646f424977727a725a6957514a70 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 6e4352737a4f646f5653435668644a754943646f424977727a725a6957514a70 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 53436854486c576f634156734a4f69616546564c684e4874636c436f704c6951 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 53436854486c576f634156734a4f69616546564c684e4874636c436f704c6951 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 4c516d53736474426f7350446c4d58615042576770415679454f6c6c61446350 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 4c516d53736474426f7350446c4d58615042576770415679454f6c6c61446350 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 6a624445706351495863714a7955796242414e56625868575051505a45774f57 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 6a624445706351495863714a7955796242414e56625868575051505a45774f57 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 51474b746c555872516a6a6b6b6d6b5569556b6f6e6d57755075566265664d75 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 51474b746c555872516a6a6b6b6d6b5569556b6f6e6d57755075566265664d75 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 6a42496b706a524f576a4374796a6a4f7868795a6b714b525476755752424343 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 6a42496b706a524f576a4374796a6a4f7868795a6b714b525476755752424343 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 5a6c58454a4154465a7162556554695365777263416346697441415158417449 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 5a6c58454a4154465a7162556554695365777263416346697441415158417449 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 49707a636269696c6f754965526a734f50646b4c45556345556c656e4e6e6a72 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 49707a636269696c6f754965526a734f50646b4c45556345556c656e4e6e6a72 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-4t2c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 70494164716f787a664f7744436c4e536c5272634b4455717a4e7746516e4465 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 70494164716f787a664f7744436c4e536c5272634b4455717a4e7746516e4465 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 426a794c4f4141686547754c43536277797074504c6f514c7066794963714f4d esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 426a794c4f4141686547754c43536277797074504c6f514c7066794963714f4d esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 6f52734b61506d646176545173566345534d48767062524e487a464a5258466f esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 6f52734b61506d646176545173566345534d48767062524e487a464a5258466f esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 524554564861794f4c66504a654c5041744e4e524e7a5550745379464d415171 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 524554564861794f4c66504a654c5041744e4e524e7a5550745379464d415171 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 79514d685a6b4652697041726776797179504671454e6c57566b57426c4f656a esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 79514d685a6b4652697041726776797179504671454e6c57566b57426c4f656a esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 4e7a526f657375654c6e6d45514a75504e7664467074495670437946714f4a4b esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 4e7a526f657375654c6e6d45514a75504e7664467074495670437946714f4a4b esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 69664d62736a424b744d464243516a54725a5a64446b6b487a7a4c6d53764c63 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 69664d62736a424b744d464243516a54725a5a64446b6b487a7a4c6d53764c63 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 7341644d6777647966426f6d55555558694451574a6a754250504b534d415066 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 7341644d6777647966426f6d55555558694451574a6a754250504b534d415066 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 5a42786a72596c665568566f4a63434a485a455a4e445863416a4c5151476d68 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 5a42786a72596c665568566f4a63434a485a455a4e445863416a4c5151476d68 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 686862646c4b78436e736d7a44614c4f5541784a49576d74556c476c6369464c esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 686862646c4b78436e736d7a44614c4f5541784a49576d74556c476c6369464c esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 63646c4e4347446b42627a6c436e7765534b6d4f5a6374686768506b6f586d76 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 63646c4e4347446b42627a6c436e7765534b6d4f5a6374686768506b6f586d76 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4a537a766a7a6b667848486b784c5662656b444d5376514d5a65655a4448574f esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4a537a766a7a6b667848486b784c5662656b444d5376514d5a65655a4448574f esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 746f5856706879694346625471756155546f6862576b6d426d51684256714a59 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 746f5856706879694346625471756155546f6862576b6d426d51684256714a59 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 794c72786263784f6a515454704c695044556c56464f6c634356464e7872536d esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 794c72786263784f6a515454704c695044556c56464f6c634356464e7872536d esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 534b42577a786668547567775772494968496c6b55545354797944534d4c5450 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 534b42577a786668547567775772494968496c6b55545354797944534d4c5450 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 725446564571685457596853625a6e6f6961586674724b6948546942485a516d esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 725446564571685457596853625a6e6f6961586674724b6948546942485a516d esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 674d4f5767734e644d68714a476c416957784e45594d45714d74426b44786169 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 674d4f5767734e644d68714a476c416957784e45594d45714d74426b44786169 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 5876575970456e764748456c466872534150436a4747575859684153774f4157 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 5876575970456e764748456c466872534150436a4747575859684153774f4157 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 53465378624a6364426747787243716e724844547266544f4a4e685144766f4b esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 53465378624a6364426747787243716e724844547266544f4a4e685144766f4b esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 4a5872424a714e4866487451486f514e4252506951754c426d66696643615278 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 4a5872424a714e4866487451486f514e4252506951754c426d66696643615278 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 615a4a667946667678475562734b4659446e7a4566546b69546f61637955474a esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 615a4a667946667678475562734b4659446e7a4566546b69546f61637955474a esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 655079526b7749494f7541534b627075686a634f7046657674474e45766d6f6c esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 655079526b7749494f7541534b627075686a634f7046657674474e45766d6f6c esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 7147657658464d4f4b51685052764f494c51654c714470437a555a424d655161 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 7147657658464d4f4b51685052764f494c51654c714470437a555a424d655161 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 526c554c444b4e69744f717441736c527961764a4d664d5a4178466e755a5264 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 526c554c444b4e69744f717441736c527961764a4d664d5a4178466e755a5264 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 5253414e57546e6f6970416e756543584462435577556a5a6778766557724e66 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 5253414e57546e6f6970416e756543584462435577556a5a6778766557724e66 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 4164756470614b78744e4d6b6646544b77636f456c4549444b656b476a714e4e esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 4164756470614b78744e4d6b6646544b77636f456c4549444b656b476a714e4e esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 696f6f646f7a544a4f797a7553416a51505163586f6b484f706854726d556652 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 696f6f646f7a544a4f797a7553416a51505163586f6b484f706854726d556652 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 594c5a656d585a5550414a646377734157484c59514561704879676558475272 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 594c5a656d585a5550414a646377734157484c59514561704879676558475272 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 754b704c4f667775597350617676734d456e44654e514c5955786b7271474b56 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 754b704c4f667775597350617676734d456e44654e514c5955786b7271474b56 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 5a7649757969496379536e7a7a4978546f6d626f5a6157577471544275414f55 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 5a7649757969496379536e7a7a4978546f6d626f5a6157577471544275414f55 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 48647159714b545674614c7465656d5748734c496e754d41656e5a7375716572 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 48647159714b545674614c7465656d5748734c496e754d41656e5a7375716572 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 596f4a564876486f6a43636f786c446163656356437451504368794b67627045 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 596f4a564876486f6a43636f786c446163656356437451504368794b67627045 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 67427648456f62635255686672694d5743424247594c61497570754e70555278 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 67427648456f62635255686672694d5743424247594c61497570754e70555278 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 4773536c7a794951585a59465351756549576679545479454a6e594762617856 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 4773536c7a794951585a59465351756549576679545479454a6e594762617856 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 67577a594858534c73596e65746a6e7a44744f504f665a59536267766d567076 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 67577a594858534c73596e65746a6e7a44744f504f665a59536267766d567076 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 6f4e7673627a6657787a70446344787259627853524f7447714f4a6b73456148 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 6f4e7673627a6657787a70446344787259627853524f7447714f4a6b73456148 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 6a696567426b754d524369756e48736d53435865674663474653734c44707346 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 6a696567426b754d524369756e48736d53435865674663474653734c44707346 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 556176624375534d6b4a4c4d554165774e786d7a4766736357756d6c70776f52 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 556176624375534d6b4a4c4d554165774e786d7a4766736357756d6c70776f52 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 565049517578496f5654507378466d4a656861454f4870727973696a5477786e esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 565049517578496f5654507378466d4a656861454f4870727973696a5477786e esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 78774a4c425964717a784e517468784f6452774c424f706676476650666f5956 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 78774a4c425964717a784e517468784f6452774c424f706676476650666f5956 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-8t4c-avf-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address avf-0/4b/a/0 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 646d4e6862635564774a6c7654706f6f6451784b727868727369785549775577 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 646d4e6862635564774a6c7654706f6f6451784b727868727369785549775577 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 647676707372536354554954736f5a427547497a724b4f7056426672526e6b67 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 647676707372536354554954736f5a427547497a724b4f7056426672526e6b67 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 4255766a586f7643656e78426969526e57516f514f574e50584c77516b6d6c4b esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 4255766a586f7643656e78426969526e57516f514f574e50584c77516b6d6c4b esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 7454486f6247664a636450515962786864516c70707078416864486a41714b4b esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 7454486f6247664a636450515962786864516c70707078416864486a41714b4b esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 6450577373487749504e49505972684c6f614655514347527762537564754f43 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 6450577373487749504e49505972684c6f614655514347527762537564754f43 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 6b485349456c50665649634f706b426b734f7974776e577567716b7970786770 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 6b485349456c50665649634f706b426b734f7974776e577567716b7970786770 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 7271426e536a62525a7a4b6778786a45446c597959424d50574b4e674a724770 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 7271426e536a62525a7a4b6778786a45446c597959424d50574b4e674a724770 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 756d6570687a6345634b7344564b706d596a70506f704948587a51486d65614d esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 756d6570687a6345634b7344564b706d596a70506f704948587a51486d65614d esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 6d6d4d746b797541424c7a5154514965684e74435a436d566e416c434b43576d esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 6d6d4d746b797541424c7a5154514965684e74435a436d566e416c434b43576d esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 7a436852475472464a71734f666175544f4959695a587652504f4f4c577a4f42 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 7a436852475472464a71734f666175544f4959695a587652504f4f4c577a4f42 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 736852735177766852524452614a7450574e6458416354797370635745736272 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 736852735177766852524452614a7450574e6458416354797370635745736272 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 6363674a4879445345754c7a4c556464434265497a764f697a41796d774d5954 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 6363674a4879445345754c7a4c556464434265497a764f697a41796d774d5954 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 5770425a4672484461616c764d544d795462436173537163454e6f646a4f5962 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 5770425a4672484461616c764d544d795462436173537163454e6f646a4f5962 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 42635954524d6d6b6d4c6478766561734e6850436d7357676358724855537777 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 42635954524d6d6b6d4c6478766561734e6850436d7357676358724855537777 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 7272626a5356555266734c4c4e62514a454a46746478634c5667414c446a4d76 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 7272626a5356555266734c4c4e62514a454a46746478634c5667414c446a4d76 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 7a6b414d4466664d47795056775562737941435577665445755249676e46586a esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 7a6b414d4466664d47795056775562737941435577665445755249676e46586a esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 65784c5a54714d684b584f6b644765736a6a4355536d4b4173736b50434f6954 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 65784c5a54714d684b584f6b644765736a6a4355536d4b4173736b50434f6954 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 68676475565041484263577a5763766366626e5a506a6a4d746842786e7a6d4e esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 68676475565041484263577a5763766366626e5a506a6a4d746842786e7a6d4e esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 5a70587a61574169687262654f69497678756b6548644f54664d476754497570 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 5a70587a61574169687262654f69497678756b6548644f54664d476754497570 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 6564525277564445416e634354626d4747417375477258534b434a434e54686d esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 6564525277564445416e634354626d4747417375477258534b434a434e54686d esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 616c4147576e616749647878784166426c5a44696e6d5568434269554a4f5279 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 616c4147576e616749647878784166426c5a44696e6d5568434269554a4f5279 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 6d7863556c76576c447a466a454c4e71666550587671724a546e644f764d4563 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 6d7863556c76576c447a466a454c4e71666550587671724a546e644f764d4563 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 4265455a614375594d68504b696a4d5145524d656a694c73526f686b4f534450 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 4265455a614375594d68504b696a4d5145524d656a694c73526f686b4f534450 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 65474149514c494b69526d484e4f5a4c524b4a6c494548787174747868735467 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 65474149514c494b69526d484e4f5a4c524b4a6c494548787174747868735467 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 765254456f796d6364697878444e5553736e494b6d5a6e684477687253626c4a esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 765254456f796d6364697878444e5553736e494b6d5a6e684477687253626c4a esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 4566594f626a4f4f6a5646467a456b77524b7a566d735046714750586554506c esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 4566594f626a4f4f6a5646467a456b77524b7a566d735046714750586554506c esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 6968616b4c545a7249796f5873416c4a51626b5a6e4f514c574a616b71504773 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 6968616b4c545a7249796f5873416c4a51626b5a6e4f514c574a616b71504773 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 4969734e70464f4e6154636d585a527367647878506b7374446e51566d575979 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 4969734e70464f4e6154636d585a527367647878506b7374446e51566d575979 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 4e46725a5778526a4b7a63586276687754476c746d676b486b44756c524d6c71 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 4e46725a5778526a4b7a63586276687754476c746d676b486b44756c524d6c71 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 464a506954514f467258676d46666b64654579584c7872467976474d77754975 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 464a506954514f467258676d46666b64654579584c7872467976474d77754975 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 7167667949714f56786d74744d42486d4e484f65624d5979416d517077617143 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 7167667949714f56786d74744d42486d4e484f65624d5979416d517077617143 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 456b67595163786c566e4a7259696956736c6f7973627a4f41765063644b7758 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 456b67595163786c566e4a7259696956736c6f7973627a4f41765063644b7758 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 665954524f7961466277454f486675546e61754e4d6274756f4a6a4b77684e66 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 665954524f7961466277454f486675546e61754e4d6274756f4a6a4b77684e66 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 645161657249544a4c61614f444f776f7175595548546f414f4f50556e5a5753 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 645161657249544a4c61614f444f776f7175595548546f414f4f50556e5a5753 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 6c4e536f5579487945776462695a73646b574c436f7672467978434a6465434c esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 6c4e536f5579487945776462695a73646b574c436f7672467978434a6465434c esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 7874544345674b48477345724e4e485765576a474a72486150795874706b7959 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 7874544345674b48477345724e4e485765576a474a72486150795874706b7959 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 454e5a6172426a654e7377534e654a534c6e435056586b4e4c70654b4b467169 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 454e5a6172426a654e7377534e654a534c6e435056586b4e4c70654b4b467169 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 68437577416861586e786368674f515243736e4756554a596e5770665a4c6b46 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 68437577416861586e786368674f515243736e4756554a596e5770665a4c6b46 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 71556b4f4c77674b63596d575269767a787367516e63694352646b6c6b64644a esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 71556b4f4c77674b63596d575269767a787367516e63694352646b6c6b64644a esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 766d476a62454849784a64496a6d5854656a61554a6647766a4c646a644a7444 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 766d476a62454849784a64496a6d5854656a61554a6647766a4c646a644a7444 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 avf-0/4b/a/0
exec set interface unnumbered ipip0 use avf-0/4b/a/0
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use avf-0/4b/a/0
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use avf-0/4b/a/0
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use avf-0/4b/a/0
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use avf-0/4b/a/0
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use avf-0/4b/a/0
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use avf-0/4b/a/0
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use avf-0/4b/a/0
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use avf-0/4b/a/0
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use avf-0/4b/a/0
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use avf-0/4b/a/0
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use avf-0/4b/a/0
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use avf-0/4b/a/0
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use avf-0/4b/a/0
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use avf-0/4b/a/0
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use avf-0/4b/a/0
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use avf-0/4b/a/0
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use avf-0/4b/a/0
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use avf-0/4b/a/0
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use avf-0/4b/a/0
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use avf-0/4b/a/0
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use avf-0/4b/a/0
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use avf-0/4b/a/0
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use avf-0/4b/a/0
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use avf-0/4b/a/0
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use avf-0/4b/a/0
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use avf-0/4b/a/0
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use avf-0/4b/a/0
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use avf-0/4b/a/0
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use avf-0/4b/a/0
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use avf-0/4b/a/0
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use avf-0/4b/a/0
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use avf-0/4b/a/0
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use avf-0/4b/a/0
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use avf-0/4b/a/0
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use avf-0/4b/a/0
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use avf-0/4b/a/0
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use avf-0/4b/a/0
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use avf-0/4b/a/0
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use avf-0/4b/a/0
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

25ge2p1xxv710-avf-ethip4ipsec4tnlsw-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’NSIwndZJEOyfrLPS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tqjHBTypyarsjDaqabBQJZuNIDkXuCWTPWjLvzGzGUUsLwuOFlqmjPoGziXaJdfQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’NSIwndZJEOyfrLPS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tqjHBTypyarsjDaqabBQJZuNIDkXuCWTPWjLvzGzGUUsLwuOFlqmjPoGziXaJdfQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’qwrjgwpwOiktdkaf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DusrfSvXSlISoHDkPfuUpHouJHyfqdRcffqklpefYsEgrGDGuMpavZrRAllozEQm’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’qwrjgwpwOiktdkaf’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’DusrfSvXSlISoHDkPfuUpHouJHyfqdRcffqklpefYsEgrGDGuMpavZrRAllozEQm’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oQjnxfnQsYAFwYFe’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’CrmelLrpuAPTLnzzcZYsfiROaenfehzUCgEcyJAfHOvBMxGwFfkocLfXWTjRzIBX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’oQjnxfnQsYAFwYFe’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’CrmelLrpuAPTLnzzcZYsfiROaenfehzUCgEcyJAfHOvBMxGwFfkocLfXWTjRzIBX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EnliocNhOWsCBvgw’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YShhkMXucmnoOrlWefQKnVUxXCglbcgClKOfAYSmqDYiWbWdeByERIfWvVVMbsYf’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EnliocNhOWsCBvgw’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’YShhkMXucmnoOrlWefQKnVUxXCglbcgClKOfAYSmqDYiWbWdeByERIfWvVVMbsYf’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t2c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mHpcCCSCKAULyGUO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LZoHLeHOulJFUHJpPAICNluHodnxnFAVncHVijWMWIEumCNBVJfRjcrZehXmfkiC’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’mHpcCCSCKAULyGUO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LZoHLeHOulJFUHJpPAICNluHodnxnFAVncHVijWMWIEumCNBVJfRjcrZehXmfkiC’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QRYejnVBaWXrCYZh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SiHBIXtKTRrGkoIGhgdpuEUqLgbkFPDEPwpeTlEmeWVckloBVkvkBbytINPUwRjY’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’QRYejnVBaWXrCYZh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SiHBIXtKTRrGkoIGhgdpuEUqLgbkFPDEPwpeTlEmeWVckloBVkvkBbytINPUwRjY’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’PtxVLaArWzoSAKuN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uJOxRRoMUVPCuUHlbOSpEsZTfdTFSBnNUDVBJwGlYwZerLVzJmiXAtAoEnpBcRti’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’PtxVLaArWzoSAKuN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uJOxRRoMUVPCuUHlbOSpEsZTfdTFSBnNUDVBJwGlYwZerLVzJmiXAtAoEnpBcRti’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ypbMDYooLRkEDpsm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’sGInyrZFNDuqdBzLnippMzMOOkrCTqFltisssvPCgjaNwzFdnZYEpaKIGjuIeTKm’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ypbMDYooLRkEDpsm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’sGInyrZFNDuqdBzLnippMzMOOkrCTqFltisssvPCgjaNwzFdnZYEpaKIGjuIeTKm’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-8t4c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lknwULxZMjBpzkKD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pMAfTxiRdJXexkxebZoYnxiHgeHABKwqagkBbJAndjfLOULWSnrNUqMoSETJpohx’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’lknwULxZMjBpzkKD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pMAfTxiRdJXexkxebZoYnxiHgeHABKwqagkBbJAndjfLOULWSnrNUqMoSETJpohx’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WsdUHQtJsvFZwcJN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’esgCbIfbPOVARiUuAFNvdCTJKRudRnJVfBjVgBVngtirrsTejyykgMiBHQRnIwFX’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WsdUHQtJsvFZwcJN’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’esgCbIfbPOVARiUuAFNvdCTJKRudRnJVfBjVgBVngtirrsTejyykgMiBHQRnIwFX’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SFItSiTjoctpvjjh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XzNuConYpgxipgBJczsLyHNcKCxHEVTEadDRpWFfIAmDwOtsKPHRiaMOWXKYgyTQ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’SFItSiTjoctpvjjh’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XzNuConYpgxipgBJczsLyHNcKCxHEVTEadDRpWFfIAmDwOtsKPHRiaMOWXKYgyTQ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BPFnzhUubnnBAZnK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lbPtIHzxHOUneaoXITVfFeogLwNjCPKRRINQqYxKcIrNupCeIDbXiHnyyHfvCdyN’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’BPFnzhUubnnBAZnK’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lbPtIHzxHOUneaoXITVfFeogLwNjCPKRRINQqYxKcIrNupCeIDbXiHnyyHfvCdyN’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t1c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zmEqkpIKcjLqrBOE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’jNCRlEjizinZcujCdLypaPnoYGmGvXRQEcJLTvlcQCxQAswfNHEtTcJrYTcyekWK’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’zmEqkpIKcjLqrBOE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’jNCRlEjizinZcujCdLypaPnoYGmGvXRQEcJLTvlcQCxQAswfNHEtTcJrYTcyekWK’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’CbIbDCgzeGcdwZap’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’FZXoIOsKzyzixRbOEQkUWGfxhYBlDvDfExXssRQkShonnHxYKmwwRAefhLBDBSYE’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’CbIbDCgzeGcdwZap’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’FZXoIOsKzyzixRbOEQkUWGfxhYBlDvDfExXssRQkShonnHxYKmwwRAefhLBDBSYE’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vEIkwmNcpEtLcpeF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pZNjDhOjxXaSCBROxtJcwbDUqqVpNDZtseFQaysRUbeDWBdJlegvuOZrJNMKkDAD’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vEIkwmNcpEtLcpeF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’pZNjDhOjxXaSCBROxtJcwbDUqqVpNDZtseFQaysRUbeDWBdJlegvuOZrJNMKkDAD’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vaoyJcPFpOBvUpYz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’oiupIAKDlnltrpxQBoVtTbvsbIsWqFSXSfkevAHLEBchGUXkmGgcVIiMDKbxDoLf’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vaoyJcPFpOBvUpYz’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’oiupIAKDlnltrpxQBoVtTbvsbIsWqFSXSfkevAHLEBchGUXkmGgcVIiMDKbxDoLf’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t2c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KcYUyGhqhlvhBSHp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TGozVrkSRrxikPGQFbsoPavBaJdbZLhkfAdglyhiYkPwNJZjXlYrmNVowJUQSvmc’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’KcYUyGhqhlvhBSHp’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TGozVrkSRrxikPGQFbsoPavBaJdbZLhkfAdglyhiYkPwNJZjXlYrmNVowJUQSvmc’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VtxZqTNkqPEOuaxk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zravOLtmVPOLorSlgbwpwkqcDSEQtTdzIuSEALHICqUdcEpzVJHySGfbAUxflScU’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’VtxZqTNkqPEOuaxk’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zravOLtmVPOLorSlgbwpwkqcDSEQtTdzIuSEALHICqUdcEpzVJHySGfbAUxflScU’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FfIuPpBzlAZXCGAF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GxdLJXeHqgCxuoMNpJplPmsqSWRgVXqAysSYYZilqSwsiovvTVwJDbRHtikSxjBn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FfIuPpBzlAZXCGAF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’GxdLJXeHqgCxuoMNpJplPmsqSWRgVXqAysSYYZilqSwsiovvTVwJDbRHtikSxjBn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’latBKrBEmBynOXec’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SUhZiurLiwMLoYhkXTMdEwWUIhsrpdjIiYJFiQEmMeiOoJHvLuDpyglJwpvTdjkr’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’latBKrBEmBynOXec’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’SUhZiurLiwMLoYhkXTMdEwWUIhsrpdjIiYJFiQEmMeiOoJHvLuDpyglJwpvTdjkr’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-8t4c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’deqSlseMMeohleXn’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uXxqGNWmcgTNxePsoQdHlsKXjjUZMHysuCMshXtiFeiAfKQAPzFxgtpsSEOUhvmH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’deqSlseMMeohleXn’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uXxqGNWmcgTNxePsoQdHlsKXjjUZMHysuCMshXtiFeiAfKQAPzFxgtpsSEOUhvmH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bIwfmfCCrxCzRnrS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’WARQIiFTuqZEVJZpIwPbuLSmwtNuJcPrfqSzwNIiWzMSVPAlKaJbTLWsYrTYKxYm’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bIwfmfCCrxCzRnrS’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’WARQIiFTuqZEVJZpIwPbuLSmwtNuJcPrfqSzwNIiWzMSVPAlKaJbTLWsYrTYKxYm’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EWNUUEdKZIsbAVyE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’FmBbYkdcgDLRsrtcbrOGbPYieXWkdIMiszFWDcUXiuTxKeYeCNfcPnbWCAdawakz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EWNUUEdKZIsbAVyE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’FmBbYkdcgDLRsrtcbrOGbPYieXWkdIMiszFWDcUXiuTxKeYeCNfcPnbWCAdawakz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ghfEFHjkbeHJhTgM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’giVPWDZaDxGgaeDzGHIRjumqYiLxzLSFawmzzqbMyMgkKhhQoROzHgzRarEczEhh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ghfEFHjkbeHJhTgM’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’giVPWDZaDxGgaeDzGHIRjumqYiLxzLSFawmzzqbMyMgkKhhQoROzHgzRarEczEhh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec4tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tjuJzkDJiElQDvzxpWQThyBBBlXDCcfg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tjuJzkDJiElQDvzxpWQThyBBBlXDCcfg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’esqdRUdYpAZQMmycYDtfsxyBpfggqWFI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’esqdRUdYpAZQMmycYDtfsxyBpfggqWFI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IQGAFOimENsoVmVPVqDQSiTXVzIyBZtj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IQGAFOimENsoVmVPVqDQSiTXVzIyBZtj’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VzofEItumauMVreocAkaHtpBtKCJhdjL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VzofEItumauMVreocAkaHtpBtKCJhdjL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t2c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WNUBuMmSRnreffpbgOteZTClWXLqHUjR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WNUBuMmSRnreffpbgOteZTClWXLqHUjR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tUpfxltagfUYLUgzqUnCDcHbqNKiOHJp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tUpfxltagfUYLUgzqUnCDcHbqNKiOHJp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gxeiBcrFGWsDJDkFAOzJeTbyNmtiedxF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gxeiBcrFGWsDJDkFAOzJeTbyNmtiedxF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’inFQcRQciMoWIHrwmDrCUbiKyIMVhSfA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’inFQcRQciMoWIHrwmDrCUbiKyIMVhSfA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-8t4c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vdIFazzpxFwamZXQIKZUJbsOEmIyrNPp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vdIFazzpxFwamZXQIKZUJbsOEmIyrNPp’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’nzrtqbxZFFjCGAAGHEeuVuRBWRAVqzah’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’nzrtqbxZFFjCGAAGHEeuVuRBWRAVqzah’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’kWSvtpsLafhBzkipdeHxpQNFILvTQvUL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’kWSvtpsLafhBzkipdeHxpQNFILvTQvUL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gnDicGbJCXFRswujuudDkttnmXcOaSPO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gnDicGbJCXFRswujuudDkttnmXcOaSPO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t1c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bURZIvbpZhYiQoqgwWbaAYGuohftGtNr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bURZIvbpZhYiQoqgwWbaAYGuohftGtNr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gaTqrqYfefbrtswHauVgSpYKwkxGThJA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gaTqrqYfefbrtswHauVgSpYKwkxGThJA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IYwVHQiIgzPERCcTuPdNVClNVhHwoVyI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IYwVHQiIgzPERCcTuPdNVClNVhHwoVyI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BPRboAjKScPKQPnYMPdBhWlBnilCdazO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’BPRboAjKScPKQPnYMPdBhWlBnilCdazO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t2c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=4,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NwXbiNDBObjfliRtOOmbmaebKvOkgBFE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NwXbiNDBObjfliRtOOmbmaebKvOkgBFE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ORsQEUQyOsruOIFmTNqIPsqJREQhLWAq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ORsQEUQyOsruOIFmTNqIPsqJREQhLWAq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iwkWTtpujDWEeCvqnhJAKBdpBjucpqxO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iwkWTtpujDWEeCvqnhJAKBdpBjucpqxO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EmGeQFfZLTqQNFvIWRtpzpbnCynswCtI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EmGeQFfZLTqQNFvIWRtpzpbnCynswCtI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-8t4c-avf-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=8,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cdCsZDpYThAgQziXINmbSonoUyXxNTJG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cdCsZDpYThAgQziXINmbSonoUyXxNTJG’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZtDhziKNFwZSLZuUOmhjVVoNOzPzqDqL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZtDhziKNFwZSLZuUOmhjVVoNOzPzqDqL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ibXYxiNinPlmKUGWDNtJcXrkQICoEgUW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ibXYxiNinPlmKUGWDNtJcXrkQICoEgUW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xhdgDpKJLXVVvtpQefbsHtAzXMsqenRX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xhdgDpKJLXVVvtpQefbsHtAzXMsqenRX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes128cbc-hmac512sha-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t2c-avf-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FbVVGKketnrcKEHO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’OAxrODwzBzSWYOTGkIcqxKRMbxFRoVYopiVMMlNjPDLjXhIwDzINPsieumuGiatk’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’FbVVGKketnrcKEHO’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’OAxrODwzBzSWYOTGkIcqxKRMbxFRoVYopiVMMlNjPDLjXhIwDzINPsieumuGiatk’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’JcxneGoUYZjVcbqw’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ogpLYghtKTDzBMgTDaEVFDKQpnFgvwNhnuxaylSsyjrCYJicuRcVVxHXnXjJvvvz’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’JcxneGoUYZjVcbqw’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’ogpLYghtKTDzBMgTDaEVFDKQpnFgvwNhnuxaylSsyjrCYJicuRcVVxHXnXjJvvvz’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LIDEeqHYxFBAfJdg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’IhjjnOFHaSLQOpxtBqjrQlcjOmJWOYvOZifRUmrORVEdKcxDbmsOHoVNnRvQMeiW’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’LIDEeqHYxFBAfJdg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’IhjjnOFHaSLQOpxtBqjrQlcjOmJWOYvOZifRUmrORVEdKcxDbmsOHoVNnRvQMeiW’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ShNEzRyckJxvJVyy’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’njceWxzzStSSFyepvLMFaaGpXzZKxwDaZZhZuDPMDTbFJdxLbfghTJvgOGZppEBR’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’ShNEzRyckJxvJVyy’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’njceWxzzStSSFyepvLMFaaGpXzZKxwDaZZhZuDPMDTbFJdxLbfghTJvgOGZppEBR’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t3c-avf-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bAYJHYAXdsakZksR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uJLNenFarjcgUuOivULkQuHmukEKgXbQIzjTMKTVWzZdtkXxECXXKkfaUKuwlkKN’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’bAYJHYAXdsakZksR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’uJLNenFarjcgUuOivULkQuHmukEKgXbQIzjTMKTVWzZdtkXxECXXKkfaUKuwlkKN’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GKbERxAgLSJWxixj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zzEMvePXisZHkqSRRSuzYSSOnoZjEkMnhYCJmnFZSSSwehJjNYnOvMCAPTNiRoel’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GKbERxAgLSJWxixj’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’zzEMvePXisZHkqSRRSuzYSSOnoZjEkMnhYCJmnFZSSSwehJjNYnOvMCAPTNiRoel’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WvihHaAhNZdMUZNE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tZreVkPituOkYiCpzcllFFAbkbaWrGDpdrkBnOLVXmhYgnlpPbIYMuomVsCJEVse’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WvihHaAhNZdMUZNE’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tZreVkPituOkYiCpzcllFFAbkbaWrGDpdrkBnOLVXmhYgnlpPbIYMuomVsCJEVse’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’tYBNkpbeUKpIzQFi’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wqMadOcwDYgfEdBboqEnjvftKanOfolAaDCBWBggdkDPBeDMTgJqtwjOAIKNPCpu’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’tYBNkpbeUKpIzQFi’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wqMadOcwDYgfEdBboqEnjvftKanOfolAaDCBWBggdkDPBeDMTgJqtwjOAIKNPCpu’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t4c-avf-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HTuYGSPNcOonsIYD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wjEjaDdZlPKmUeuOILikeYlfNCvzRyTuPCDGhOlqNmSDebrEfuWfAAtQjFTmsOlC’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HTuYGSPNcOonsIYD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’wjEjaDdZlPKmUeuOILikeYlfNCvzRyTuPCDGhOlqNmSDebrEfuWfAAtQjFTmsOlC’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IGNsYdPEjnvnfNXs’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HbRLMpTAGgnPToOHdwAaoyOffjlOnIuabWMaNYzQdZYOfrQxuqsysXEeExvOqijJ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’IGNsYdPEjnvnfNXs’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HbRLMpTAGgnPToOHdwAaoyOffjlOnIuabWMaNYzQdZYOfrQxuqsysXEeExvOqijJ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’NnZNjaejFwSeumjA’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HCLfyyuXWgWDnSHlCxUxRpnLqobgnGyNEVBKtJEIPuGgfYzpmHNTVjSxBgENxCJt’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’NnZNjaejFwSeumjA’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HCLfyyuXWgWDnSHlCxUxRpnLqobgnGyNEVBKtJEIPuGgfYzpmHNTVjSxBgENxCJt’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’okouzRJtJLLttBci’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’KpDcLEeRMrhfxRFcRdOFiswtXSlrjuyqFkmCSNnJGOoFLTTPFbNyJjVVNjeWengn’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’okouzRJtJLLttBci’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’KpDcLEeRMrhfxRFcRdOFiswtXSlrjuyqFkmCSNnJGOoFLTTPFbNyJjVVNjeWengn’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-avf-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WoVBfbLYRbXDNopm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mKnqGbfvOqQMdatWumOPhDfySbcZKqquTtRWIkJndLfDFJBkDcoTvaAPngrOWjIZ’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’WoVBfbLYRbXDNopm’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’mKnqGbfvOqQMdatWumOPhDfySbcZKqquTtRWIkJndLfDFJBkDcoTvaAPngrOWjIZ’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EyGfBBGVfCPOVImr’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LXkvOhUBJyQkuMVSneyIlFIAMgSGxfcPpLCGRtsCehMXdLIpvTnBPfcDguKavamH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EyGfBBGVfCPOVImr’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LXkvOhUBJyQkuMVSneyIlFIAMgSGxfcPpLCGRtsCehMXdLIpvTnBPfcDguKavamH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cEltxaFjnMCiIZlR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TblYXuhZoYxCPHqqQrDlIVfygRCPgdKjrMmvfjrWjSORafxLwLkPRzufakNBENoS’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’cEltxaFjnMCiIZlR’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’TblYXuhZoYxCPHqqQrDlIVfygRCPgdKjrMmvfjrWjSORafxLwLkPRzufakNBENoS’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vvaBBnNACQYqrBDI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’cmIPkuEmCzJIJVLELQeaRkzmrxzHCAHgYWZzSkANoxMssdOMBTgmfkbKlGLjbQyr’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’vvaBBnNACQYqrBDI’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’cmIPkuEmCzJIJVLELQeaRkzmrxzHCAHgYWZzSkANoxMssdOMBTgmfkbKlGLjbQyr’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t3c-avf-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YDqtFAyKGxIJSjqg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LRqhPRgrUBprpfhjIZfWJAqFQAawQGmwqtYzoiWoOpNvgpYWsQkmVeERXlHxkjQj’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YDqtFAyKGxIJSjqg’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’LRqhPRgrUBprpfhjIZfWJAqFQAawQGmwqtYzoiWoOpNvgpYWsQkmVeERXlHxkjQj’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HCFZHIBcgGuFYEPX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PLFSVBSKHrtaMyyQjSZWZGweuFGWVDqUbetrLhEyzAGloIlkAgMMjuXjsUkfAmVs’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’HCFZHIBcgGuFYEPX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PLFSVBSKHrtaMyyQjSZWZGweuFGWVDqUbetrLhEyzAGloIlkAgMMjuXjsUkfAmVs’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YzzhljhTKwdFqmdD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tPfwRAttRehlHkmNbHQBPZgfuHMHFaOnAficQCZkdADxghWsNuScCygoIHnMmwnF’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’YzzhljhTKwdFqmdD’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’tPfwRAttRehlHkmNbHQBPZgfuHMHFaOnAficQCZkdADxghWsNuScCygoIHnMmwnF’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EiZZmWagvqFIBLNu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XDAhpUeILcNCjHPucxcWsOSPEyEnVkRXKODRRJHfualerxFMiJpjHZDccFKWgzCH’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’EiZZmWagvqFIBLNu’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’XDAhpUeILcNCjHPucxcWsOSPEyEnVkRXKODRRJHfualerxFMiJpjHZDccFKWgzCH’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t4c-avf-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes128cbc-hmac512sha-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GMvOZZRQUVQkUZbq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PGtzQDdcmYbgsaNgKqkBREIoclCnxrRVlLktsMwBBjnfKqdLqjthtlpPAKGzxXOL’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’GMvOZZRQUVQkUZbq’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’PGtzQDdcmYbgsaNgKqkBREIoclCnxrRVlLktsMwBBjnfKqdLqjthtlpPAKGzxXOL’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’wPPWMJjYeRUnEYOX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lvGyMreAoaiAiWDaNUvoPPsbwQvAonqcmNUtCHgjQLofaZDYDDfIqmxFUaeSFOZv’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’wPPWMJjYeRUnEYOX’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’lvGyMreAoaiAiWDaNUvoPPsbwQvAonqcmNUtCHgjQLofaZDYDDfIqmxFUaeSFOZv’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’eGSxwowqgMdpgkmF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’gDeWwVWeHmiPoMsATarCutntoBRenFGOTJDEnvihREgPbJFhPCiUZRGZFzoFjNJk’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’eGSxwowqgMdpgkmF’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’gDeWwVWeHmiPoMsATarCutntoBRenFGOTJDEnvihREgPbJFhPCiUZRGZFzoFjNJk’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OFOZoEVcDaPejazW’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HeLbADHpynhwAKxVIzjyQgrlJyXlmXSzqqrsbRnNbhHRmJesmuXLustNNNDtyDDh’}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 1, ‘crypto_key’: {‘length’: 16, ‘data’: b’OFOZoEVcDaPejazW’}, ‘integrity_algorithm’: 6, ‘integrity_key’: {‘length’: 64, ‘data’: b’HeLbADHpynhwAKxVIzjyQgrlJyXlmXSzqqrsbRnNbhHRmJesmuXLustNNNDtyDDh’}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-avf-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t2c-avf-ethip4ipsec8tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KAHIscGDEAjbSlTRANvsOJjAECjxYyWm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’KAHIscGDEAjbSlTRANvsOJjAECjxYyWm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gABSVDxxoeluGNlunokyvANHgXKDUaqe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’gABSVDxxoeluGNlunokyvANHgXKDUaqe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VUjeFhacqaVXdxSsifMaJxdHEiwgVZpr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’VUjeFhacqaVXdxSsifMaJxdHEiwgVZpr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EClbDMVYbNwQPhbcMojkxSqbgdkDIumm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’EClbDMVYbNwQPhbcMojkxSqbgdkDIumm’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t3c-avf-ethip4ipsec8tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HQDrjdgVXxUmrzhtAdIppEefuiDDPxMo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HQDrjdgVXxUmrzhtAdIppEefuiDDPxMo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CQijIlJqOpwtLlijUrdCGiwvCuBiQcQA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CQijIlJqOpwtLlijUrdCGiwvCuBiQcQA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mXicaXWPAescfXSjdDdWbuIFDJrBPPiW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mXicaXWPAescfXSjdDdWbuIFDJrBPPiW’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iVbDGDuSRbCqBgfuVjcXBCEOPsKCHJoL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iVbDGDuSRbCqBgfuVjcXBCEOPsKCHJoL’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t4c-avf-ethip4ipsec8tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GDRUjBNslfoXVXYBQvCabPQgXHEpzgJU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’GDRUjBNslfoXVXYBQvCabPQgXHEpzgJU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’sxPQzJOwfXjMLTaeQtCpmXBXiLUDOfDw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’sxPQzJOwfXjMLTaeQtCpmXBXiLUDOfDw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hstGvGuEjDGgtHfgRwutQfBUngVqThcZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hstGvGuEjDGgtHfgRwutQfBUngVqThcZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XIsWgAbrWgGpFUtNHKagFxkwMlOUfGun’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XIsWgAbrWgGpFUtNHKagFxkwMlOUfGun’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-avf-ethip4ipsec8tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’sdpWIdyBiYKLcOnwNfwIMgJwmnyyrSlX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’sdpWIdyBiYKLcOnwNfwIMgJwmnyyrSlX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xqUJaOThKuDMqwStcndosMkQVQUvNzwe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xqUJaOThKuDMqwStcndosMkQVQUvNzwe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZoWaKXOJFUcidqItnKwtccqeFaJspiZF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’ZoWaKXOJFUcidqItnKwtccqeFaJspiZF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iPLHIIplweBjtiWCrUXKuJOwWlqtmfYf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iPLHIIplweBjtiWCrUXKuJOwWlqtmfYf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t3c-avf-ethip4ipsec8tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vFdiEsKXtQzWjdbSaLPwXUbWgEKIaJfZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’vFdiEsKXtQzWjdbSaLPwXUbWgEKIaJfZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mYllmDfIPIchKTZAvqPiuzwghLOIlbqf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mYllmDfIPIchKTZAvqPiuzwghLOIlbqf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hENGGaYtzXWvcgaFcFUVaAofBzNoaHAw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hENGGaYtzXWvcgaFcFUVaAofBzNoaHAw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hOVApSxyvOUIqelYNIvoSurXebQrBLLV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’hOVApSxyvOUIqelYNIvoSurXebQrBLLV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t4c-avf-ethip4ipsec8tnlswasync- 
scheduler-ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=172687360,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
cli_inband(cmd=’set logging class avf level debug’)
avf_create(pci_addr=38469632,enable_elog=0,rxq_num=2,rxq_size=0,txq_size=0)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 2, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XrkfunJLLqPsqzHPdjeVMWEItTxomiUO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XrkfunJLLqPsqzHPdjeVMWEItTxomiUO’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’SUvpXZJtJUYRiSsbPVILQrhYUBfmEpzw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’SUvpXZJtJUYRiSsbPVILQrhYUBfmEpzw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WAjbUgxIiHsjQXHzBHaFNczMVlBrWYJz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WAjbUgxIiHsjQXHzBHaFNczMVlBrWYJz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WoQETeBzEsXwNXKqYDLwLBunPiMyvgVo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WoQETeBzEsXwNXKqYDLwLBunPiMyvgVo’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=1,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-ethip4ipsec10000tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t2c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-8t4c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t1c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t2c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-8t4c-ethip4ipsec10000tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-ethip4ipsec1tnlswasync-scheduler-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eUEzTOMpKUSDBhvoLBPQebbfxJNhRETZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eUEzTOMpKUSDBhvoLBPQebbfxJNhRETZ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t3c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WEmLmJEFmulrZAvUbjXNDwBRhBCGOvvf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WEmLmJEFmulrZAvUbjXNDwBRhBCGOvvf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JJhkNuaNvdBstzqkSBXtZLQuwPtDdnuh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’JJhkNuaNvdBstzqkSBXtZLQuwPtDdnuh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OjLOppJFLKEptSgGrVREqyPWRINIsTxy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’OjLOppJFLKEptSgGrVREqyPWRINIsTxy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t3c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cNLBoguCakiyKdCGwikqLbhKQCENvpFJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cNLBoguCakiyKdCGwikqLbhKQCENvpFJ’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t4c-ethip4ipsec1tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bNkeZnjzSldLBsaWGyxgPPhfanPMMdhK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bNkeZnjzSldLBsaWGyxgPPhfanPMMdhK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_flags(sw_if_index=3,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-ethip4ipsec40tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TwentyFiveGigabitEthernet4b/0/1 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 425a6b6550556741705951704c6566786371454a786c62576b46566c454d5744 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 425a6b6550556741705951704c6566786371454a786c62576b46566c454d5744 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 786258774169434152794b646b76656d497857554d74436e7443434b71554456 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 786258774169434152794b646b76656d497857554d74436e7443434b71554456 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 4d4974674d5a66796656614b746469726e5051786e44504473714a6858547469 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 4d4974674d5a66796656614b746469726e5051786e44504473714a6858547469 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 52624c616b764b58687065654e6a73506e514155756c797a67667775776d7078 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 52624c616b764b58687065654e6a73506e514155756c797a67667775776d7078 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 6449444571574c42564d6e4959725a564d4457694b7141714f4950414d566e4f esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 6449444571574c42564d6e4959725a564d4457694b7141714f4950414d566e4f esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 6c6f5951726e664a7a5478444a4963595770576c484e4d54636562464751486d esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 6c6f5951726e664a7a5478444a4963595770576c484e4d54636562464751486d esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 5a6e68756158697957755246564c66754e74677650674d55734f4b7647575256 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 5a6e68756158697957755246564c66754e74677650674d55734f4b7647575256 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 79467a73547951664d6347457674416672554557755570637772756a64505067 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 79467a73547951664d6347457674416672554557755570637772756a64505067 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 4963426e456e6a78536d74616d6571584678756173554944726a534670484c42 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 4963426e456e6a78536d74616d6571584678756173554944726a534670484c42 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 42784449484e6959585869745a44714b7967417568637a51706d4b7071445241 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 42784449484e6959585869745a44714b7967417568637a51706d4b7071445241 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 506e5748525370534a666f5a71496a4c7972536378496467616f525855496750 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 506e5748525370534a666f5a71496a4c7972536378496467616f525855496750 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4a74705663436c6b4c7465416751646450516650574e6a4b47506b5977534c4c esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4a74705663436c6b4c7465416751646450516650574e6a4b47506b5977534c4c esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 7a78664156615462427477774651777169797563584d7a4373527168446b4357 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 7a78664156615462427477774651777169797563584d7a4373527168446b4357 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 4c776e7152734a4f71674e7a46756451486a6c4162677a52674b626242617879 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 4c776e7152734a4f71674e7a46756451486a6c4162677a52674b626242617879 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 58795a4a4f616a694f577455454d7a7a5270696a487555795348587971665a77 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 58795a4a4f616a694f577455454d7a7a5270696a487555795348587971665a77 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 4d7973585361567450454f5164445642524f754a6166726b646747456a4b6d79 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 4d7973585361567450454f5164445642524f754a6166726b646747456a4b6d79 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 73646b4346716f496a6e724a7850656e4d656c4e66777775777162676a7a6468 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 73646b4346716f496a6e724a7850656e4d656c4e66777775777162676a7a6468 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 757374704275675a754362554946766464504b4e6547686d42534d6e7569666d esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 757374704275675a754362554946766464504b4e6547686d42534d6e7569666d esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 424e464b6b6767465346424c61725772504f4d6b597551445864486f4f417544 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 424e464b6b6767465346424c61725772504f4d6b597551445864486f4f417544 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 4d78784c55574576667a44466d5777476f594c424a4450454f66764871566a6e esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 4d78784c55574576667a44466d5777476f594c424a4450454f66764871566a6e esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 724d4775656c64486a78717865755041675370736c73485044474b64665a7a61 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 724d4775656c64486a78717865755041675370736c73485044474b64665a7a61 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 62616870726b4276524e416c4e7158644d454668547241525a4d746353586356 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 62616870726b4276524e416c4e7158644d454668547241525a4d746353586356 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 47597272575645437a79426841566f6e7053775a7673714d6943454348504342 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 47597272575645437a79426841566f6e7053775a7673714d6943454348504342 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 426f47586f6f59744d456d6c4b6850566a476270656954427645736962686464 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 426f47586f6f59744d456d6c4b6850566a476270656954427645736962686464 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 4367776f4678734c654667534a6955694f644b6e53734e4147696b624e664646 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 4367776f4678734c654667534a6955694f644b6e53734e4147696b624e664646 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 574b54686b5a7563704a657a5047674d58664c674c687856775572796e6a6846 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 574b54686b5a7563704a657a5047674d58664c674c687856775572796e6a6846 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 57634875586b734b535954416f69586b70697a4a6d6372744b4a675168477677 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 57634875586b734b535954416f69586b70697a4a6d6372744b4a675168477677 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 786b434b546666504b6a497177676e4a716842454b48554d63666d424866664a esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 786b434b546666504b6a497177676e4a716842454b48554d63666d424866664a esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 615061675146625a6b6e555a417762715a576e4c6d70686753707772627a4641 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 615061675146625a6b6e555a417762715a576e4c6d70686753707772627a4641 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 5577575542446a6e4e55495768635a55724d496b45594a4a5577734449526148 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 5577575542446a6e4e55495768635a55724d496b45594a4a5577734449526148 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 4a696f706b7847446b6b544b664659786279685a685a4c46567749786c4b4e48 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 4a696f706b7847446b6b544b664659786279685a685a4c46567749786c4b4e48 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 744a6d614a67526751504c6a4d4e795349514c7174427865454d6778774e5765 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 744a6d614a67526751504c6a4d4e795349514c7174427865454d6778774e5765 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 6b546b49644f706b565673687866597241486777474c6b74686e594373546370 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 6b546b49644f706b565673687866597241486777474c6b74686e594373546370 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 424f517954524e7a5173567a5474486f6e4649504d4275556b554c5157486143 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 424f517954524e7a5173567a5474486f6e4649504d4275556b554c5157486143 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 7470746356737a7849666a4658624276534c7461736a4a684c43746753647348 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 7470746356737a7849666a4658624276534c7461736a4a684c43746753647348 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 664e47566f55584642626b78457a504f486246744c5959786b6e59624c4d4172 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 664e47566f55584642626b78457a504f486246744c5959786b6e59624c4d4172 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 48506444496353615671516459547a575a74625a4451654c544f5a6a7276616c esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 48506444496353615671516459547a575a74625a4451654c544f5a6a7276616c esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 624c4f5177497752556c485a666d6a52676d476c6551614f48647171494b5674 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 624c4f5177497752556c485a666d6a52676d476c6551614f48647171494b5674 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 57755a465a444d656a777a4673415179724f56575a4658586e456d4441414373 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 57755a465a444d656a777a4673415179724f56575a4658586e456d4441414373 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 684b536c6662684966567945734d6c594e4f4a68636675554c43704e646c7446 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 684b536c6662684966567945734d6c594e4f4a68636675554c43704e646c7446 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TwentyFiveGigabitEthernet4b/0/1
exec set interface unnumbered ipip0 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-4t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TwentyFiveGigabitEthernet4b/0/1 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 676b436658536470424271715a554f43504965667457746d6c6649486859744a esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 676b436658536470424271715a554f43504965667457746d6c6649486859744a esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 49626c58464f71764b63774e726f627547465076564a49756153614a464e6a69 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 49626c58464f71764b63774e726f627547465076564a49756153614a464e6a69 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 67647663714f57725449527153687a5252497155556a58524e526c5659746e68 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 67647663714f57725449527153687a5252497155556a58524e526c5659746e68 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 494972526a5670516f567a5046637962534d46656c41596e6b466f6b4c4c6b55 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 494972526a5670516f567a5046637962534d46656c41596e6b466f6b4c4c6b55 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 4d4954567854596745694253684e4f4c654e426e4c4862676e42744f785a6361 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 4d4954567854596745694253684e4f4c654e426e4c4862676e42744f785a6361 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 744658714b747670454a51515646475343484c7a4f7a626d4f6c457351526b76 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 744658714b747670454a51515646475343484c7a4f7a626d4f6c457351526b76 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 62776a5862536d527756585279654e4a41736e5a494174584b636c55486b5a4a esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 62776a5862536d527756585279654e4a41736e5a494174584b636c55486b5a4a esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 446761526c4b4a45747854646463576855586c4268744f775a547a7273796743 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 446761526c4b4a45747854646463576855586c4268744f775a547a7273796743 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 4e73486f45646d716f4a514b4463516f6c6743766f43766255766e4642457546 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 4e73486f45646d716f4a514b4463516f6c6743766f43766255766e4642457546 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 4642705543756467417259634578486953614a69547370754f7a52567256594c esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 4642705543756467417259634578486953614a69547370754f7a52567256594c esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 415850584d6c434f595247645558636449697857646768624e595a6574496758 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 415850584d6c434f595247645558636449697857646768624e595a6574496758 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 6e4d6a4269517852674879517445457162474642557252456a664249644f5367 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 6e4d6a4269517852674879517445457162474642557252456a664249644f5367 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 706e4b705969484c554f45756c476d4e78764d6d5556784952626e76644c5354 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 706e4b705969484c554f45756c476d4e78764d6d5556784952626e76644c5354 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6659676a686a435077484b4f436a58614a644767694b71636479537570495269 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6659676a686a435077484b4f436a58614a644767694b71636479537570495269 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 635669494a6e4943744d6e6844476e55634d7a6f52687373586e6e636e746670 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 635669494a6e4943744d6e6844476e55634d7a6f52687373586e6e636e746670 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 56434d5263666245454f77445a776b624f687251716e7a434743626a53657241 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 56434d5263666245454f77445a776b624f687251716e7a434743626a53657241 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 624e744e46426d6b42647a6b7a556b6655556975564a574c774a6e70416a574f esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 624e744e46426d6b42647a6b7a556b6655556975564a574c774a6e70416a574f esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 596d4d4747745a495a626461434c424f67496d4961545a45757353634f6f5062 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 596d4d4747745a495a626461434c424f67496d4961545a45757353634f6f5062 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 757153744c58734349744a6b41707077654962684f784b70656c4c57504a7642 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 757153744c58734349744a6b41707077654962684f784b70656c4c57504a7642 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 476963575271574f457a4c694e50684d6b796a6863557a63734f4a64546c4b66 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 476963575271574f457a4c694e50684d6b796a6863557a63734f4a64546c4b66 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 4c586846546a4474445774414d4d514956756c776c6f4d6c6650556a544a6c61 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 4c586846546a4474445774414d4d514956756c776c6f4d6c6650556a544a6c61 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 6d4745686c7555564a5475635977794f41636570696f457a6a44674877417058 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 6d4745686c7555564a5475635977794f41636570696f457a6a44674877417058 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 6f526175696d6f72554967686245676c676b707a42536d6e497045567a524e42 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 6f526175696d6f72554967686245676c676b707a42536d6e497045567a524e42 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 65626758634d507a44556c6a4f4676776671476b485248764442454f52685266 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 65626758634d507a44556c6a4f4676776671476b485248764442454f52685266 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 547869546e73515554486f6c6e6f506a53486e72414c59685a687949614d444c esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 547869546e73515554486f6c6e6f506a53486e72414c59685a687949614d444c esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 556c54474c4a494d4c6d79776e6f477958535048684551467a4c4257634d7449 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 556c54474c4a494d4c6d79776e6f477958535048684551467a4c4257634d7449 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 4c456949625a505557476155467955596e4372544e744f504e54685778794659 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 4c456949625a505557476155467955596e4372544e744f504e54685778794659 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 5643575370456f6d4c746a735342576c536c6d654b797664454e61574c6b786a esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 5643575370456f6d4c746a735342576c536c6d654b797664454e61574c6b786a esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 52417555524b6243426b6f584a657a6d72444f76667071646167536e61546f49 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 52417555524b6243426b6f584a657a6d72444f76667071646167536e61546f49 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 4b764a59474451584f6b6d456657524d535150747877646149756b416b63494b esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 4b764a59474451584f6b6d456657524d535150747877646149756b416b63494b esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 436c727446467177646e5650456e64617362487869597548467044575a625873 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 436c727446467177646e5650456e64617362487869597548467044575a625873 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 74475578717248755769706d6c50744a73666647436a575351706d427663726d esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 74475578717248755769706d6c50744a73666647436a575351706d427663726d esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 5447417367616d42636f6b6c56597a6c4c4f51796b63594c475a4f7479457053 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 5447417367616d42636f6b6c56597a6c4c4f51796b63594c475a4f7479457053 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 6f4a694764576c6b724d494d734278754d4258716653775163665a51776c5a69 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 6f4a694764576c6b724d494d734278754d4258716653775163665a51776c5a69 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 4a524342465970595848744c534b784f534143724d65534b646d66536b497879 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 4a524342465970595848744c534b784f534143724d65534b646d66536b497879 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 4e66725771474276474b4f576e7a527051577671646a6b74424756484c6c535a esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 4e66725771474276474b4f576e7a527051577671646a6b74424756484c6c535a esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 71586e77704743624167616c687661456a504b5a574a72697266504e70484a44 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 71586e77704743624167616c687661456a504b5a574a72697266504e70484a44 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 56735154475157586250486c5170436d4a70506d4d586c616652516d7464656f esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 56735154475157586250486c5170436d4a70506d4d586c616652516d7464656f esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 5754694e6c55504870504f724c57784c566e617648506f6f756562414f7a6e46 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 5754694e6c55504870504f724c57784c566e617648506f6f756562414f7a6e46 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 6561796850727944626a67445679775972624d63626649486842646a76576372 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 6561796850727944626a67445679775972624d63626649486842646a76576372 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TwentyFiveGigabitEthernet4b/0/1
exec set interface unnumbered ipip0 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 1518b-8t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TwentyFiveGigabitEthernet4b/0/1 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 6b72616768574f435546527a6d7148787670474f63714866626f547177697a68 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 6b72616768574f435546527a6d7148787670474f63714866626f547177697a68 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 6176627964764a535a74756f51724f6d42684d616c415a4b7174476a564c436d esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 6176627964764a535a74756f51724f6d42684d616c415a4b7174476a564c436d esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 636575555863516166624d5a575052765652516f616e454756575a5574536358 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 636575555863516166624d5a575052765652516f616e454756575a5574536358 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 75726841626f574d434872785363676a7a75524f6b646d724f6869744a795177 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 75726841626f574d434872785363676a7a75524f6b646d724f6869744a795177 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 6e775164697667744c456c71657751505978596d7554694574476c6442435274 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 6e775164697667744c456c71657751505978596d7554694574476c6442435274 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 596f5044454d75647a7952775478707861585a4f7169714876664b456a704346 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 596f5044454d75647a7952775478707861585a4f7169714876664b456a704346 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 657863704c5274796d4e61646e584f756655776a54514a45686e456778574763 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 657863704c5274796d4e61646e584f756655776a54514a45686e456778574763 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 5364424f42554b5867765157445350644e4d54637343735a7359796e6745704a esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 5364424f42554b5867765157445350644e4d54637343735a7359796e6745704a esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 646e6a4a427241467866566b767249484a71774c41476b57497253544e6c6a52 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 646e6a4a427241467866566b767249484a71774c41476b57497253544e6c6a52 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 66426f4f4a436b4b416d72716d766e7a714b5049584673616267625366464d4c esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 66426f4f4a436b4b416d72716d766e7a714b5049584673616267625366464d4c esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 696357714671525446537166584850596b65546c4a4b797a4d75715746504f79 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 696357714671525446537166584850596b65546c4a4b797a4d75715746504f79 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4b6e674463696b6d4b58506e6f4965616a774546426e484241686661416e6568 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4b6e674463696b6d4b58506e6f4965616a774546426e484241686661416e6568 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 655475666d6c6961554c504e7358415174715a7152687a72737771727158774b esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 655475666d6c6961554c504e7358415174715a7152687a72737771727158774b esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 71446b5550794c7175446a595448555a414e6d4b4e784b704c73446265786e55 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 71446b5550794c7175446a595448555a414e6d4b4e784b704c73446265786e55 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 6a6b70565651444853616a4c70495763704f47766657796e614855676d785a7a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 6a6b70565651444853616a4c70495763704f47766657796e614855676d785a7a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 734e4f4774734a6a744f466e494f784a54717872754b6a6a754a52417a767957 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 734e4f4774734a6a744f466e494f784a54717872754b6a6a754a52417a767957 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 70474861644a6144494d54456447444a72434b4b6c64684b5677474a724b5248 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 70474861644a6144494d54456447444a72434b4b6c64684b5677474a724b5248 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 4e6651554463534a744565717158494c62634f6742536165706e4d6c6a6e6754 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 4e6651554463534a744565717158494c62634f6742536165706e4d6c6a6e6754 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 4c507146524b6c6678454a7879656f6d6c614b7271787a7955726a4f4562644f esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 4c507146524b6c6678454a7879656f6d6c614b7271787a7955726a4f4562644f esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 746857766656765248514948425549636f6f4e71585261656e4b494a7470476f esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 746857766656765248514948425549636f6f4e71585261656e4b494a7470476f esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 6a6d534571796768594d73544e416354695049424d466651766b6b506d6c6d47 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 6a6d534571796768594d73544e416354695049424d466651766b6b506d6c6d47 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 764f7a5652777975646d497371724b585a5059596c4962786c676b416e64547a esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 764f7a5652777975646d497371724b585a5059596c4962786c676b416e64547a esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 42616d6c6961536e5362774c426775525274647769424951694a617674596d73 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 42616d6c6961536e5362774c426775525274647769424951694a617674596d73 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 545848524d426d64726648634944764f624c5672634276716b44656c6f4c5157 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 545848524d426d64726648634944764f624c5672634276716b44656c6f4c5157 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 46716b59706f52466a71416f6942545368596265587645574f70656847505057 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 46716b59706f52466a71416f6942545368596265587645574f70656847505057 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 59527247727645736a7a46776f4f5772544b735544636b73594a6764554e4f67 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 59527247727645736a7a46776f4f5772544b735544636b73594a6764554e4f67 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 4a43456b7159527379486d736b52416e4b79456a69796f54417967674a644370 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 4a43456b7159527379486d736b52416e4b79456a69796f54417967674a644370 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 667a6e7276425245475469624e53414f71637a4f58754250726d45516d6f6a48 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 667a6e7276425245475469624e53414f71637a4f58754250726d45516d6f6a48 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 6b5574586f4f6441706b4b59784348675675414c757569534c434f4971654462 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 6b5574586f4f6441706b4b59784348675675414c757569534c434f4971654462 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 7168574a707a786f6c6778507358534d574a6f444b457374445063687858796c esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 7168574a707a786f6c6778507358534d574a6f444b457374445063687858796c esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 686c47766b7057517a567664774154704c78597675627a487253615774585255 esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 686c47766b7057517a567664774154704c78597675627a487253615774585255 esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 52734858666f4359736a4c6c516e4c50455273417466576c6a4f4950746b7976 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 52734858666f4359736a4c6c516e4c50455273417466576c6a4f4950746b7976 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 5a5776764e4a46706b465757526c4a6d53415969477364564b62487867424869 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 5a5776764e4a46706b465757526c4a6d53415969477364564b62487867424869 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 73626e41706a7045756a59727a6854567a536f6c5a6356706c74796e4c706f68 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 73626e41706a7045756a59727a6854567a536f6c5a6356706c74796e4c706f68 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 7852477a554664766d4849734d68624f516151584245585266526644644d7969 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 7852477a554664766d4849734d68624f516151584245585266526644644d7969 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 635045577a49625346654b5765614e50674167594d6c79454f4e4b63736e6c4d esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 635045577a49625346654b5765614e50674167594d6c79454f4e4b63736e6c4d esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 4d65706b6d4a65726470417346614d6b6d4e5464707a68514c77417244595566 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 4d65706b6d4a65726470417346614d6b6d4e5464707a68514c77417244595566 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 7864564d6579726a506e4758777a4d5470445844554e674f67586b50594d4b62 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 7864564d6579726a506e4758777a4d5470445844554e674f67586b50594d4b62 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 45696f7875536c735453436d675671546f724877414d6c6b7946654c5947656e esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 45696f7875536c735453436d675671546f724877414d6c6b7946654c5947656e esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 7442566755554e4f434e6558504d47434f6d4b7959776c565949575149726851 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 7442566755554e4f434e6558504d47434f6d4b7959776c565949575149726851 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TwentyFiveGigabitEthernet4b/0/1
exec set interface unnumbered ipip0 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-2t1c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TwentyFiveGigabitEthernet4b/0/1 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 6e5a7850536c62626e726f6d6f514769777a497956744149614e435963474b45 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 6e5a7850536c62626e726f6d6f514769777a497956744149614e435963474b45 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 776f6d65524a464c4e4747686e53566c796a746b6d6279436b726a4a4c637872 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 776f6d65524a464c4e4747686e53566c796a746b6d6279436b726a4a4c637872 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 516250704a55415356756f5958746a616f764c696f73656a75416b587174626d esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 516250704a55415356756f5958746a616f764c696f73656a75416b587174626d esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 71414c64674a674c65497747754d4c526170416d7570666c456b686b54464b67 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 71414c64674a674c65497747754d4c526170416d7570666c456b686b54464b67 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 564b475a476345746465716879444d6d6a48444f5571474355744e544d6b476c esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 564b475a476345746465716879444d6d6a48444f5571474355744e544d6b476c esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 545a777342645559656365704c71595062635074774d5771634a544459675368 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 545a777342645559656365704c71595062635074774d5771634a544459675368 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 73717959704756776452655a4555544e7852414a46456967665062525973586c esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 73717959704756776452655a4555544e7852414a46456967665062525973586c esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 58637742486e5a454f654b4879416b486664585a5448504167664b5146737363 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 58637742486e5a454f654b4879416b486664585a5448504167664b5146737363 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 41684e5254624d4a72736b4f786d6b71677a76554c6a706b6244427341507341 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 41684e5254624d4a72736b4f786d6b71677a76554c6a706b6244427341507341 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 49626a6a514d7a547567516852527448544b56695967706758574b4e504c6863 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 49626a6a514d7a547567516852527448544b56695967706758574b4e504c6863 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 746e51655543646643794b486174676d727a47756f626b75524b645977767944 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 746e51655543646643794b486174676d727a47756f626b75524b645977767944 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 736b6f4179547a644f614f646f5852545a7862714d496e74716572476e717976 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 736b6f4179547a644f614f646f5852545a7862714d496e74716572476e717976 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 6570495a714e7757695062564b586e6f4b747178776747764e58484349597041 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 6570495a714e7757695062564b586e6f4b747178776747764e58484349597041 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 426272617872524b734165734f6c6d466a70465a6f73586d796957594d6a746c esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 426272617872524b734165734f6c6d466a70465a6f73586d796957594d6a746c esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 644d6459476f6e435969486443774454437050797a4a436c465a58494f74796e esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 644d6459476f6e435969486443774454437050797a4a436c465a58494f74796e esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 6e6f62514d6c4b4d58446a4e6b735352456478657642666f42654571795a764c esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 6e6f62514d6c4b4d58446a4e6b735352456478657642666f42654571795a764c esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 434f574b7469494b48796c4e51477371436d5153616c72796c4a7a694d506a6a esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 434f574b7469494b48796c4e51477371436d5153616c72796c4a7a694d506a6a esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 526e54706350637947684c4b414c506d41797767555956557a416a734267546c esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 526e54706350637947684c4b414c506d41797767555956557a416a734267546c esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 626b654e5a43636a7355536c726b426254446f6a6a4d5076546b467277534165 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 626b654e5a43636a7355536c726b426254446f6a6a4d5076546b467277534165 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 47664278644f5163667651536e666268666a424e774c7a714b77517649674f44 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 47664278644f5163667651536e666268666a424e774c7a714b77517649674f44 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 57674146736c45425648664b6b4b594c62595566466365715058534e726e6f62 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 57674146736c45425648664b6b4b594c62595566466365715058534e726e6f62 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 4b706667697a4c6f6466484f57764c644d79447670537478524b6b746245654b esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 4b706667697a4c6f6466484f57764c644d79447670537478524b6b746245654b esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 786e69556d56524947776a63556b4a53706b684a6c586c63677852785a555565 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 786e69556d56524947776a63556b4a53706b684a6c586c63677852785a555565 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 67756f4854565a7a685a69726b4e6b53556b59734c7572676e62656850544d57 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 67756f4854565a7a685a69726b4e6b53556b59734c7572676e62656850544d57 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 5a6856784b6c646e485551784d4f4b4a6278687654776f6e6274515754514c43 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 5a6856784b6c646e485551784d4f4b4a6278687654776f6e6274515754514c43 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 476c4f6553624b6a7a756f517969637a4b4161464e774a6e685776614a416168 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 476c4f6553624b6a7a756f517969637a4b4161464e774a6e685776614a416168 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 6a6b6461704f6b73726c455578614d4c5a4e6d425a514e675454746146495074 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 6a6b6461704f6b73726c455578614d4c5a4e6d425a514e675454746146495074 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 5464746f484547786674584a6c776f4d544c454b66494c764f6e526865436172 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 5464746f484547786674584a6c776f4d544c454b66494c764f6e526865436172 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 5747746a5a43704f6c6c494a736b6853794270696b6e7a52517147795a4b4d54 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 5747746a5a43704f6c6c494a736b6853794270696b6e7a52517147795a4b4d54 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 474f544a657944584976686b746641616e58674c524c7042557675724d624651 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 474f544a657944584976686b746641616e58674c524c7042557675724d624651 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 74585643414e7054646c5356764c4b4462626e5a554d736652786d445948564b esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 74585643414e7054646c5356764c4b4462626e5a554d736652786d445948564b esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 5a537161664a4d575843777045534b7845696a42664d66424d547a5346726a71 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 5a537161664a4d575843777045534b7845696a42664d66424d547a5346726a71 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 6c7a53796e6e6462504243676a6f796d684e7171584e58706b4347596f505450 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 6c7a53796e6e6462504243676a6f796d684e7171584e58706b4347596f505450 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 534f754c4a506a426e586251434c73474a517a7a714168755153504c6757474c esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 534f754c4a506a426e586251434c73474a517a7a714168755153504c6757474c esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 41506a46466447446168724147735859656f6145776e776f7a457972526f6a6e esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 41506a46466447446168724147735859656f6145776e776f7a457972526f6a6e esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 474f746a5972594156645a664d475343617470517261694d4f47566a6a4f6470 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 474f746a5972594156645a664d475343617470517261694d4f47566a6a4f6470 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 6b624a744d6554587168717656626d66726a565a57584a4751657a786a484e46 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 6b624a744d6554587168717656626d66726a565a57584a4751657a786a484e46 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 58516e74444a757763765353496b587565544e454b6a59636f776c7861565975 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 58516e74444a757763765353496b587565544e454b6a59636f776c7861565975 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 74475a4144416b715251524f6b6d6e576364505269546f536146656e4b614644 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 74475a4144416b715251524f6b6d6e576364505269546f536146656e4b614644 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 4f5561737164477a676a624b614f617156684f6252527066674d4e6e4b654d72 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 4f5561737164477a676a624b614f617156684f6252527066674d4e6e4b654d72 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TwentyFiveGigabitEthernet4b/0/1
exec set interface unnumbered ipip0 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-4t2c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TwentyFiveGigabitEthernet4b/0/1 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 4b454e67766f43617869645876476e42504b7866624875544c7547706f6d4c50 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 4b454e67766f43617869645876476e42504b7866624875544c7547706f6d4c50 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 6e6e686d5379675056776c6977434a5169456a56506869537575636876765370 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 6e6e686d5379675056776c6977434a5169456a56506869537575636876765370 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 555973454f6c4a456557616d72746b6f5244676d42415862496a50656e445373 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 555973454f6c4a456557616d72746b6f5244676d42415862496a50656e445373 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 6443704d4c4b626264476f67556278754c7347627579724343636f486f746162 esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 6443704d4c4b626264476f67556278754c7347627579724343636f486f746162 esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 65737a6543756b524c51496d67626e6253766d756b4146796977456959566955 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 65737a6543756b524c51496d67626e6253766d756b4146796977456959566955 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 4778774c515146744552764d48627963724e5547785946617455504e734d5463 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 4778774c515146744552764d48627963724e5547785946617455504e734d5463 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 4b7964495953754a57566d6b644f504f747969724e547868454f4b76496a5769 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 4b7964495953754a57566d6b644f504f747969724e547868454f4b76496a5769 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 437370556b7458644e55627070657548564c764e704b4b585a67485359667157 esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 437370556b7458644e55627070657548564c764e704b4b585a67485359667157 esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 77736d776765637543474f6858425867726658735276534f64444a696d616461 esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 77736d776765637543474f6858425867726658735276534f64444a696d616461 esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 534b754565444a427279594153617479517358765a66476c41477a796c517961 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 534b754565444a427279594153617479517358765a66476c41477a796c517961 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 47646a57504c726c69537757676252797571756f7151565a6371654e7070514d esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 47646a57504c726c69537757676252797571756f7151565a6371654e7070514d esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 4d6652667863454e4d435a656f557248554b746f686c634262424f69656d546a esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 4d6652667863454e4d435a656f557248554b746f686c634262424f69656d546a esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 5479657546745474787a777959494e746a79437965764d4758426a6762524f69 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 5479657546745474787a777959494e746a79437965764d4758426a6762524f69 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 6d6462596f41516a7257486f4e4a4477776c5668694c794e5a48454d4d636c6d esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 6d6462596f41516a7257486f4e4a4477776c5668694c794e5a48454d4d636c6d esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 576a7342584e53624d6c5644667556635278426a7a71796a6a7a6d6b75486c6a esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 576a7342584e53624d6c5644667556635278426a7a71796a6a7a6d6b75486c6a esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 5655754668545042445a7077764845494c507270506f7767444a47684847764b esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 5655754668545042445a7077764845494c507270506f7767444a47684847764b esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 5a6d5063704a715977516d445a4b5a4e5378496d437053546d5a4445496b754a esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 5a6d5063704a715977516d445a4b5a4e5378496d437053546d5a4445496b754a esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 686a6c726f47676972577341414548664a4e666c6253464255535a6e4e7a5279 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 686a6c726f47676972577341414548664a4e666c6253464255535a6e4e7a5279 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 4274614f70494f66696f6743525155504173664c614e79567954776b76776d41 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 4274614f70494f66696f6743525155504173664c614e79567954776b76776d41 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 4c6d5850466c4459426e4d6671786e4e4a464f7a456650646b41706e46526b64 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 4c6d5850466c4459426e4d6671786e4e4a464f7a456650646b41706e46526b64 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 45624479754c736b6344744a56537075507876716c6469694b46566f63794f66 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 45624479754c736b6344744a56537075507876716c6469694b46566f63794f66 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 465577434777417478487a5346585a58797948636b656c766a585848616a4278 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 465577434777417478487a5346585a58797948636b656c766a585848616a4278 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 736f4a6b695a67475347626e6851784966425a5161444762714b4b6d4c4a7472 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 736f4a6b695a67475347626e6851784966425a5161444762714b4b6d4c4a7472 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 455656666971684375675151616c68644b6d71576261676a796c69676c495a51 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 455656666971684375675151616c68644b6d71576261676a796c69676c495a51 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 4a595750435a766d794e4a4476447a59755153776d645168416e517848554d50 esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 4a595750435a766d794e4a4476447a59755153776d645168416e517848554d50 esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 56695151746f62716f625a626548696c6f43546e65776d6351466e4b65716e4c esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 56695151746f62716f625a626548696c6f43546e65776d6351466e4b65716e4c esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 6c574b654d6b646d767a47446e7648766c654671467664615050596449694d49 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 6c574b654d6b646d767a47446e7648766c654671467664615050596449694d49 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 795a4b51664869736873776c484652516d657448584a646e637a634651585062 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 795a4b51664869736873776c484652516d657448584a646e637a634651585062 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 6572647a4b6272716f6f504257506741454d6c63704b646b706a546a78657172 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 6572647a4b6272716f6f504257506741454d6c63704b646b706a546a78657172 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 755069757744506550507742495655586761517147636843566754425972644f esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 755069757744506550507742495655586761517147636843566754425972644f esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 577479487276655149664d50456f6e5a4c554c455a484f6a41414f62574a666e esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 577479487276655149664d50456f6e5a4c554c455a484f6a41414f62574a666e esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 554f746b705a7665674e6c464d69556a7948644a7a6c7866595846646355654a esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 554f746b705a7665674e6c464d69556a7948644a7a6c7866595846646355654a esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 6e746d41574b50494672594d76564b516a78685268486e466f65645476444b5a esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 6e746d41574b50494672594d76564b516a78685268486e466f65645476444b5a esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 5757566b45416c4f6a46617453506e705a426a44517454646a45764b52786255 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 5757566b45416c4f6a46617453506e705a426a44517454646a45764b52786255 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 766f6446627876616e50626b5a6d61595652774b7641596c596a595846694971 esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 766f6446627876616e50626b5a6d61595652774b7641596c596a595846694971 esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 646d466247764a59437444626f6d747050744a7569425462555a4e76704e5565 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 646d466247764a59437444626f6d747050744a7569425462555a4e76704e5565 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 6f666b5a72547a53464c61735657796d796d4c6c71725849716961744d47786a esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 6f666b5a72547a53464c61735657796d796d4c6c71725849716961744d47786a esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 587376746558504d5164717243796c784f6d694f497141744e4d6b64496a4878 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 587376746558504d5164717243796c784f6d694f497141744e4d6b64496a4878 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 646d43444d6a6556755048415a4b4c555a5775784f5942455a6c725872555471 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 646d43444d6a6556755048415a4b4c555a5775784f5942455a6c725872555471 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 62656c4d617270596d644a6a446464514e57424e704e48456e4b496a57484775 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 62656c4d617270596d644a6a446464514e57424e704e48456e4b496a57484775 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TwentyFiveGigabitEthernet4b/0/1
exec set interface unnumbered ipip0 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

 imix-8t4c-ethip4ipsec40tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
exec set interface ip address TwentyFiveGigabitEthernet4b/0/1 200.0.0.102/24.0
exec create ipip tunnel src 200.0.0.102 dst 100.0.0.1 p2p
exec ipsec sa add 100000 spi 200000 crypto-alg aes-gcm-256 crypto-key 5370486f666b48674b46457a695863536352744779474257466c72715a6e5856 esp
exec ipsec sa add 0 spi 100000 crypto-alg aes-gcm-256 crypto-key 5370486f666b48674b46457a695863536352744779474257466c72715a6e5856 esp
exec ipsec tunnel protect ipip0 sa-out 100000 sa-in 0 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.1.1 p2p
exec ipsec sa add 100001 spi 200001 crypto-alg aes-gcm-256 crypto-key 6363644b5875515066776b484464684a616d4c6a6775654d59764445596a4668 esp
exec ipsec sa add 1 spi 100001 crypto-alg aes-gcm-256 crypto-key 6363644b5875515066776b484464684a616d4c6a6775654d59764445596a4668 esp
exec ipsec tunnel protect ipip1 sa-out 100001 sa-in 1 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.2.1 p2p
exec ipsec sa add 100002 spi 200002 crypto-alg aes-gcm-256 crypto-key 5374715577465366446c4d677464597652504d727a45444870657a6973486167 esp
exec ipsec sa add 2 spi 100002 crypto-alg aes-gcm-256 crypto-key 5374715577465366446c4d677464597652504d727a45444870657a6973486167 esp
exec ipsec tunnel protect ipip2 sa-out 100002 sa-in 2 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.3.1 p2p
exec ipsec sa add 100003 spi 200003 crypto-alg aes-gcm-256 crypto-key 555542685448504350727356584f6a796e696d515a6c7478746265795a56485a esp
exec ipsec sa add 3 spi 100003 crypto-alg aes-gcm-256 crypto-key 555542685448504350727356584f6a796e696d515a6c7478746265795a56485a esp
exec ipsec tunnel protect ipip3 sa-out 100003 sa-in 3 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.4.1 p2p
exec ipsec sa add 100004 spi 200004 crypto-alg aes-gcm-256 crypto-key 6354744368446d61416374554c4146626670766e425567746d594e5742796170 esp
exec ipsec sa add 4 spi 100004 crypto-alg aes-gcm-256 crypto-key 6354744368446d61416374554c4146626670766e425567746d594e5742796170 esp
exec ipsec tunnel protect ipip4 sa-out 100004 sa-in 4 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.5.1 p2p
exec ipsec sa add 100005 spi 200005 crypto-alg aes-gcm-256 crypto-key 755076717a614d6e74556a51746d49747455597767536a665463414653636962 esp
exec ipsec sa add 5 spi 100005 crypto-alg aes-gcm-256 crypto-key 755076717a614d6e74556a51746d49747455597767536a665463414653636962 esp
exec ipsec tunnel protect ipip5 sa-out 100005 sa-in 5 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.6.1 p2p
exec ipsec sa add 100006 spi 200006 crypto-alg aes-gcm-256 crypto-key 71756b6f7375504b4446526274695a536d72755269427a4251534c4e78534258 esp
exec ipsec sa add 6 spi 100006 crypto-alg aes-gcm-256 crypto-key 71756b6f7375504b4446526274695a536d72755269427a4251534c4e78534258 esp
exec ipsec tunnel protect ipip6 sa-out 100006 sa-in 6 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.7.1 p2p
exec ipsec sa add 100007 spi 200007 crypto-alg aes-gcm-256 crypto-key 594772464c59547879545059686569595a6776477257706465634b76624e475a esp
exec ipsec sa add 7 spi 100007 crypto-alg aes-gcm-256 crypto-key 594772464c59547879545059686569595a6776477257706465634b76624e475a esp
exec ipsec tunnel protect ipip7 sa-out 100007 sa-in 7 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.8.1 p2p
exec ipsec sa add 100008 spi 200008 crypto-alg aes-gcm-256 crypto-key 784376466a4f4d6647424f70764c74727a634b776b754f6646486b756a54686b esp
exec ipsec sa add 8 spi 100008 crypto-alg aes-gcm-256 crypto-key 784376466a4f4d6647424f70764c74727a634b776b754f6646486b756a54686b esp
exec ipsec tunnel protect ipip8 sa-out 100008 sa-in 8 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.9.1 p2p
exec ipsec sa add 100009 spi 200009 crypto-alg aes-gcm-256 crypto-key 636779454c674c616664707a4f6f554675586c65695275414e46686557476a76 esp
exec ipsec sa add 9 spi 100009 crypto-alg aes-gcm-256 crypto-key 636779454c674c616664707a4f6f554675586c65695275414e46686557476a76 esp
exec ipsec tunnel protect ipip9 sa-out 100009 sa-in 9 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.10.1 p2p
exec ipsec sa add 100010 spi 200010 crypto-alg aes-gcm-256 crypto-key 79496d625364565a536d43415158546c4b6c514c6557754c47546c4c62596273 esp
exec ipsec sa add 10 spi 100010 crypto-alg aes-gcm-256 crypto-key 79496d625364565a536d43415158546c4b6c514c6557754c47546c4c62596273 esp
exec ipsec tunnel protect ipip10 sa-out 100010 sa-in 10 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.11.1 p2p
exec ipsec sa add 100011 spi 200011 crypto-alg aes-gcm-256 crypto-key 61706b695453797866624e455a4c4b555479494e594b79576d56577169707462 esp
exec ipsec sa add 11 spi 100011 crypto-alg aes-gcm-256 crypto-key 61706b695453797866624e455a4c4b555479494e594b79576d56577169707462 esp
exec ipsec tunnel protect ipip11 sa-out 100011 sa-in 11 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.12.1 p2p
exec ipsec sa add 100012 spi 200012 crypto-alg aes-gcm-256 crypto-key 5461584f4f45577a7a734e72645844426b6853544b5a497847656b416b725576 esp
exec ipsec sa add 12 spi 100012 crypto-alg aes-gcm-256 crypto-key 5461584f4f45577a7a734e72645844426b6853544b5a497847656b416b725576 esp
exec ipsec tunnel protect ipip12 sa-out 100012 sa-in 12 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.13.1 p2p
exec ipsec sa add 100013 spi 200013 crypto-alg aes-gcm-256 crypto-key 7374766f5062566874616870766e6f6d4256557853714f78454a7a7071774f50 esp
exec ipsec sa add 13 spi 100013 crypto-alg aes-gcm-256 crypto-key 7374766f5062566874616870766e6f6d4256557853714f78454a7a7071774f50 esp
exec ipsec tunnel protect ipip13 sa-out 100013 sa-in 13 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.14.1 p2p
exec ipsec sa add 100014 spi 200014 crypto-alg aes-gcm-256 crypto-key 446c6a596d6e5a474c50715766716873554d6a72517867786c745a6a595a4e63 esp
exec ipsec sa add 14 spi 100014 crypto-alg aes-gcm-256 crypto-key 446c6a596d6e5a474c50715766716873554d6a72517867786c745a6a595a4e63 esp
exec ipsec tunnel protect ipip14 sa-out 100014 sa-in 14 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.15.1 p2p
exec ipsec sa add 100015 spi 200015 crypto-alg aes-gcm-256 crypto-key 43664948595674686b4e41684977704f546255457942556e6544555868787667 esp
exec ipsec sa add 15 spi 100015 crypto-alg aes-gcm-256 crypto-key 43664948595674686b4e41684977704f546255457942556e6544555868787667 esp
exec ipsec tunnel protect ipip15 sa-out 100015 sa-in 15 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.16.1 p2p
exec ipsec sa add 100016 spi 200016 crypto-alg aes-gcm-256 crypto-key 4e624479547450507545674256777a4b455a6d4d6d4446706774577a6e7a4675 esp
exec ipsec sa add 16 spi 100016 crypto-alg aes-gcm-256 crypto-key 4e624479547450507545674256777a4b455a6d4d6d4446706774577a6e7a4675 esp
exec ipsec tunnel protect ipip16 sa-out 100016 sa-in 16 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.17.1 p2p
exec ipsec sa add 100017 spi 200017 crypto-alg aes-gcm-256 crypto-key 68706173796b53566c786e457741465452636a6b4f7743676974587541626f52 esp
exec ipsec sa add 17 spi 100017 crypto-alg aes-gcm-256 crypto-key 68706173796b53566c786e457741465452636a6b4f7743676974587541626f52 esp
exec ipsec tunnel protect ipip17 sa-out 100017 sa-in 17 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.18.1 p2p
exec ipsec sa add 100018 spi 200018 crypto-alg aes-gcm-256 crypto-key 45534c667575436668574e42586b4570566f52626869766f756249556b6c6856 esp
exec ipsec sa add 18 spi 100018 crypto-alg aes-gcm-256 crypto-key 45534c667575436668574e42586b4570566f52626869766f756249556b6c6856 esp
exec ipsec tunnel protect ipip18 sa-out 100018 sa-in 18 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.19.1 p2p
exec ipsec sa add 100019 spi 200019 crypto-alg aes-gcm-256 crypto-key 795071736a794b4d514852474a6f4e4454664358515a717544795a415a4e7952 esp
exec ipsec sa add 19 spi 100019 crypto-alg aes-gcm-256 crypto-key 795071736a794b4d514852474a6f4e4454664358515a717544795a415a4e7952 esp
exec ipsec tunnel protect ipip19 sa-out 100019 sa-in 19 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.20.1 p2p
exec ipsec sa add 100020 spi 200020 crypto-alg aes-gcm-256 crypto-key 686f4a5049576c52455a5a54754f635a774747476b6b546e5679674c447a5870 esp
exec ipsec sa add 20 spi 100020 crypto-alg aes-gcm-256 crypto-key 686f4a5049576c52455a5a54754f635a774747476b6b546e5679674c447a5870 esp
exec ipsec tunnel protect ipip20 sa-out 100020 sa-in 20 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.21.1 p2p
exec ipsec sa add 100021 spi 200021 crypto-alg aes-gcm-256 crypto-key 55616a6c5a44647962446c66485272535446585269586748684e4a514e487652 esp
exec ipsec sa add 21 spi 100021 crypto-alg aes-gcm-256 crypto-key 55616a6c5a44647962446c66485272535446585269586748684e4a514e487652 esp
exec ipsec tunnel protect ipip21 sa-out 100021 sa-in 21 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.22.1 p2p
exec ipsec sa add 100022 spi 200022 crypto-alg aes-gcm-256 crypto-key 6c797143766e787163456644585944664a43436544466154567774546a464578 esp
exec ipsec sa add 22 spi 100022 crypto-alg aes-gcm-256 crypto-key 6c797143766e787163456644585944664a43436544466154567774546a464578 esp
exec ipsec tunnel protect ipip22 sa-out 100022 sa-in 22 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.23.1 p2p
exec ipsec sa add 100023 spi 200023 crypto-alg aes-gcm-256 crypto-key 48514674515442577269525567414b69727354674a50657a4759474d516c7159 esp
exec ipsec sa add 23 spi 100023 crypto-alg aes-gcm-256 crypto-key 48514674515442577269525567414b69727354674a50657a4759474d516c7159 esp
exec ipsec tunnel protect ipip23 sa-out 100023 sa-in 23 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.24.1 p2p
exec ipsec sa add 100024 spi 200024 crypto-alg aes-gcm-256 crypto-key 4471535774477270516861786c71677a55746a50687a6c61676646464757554f esp
exec ipsec sa add 24 spi 100024 crypto-alg aes-gcm-256 crypto-key 4471535774477270516861786c71677a55746a50687a6c61676646464757554f esp
exec ipsec tunnel protect ipip24 sa-out 100024 sa-in 24 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.25.1 p2p
exec ipsec sa add 100025 spi 200025 crypto-alg aes-gcm-256 crypto-key 74636f4c575a62516a535269744f7255754850794b56696a684e6c6769536364 esp
exec ipsec sa add 25 spi 100025 crypto-alg aes-gcm-256 crypto-key 74636f4c575a62516a535269744f7255754850794b56696a684e6c6769536364 esp
exec ipsec tunnel protect ipip25 sa-out 100025 sa-in 25 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.26.1 p2p
exec ipsec sa add 100026 spi 200026 crypto-alg aes-gcm-256 crypto-key 454b6d706b4565724c706f76774747444879554e4e5568705870416575526f65 esp
exec ipsec sa add 26 spi 100026 crypto-alg aes-gcm-256 crypto-key 454b6d706b4565724c706f76774747444879554e4e5568705870416575526f65 esp
exec ipsec tunnel protect ipip26 sa-out 100026 sa-in 26 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.27.1 p2p
exec ipsec sa add 100027 spi 200027 crypto-alg aes-gcm-256 crypto-key 6e476c5555506e744f495864554a786d555a55716a68625a634e6875554e6e71 esp
exec ipsec sa add 27 spi 100027 crypto-alg aes-gcm-256 crypto-key 6e476c5555506e744f495864554a786d555a55716a68625a634e6875554e6e71 esp
exec ipsec tunnel protect ipip27 sa-out 100027 sa-in 27 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.28.1 p2p
exec ipsec sa add 100028 spi 200028 crypto-alg aes-gcm-256 crypto-key 59725761427954484343584a626457686774687a6661774d6671715268485067 esp
exec ipsec sa add 28 spi 100028 crypto-alg aes-gcm-256 crypto-key 59725761427954484343584a626457686774687a6661774d6671715268485067 esp
exec ipsec tunnel protect ipip28 sa-out 100028 sa-in 28 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.29.1 p2p
exec ipsec sa add 100029 spi 200029 crypto-alg aes-gcm-256 crypto-key 4344454258586649455a7559504b517a454c6565745368674a664174416b7276 esp
exec ipsec sa add 29 spi 100029 crypto-alg aes-gcm-256 crypto-key 4344454258586649455a7559504b517a454c6565745368674a664174416b7276 esp
exec ipsec tunnel protect ipip29 sa-out 100029 sa-in 29 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.30.1 p2p
exec ipsec sa add 100030 spi 200030 crypto-alg aes-gcm-256 crypto-key 59425673524473756c5357486c7543424d56456d507844546443716d7562426b esp
exec ipsec sa add 30 spi 100030 crypto-alg aes-gcm-256 crypto-key 59425673524473756c5357486c7543424d56456d507844546443716d7562426b esp
exec ipsec tunnel protect ipip30 sa-out 100030 sa-in 30 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.31.1 p2p
exec ipsec sa add 100031 spi 200031 crypto-alg aes-gcm-256 crypto-key 5a4b586a6649566a7874447745714266645553696f756e49564b4a466b664a76 esp
exec ipsec sa add 31 spi 100031 crypto-alg aes-gcm-256 crypto-key 5a4b586a6649566a7874447745714266645553696f756e49564b4a466b664a76 esp
exec ipsec tunnel protect ipip31 sa-out 100031 sa-in 31 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.32.1 p2p
exec ipsec sa add 100032 spi 200032 crypto-alg aes-gcm-256 crypto-key 6567635a58534f5167724d42786d717a7468766e6259616b4971565351726551 esp
exec ipsec sa add 32 spi 100032 crypto-alg aes-gcm-256 crypto-key 6567635a58534f5167724d42786d717a7468766e6259616b4971565351726551 esp
exec ipsec tunnel protect ipip32 sa-out 100032 sa-in 32 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.33.1 p2p
exec ipsec sa add 100033 spi 200033 crypto-alg aes-gcm-256 crypto-key 746c554862764a6364577363546f5a6c6a614e59656970786d796a7359726861 esp
exec ipsec sa add 33 spi 100033 crypto-alg aes-gcm-256 crypto-key 746c554862764a6364577363546f5a6c6a614e59656970786d796a7359726861 esp
exec ipsec tunnel protect ipip33 sa-out 100033 sa-in 33 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.34.1 p2p
exec ipsec sa add 100034 spi 200034 crypto-alg aes-gcm-256 crypto-key 666b6b5275584176714a53774d48515a616f66756e57765a51525342754a686e esp
exec ipsec sa add 34 spi 100034 crypto-alg aes-gcm-256 crypto-key 666b6b5275584176714a53774d48515a616f66756e57765a51525342754a686e esp
exec ipsec tunnel protect ipip34 sa-out 100034 sa-in 34 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.35.1 p2p
exec ipsec sa add 100035 spi 200035 crypto-alg aes-gcm-256 crypto-key 4e4f5756786379796e6e42616d7848737076456f5478745547616c4f43786770 esp
exec ipsec sa add 35 spi 100035 crypto-alg aes-gcm-256 crypto-key 4e4f5756786379796e6e42616d7848737076456f5478745547616c4f43786770 esp
exec ipsec tunnel protect ipip35 sa-out 100035 sa-in 35 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.36.1 p2p
exec ipsec sa add 100036 spi 200036 crypto-alg aes-gcm-256 crypto-key 4666786d76556f51454451755741494646645151655a6d514e4c55514f684b52 esp
exec ipsec sa add 36 spi 100036 crypto-alg aes-gcm-256 crypto-key 4666786d76556f51454451755741494646645151655a6d514e4c55514f684b52 esp
exec ipsec tunnel protect ipip36 sa-out 100036 sa-in 36 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.37.1 p2p
exec ipsec sa add 100037 spi 200037 crypto-alg aes-gcm-256 crypto-key 4b72644b52754a5a76626a644a7943566f4370526f4f4751424b717977734c62 esp
exec ipsec sa add 37 spi 100037 crypto-alg aes-gcm-256 crypto-key 4b72644b52754a5a76626a644a7943566f4370526f4f4751424b717977734c62 esp
exec ipsec tunnel protect ipip37 sa-out 100037 sa-in 37 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.38.1 p2p
exec ipsec sa add 100038 spi 200038 crypto-alg aes-gcm-256 crypto-key 4b706e62516b6a5a555a6854524f556b5047776949664e46717170526e464666 esp
exec ipsec sa add 38 spi 100038 crypto-alg aes-gcm-256 crypto-key 4b706e62516b6a5a555a6854524f556b5047776949664e46717170526e464666 esp
exec ipsec tunnel protect ipip38 sa-out 100038 sa-in 38 add
exec create ipip tunnel src 200.0.0.102 dst 100.0.39.1 p2p
exec ipsec sa add 100039 spi 200039 crypto-alg aes-gcm-256 crypto-key 6c71504f6c4a795146595477486674626777434d5373557a566d4e676a775052 esp
exec ipsec sa add 39 spi 100039 crypto-alg aes-gcm-256 crypto-key 6c71504f6c4a795146595477486674626777434d5373557a566d4e676a775052 esp
exec ipsec tunnel protect ipip39 sa-out 100039 sa-in 39 add
exec ip route add 100.0.0.1/8 via 200.0.0.101 TwentyFiveGigabitEthernet4b/0/1
exec set interface unnumbered ipip0 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip0 up
exec ip route add 10.0.0.0/32 via ipip0
exec set interface unnumbered ipip1 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip1 up
exec ip route add 10.0.0.1/32 via ipip1
exec set interface unnumbered ipip2 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip2 up
exec ip route add 10.0.0.2/32 via ipip2
exec set interface unnumbered ipip3 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip3 up
exec ip route add 10.0.0.3/32 via ipip3
exec set interface unnumbered ipip4 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip4 up
exec ip route add 10.0.0.4/32 via ipip4
exec set interface unnumbered ipip5 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip5 up
exec ip route add 10.0.0.5/32 via ipip5
exec set interface unnumbered ipip6 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip6 up
exec ip route add 10.0.0.6/32 via ipip6
exec set interface unnumbered ipip7 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip7 up
exec ip route add 10.0.0.7/32 via ipip7
exec set interface unnumbered ipip8 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip8 up
exec ip route add 10.0.0.8/32 via ipip8
exec set interface unnumbered ipip9 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip9 up
exec ip route add 10.0.0.9/32 via ipip9
exec set interface unnumbered ipip10 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip10 up
exec ip route add 10.0.0.10/32 via ipip10
exec set interface unnumbered ipip11 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip11 up
exec ip route add 10.0.0.11/32 via ipip11
exec set interface unnumbered ipip12 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip12 up
exec ip route add 10.0.0.12/32 via ipip12
exec set interface unnumbered ipip13 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip13 up
exec ip route add 10.0.0.13/32 via ipip13
exec set interface unnumbered ipip14 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip14 up
exec ip route add 10.0.0.14/32 via ipip14
exec set interface unnumbered ipip15 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip15 up
exec ip route add 10.0.0.15/32 via ipip15
exec set interface unnumbered ipip16 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip16 up
exec ip route add 10.0.0.16/32 via ipip16
exec set interface unnumbered ipip17 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip17 up
exec ip route add 10.0.0.17/32 via ipip17
exec set interface unnumbered ipip18 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip18 up
exec ip route add 10.0.0.18/32 via ipip18
exec set interface unnumbered ipip19 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip19 up
exec ip route add 10.0.0.19/32 via ipip19
exec set interface unnumbered ipip20 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip20 up
exec ip route add 10.0.0.20/32 via ipip20
exec set interface unnumbered ipip21 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip21 up
exec ip route add 10.0.0.21/32 via ipip21
exec set interface unnumbered ipip22 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip22 up
exec ip route add 10.0.0.22/32 via ipip22
exec set interface unnumbered ipip23 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip23 up
exec ip route add 10.0.0.23/32 via ipip23
exec set interface unnumbered ipip24 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip24 up
exec ip route add 10.0.0.24/32 via ipip24
exec set interface unnumbered ipip25 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip25 up
exec ip route add 10.0.0.25/32 via ipip25
exec set interface unnumbered ipip26 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip26 up
exec ip route add 10.0.0.26/32 via ipip26
exec set interface unnumbered ipip27 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip27 up
exec ip route add 10.0.0.27/32 via ipip27
exec set interface unnumbered ipip28 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip28 up
exec ip route add 10.0.0.28/32 via ipip28
exec set interface unnumbered ipip29 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip29 up
exec ip route add 10.0.0.29/32 via ipip29
exec set interface unnumbered ipip30 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip30 up
exec ip route add 10.0.0.30/32 via ipip30
exec set interface unnumbered ipip31 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip31 up
exec ip route add 10.0.0.31/32 via ipip31
exec set interface unnumbered ipip32 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip32 up
exec ip route add 10.0.0.32/32 via ipip32
exec set interface unnumbered ipip33 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip33 up
exec ip route add 10.0.0.33/32 via ipip33
exec set interface unnumbered ipip34 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip34 up
exec ip route add 10.0.0.34/32 via ipip34
exec set interface unnumbered ipip35 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip35 up
exec ip route add 10.0.0.35/32 via ipip35
exec set interface unnumbered ipip36 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip36 up
exec ip route add 10.0.0.36/32 via ipip36
exec set interface unnumbered ipip37 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip37 up
exec ip route add 10.0.0.37/32 via ipip37
exec set interface unnumbered ipip38 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip38 up
exec ip route add 10.0.0.38/32 via ipip38
exec set interface unnumbered ipip39 use TwentyFiveGigabitEthernet4b/0/1
exec set interface state ipip39 up
exec ip route add 10.0.0.39/32 via ipip39

25ge2p1xxv710-ethip4ipsec4tnlsw-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NxjkTeEkgBSvWzGckQGXIgDdqkOYAdux’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NxjkTeEkgBSvWzGckQGXIgDdqkOYAdux’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’pzhxqSgdTWOIMfZFEDWkMRfZarsNvukR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’pzhxqSgdTWOIMfZFEDWkMRfZarsNvukR’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bbRrhncOcFOtbkJOCPKhjsjaVerrGRnx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bbRrhncOcFOtbkJOCPKhjsjaVerrGRnx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mQJbMLbCqcIcCjKYFVQQsZtafwDCfsBk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mQJbMLbCqcIcCjKYFVQQsZtafwDCfsBk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-4t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XoFMBFenhyYyNsjJhHrbtBMRvfHaKdeV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’XoFMBFenhyYyNsjJhHrbtBMRvfHaKdeV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NGMFCcffIcZYfNvWmvThQotpylvjazEg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’NGMFCcffIcZYfNvWmvThQotpylvjazEg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qAdVvGinxvANgVSzWEyEBsUvHcjZTtFA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qAdVvGinxvANgVSzWEyEBsUvHcjZTtFA’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CQRibHbfWdWdVYEFoIOxZmHiMlASUSMy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’CQRibHbfWdWdVYEFoIOxZmHiMlASUSMy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-8t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RFTYtJpJfPSnXaWYamGNSSDEmWPZgBax’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RFTYtJpJfPSnXaWYamGNSSDEmWPZgBax’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’DoWsfwiMXCJggbVofpBwlLtLVeOqWitw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’DoWsfwiMXCJggbVofpBwlLtLVeOqWitw’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AJpBpfiOycQcaeJBKYCVGMbmOwtiaxvk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AJpBpfiOycQcaeJBKYCVGMbmOwtiaxvk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HRpetOflckxujXmzLwhTApIzsrgqPtXe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’HRpetOflckxujXmzLwhTApIzsrgqPtXe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t1c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’roMYwkdXHcsWVeYtCrsvpopmRyuHCpbi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’roMYwkdXHcsWVeYtCrsvpopmRyuHCpbi’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’USmRDYAWcbKnlgWuIWxSuigofPrCnFvc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’USmRDYAWcbKnlgWuIWxSuigofPrCnFvc’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FaTAzLsOcTjMxkDLLnapOWtdrgSAbfSf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’FaTAzLsOcTjMxkDLLnapOWtdrgSAbfSf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’sApeOtNOstizKCcKPilrKsDXBggXPibI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’sApeOtNOstizKCcKPilrKsDXBggXPibI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-4t2c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cbAQuxIaDHlgeKbJPFldVxflkAqfROkS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cbAQuxIaDHlgeKbJPFldVxflkAqfROkS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WIcHjLpANLjEEAaRxnTfOWdTgAzqTBtq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WIcHjLpANLjEEAaRxnTfOWdTgAzqTBtq’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cbXDPNuPLWaDwRAJFPsGzECzSvGuBiLU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cbXDPNuPLWaDwRAJFPsGzECzSvGuBiLU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’yunfENKLKrMpQHauIYaAXoiFWRdQpIjf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’yunfENKLKrMpQHauIYaAXoiFWRdQpIjf’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-8t4c-ethip4ipsec4tnlsw- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x02x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x03x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WEyuSawatgwMROutcUCeEWsUMGZrnWiX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’WEyuSawatgwMROutcUCeEWsUMGZrnWiX’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’duFxhIkfYfYQyDcIMOESzQyvnEyVjHzE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’duFxhIkfYfYQyDcIMOESzQyvnEyVjHzE’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100002, ‘spi’: 200002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’pOklPZEKuyJUEIOholuDDeQNXzMbLAUM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 2, ‘spi’: 100002, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’pOklPZEKuyJUEIOholuDDeQNXzMbLAUM’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100003, ‘spi’: 200003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’enZsVDVvYmMJJkgXTGLlJAhItpzZkdNk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 3, ‘spi’: 100003, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’enZsVDVvYmMJJkgXTGLlJAhItpzZkdNk’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 5, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100002, ‘n_sa_in’: 1, ‘sa_in’: [2]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 6, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100003, ‘n_sa_in’: 1, ‘sa_in’: [3]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=5)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=6)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=5,flags=1)
sw_interface_set_flags(sw_if_index=6,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x02’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 5, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x03’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 6, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

25ge2p1xxv710-ethip4ipsec8tnlswasync-scheduler-ip4base-int-aes256gcm-mrr

RFC2544: Pkt throughput IPv4 IPsec tunnel mode.

  • [Top] Network Topologies: TG-DUT1-DUT2-TG 3-node circular opology with single links between nodes.

  • [Enc] Packet Encapsulations: Eth-IPv4 on TG-DUTn, Eth-IPv4-IPSec on DUT1-DUT2.

  • [Cfg] DUT configuration: DUT1 and DUT2 are configured with multiple IPsec tunnels between them, run with IPsec async mode and use crypto sw scheduler engine to schedule crypto work to crypto cores. DUTs get IPv4 traffic from TG, encrypt it and send to another DUT, where packets are decrypted and sent back to TG.

  • [Ver] TG vefication: In MaxReceivedRate tests TG sends traffic at line rate and reports total received packets over trial period. Test packets are generated by TG on links to DUTs. TG traffic profile contains two L3 flow-groups (flow-group per direction, number of flows per flow-group equals to

umber of IPSec tunnels) with all packets containing Ethernet header, IPv4 header with IP protocol=61 and static payload. MAC addresses are matching MAC addresses of the TG ode interfaces. Incrementing of IP.dst (IPv4 destination address) is applied to both streams.

  • [Ref] Applicable standard specifications: RFC4303 and RFC2544.

 Test Name 

 VPP API Test Commands History - Commands Used Per Test Case 

 1518b-2t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qbbPtBMygnZMjcKvfkRamEeQhmWXMUjF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qbbPtBMygnZMjcKvfkRamEeQhmWXMUjF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eiumJLYclJUPACtPJPTYMXIhbZGgxmIF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’eiumJLYclJUPACtPJPTYMXIhbZGgxmIF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’idusdpkWeAHDdenkBWtnFGyDXGACPdBK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’idusdpkWeAHDdenkBWtnFGyDXGACPdBK’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’euAEtpXThaisdkiLHoJUyZuqzTnSCKio’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’euAEtpXThaisdkiLHoJUyZuqzTnSCKio’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t3c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UvgyIGInIqYXNSqtHdaIhCtGDTvsuvBI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’UvgyIGInIqYXNSqtHdaIhCtGDTvsuvBI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cDhGqSyQWfkEBHMZIhBxFXNeZxseNqyx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’cDhGqSyQWfkEBHMZIhBxFXNeZxseNqyx’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bOLOciqFKmZzrnhzutPqqSoDBOrBdRjP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’bOLOciqFKmZzrnhzutPqqSoDBOrBdRjP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qkUnvBphmmrEFYoEFxZTQHiKNsAllHAF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’qkUnvBphmmrEFYoEFxZTQHiKNsAllHAF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 1518b-2t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’jUuQoXCYqLvqgiiWtabWwofECoubbafF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’jUuQoXCYqLvqgiiWtabWwofECoubbafF’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iywbDiAhsagnzaWlYFBrUgeMFnSXiexS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’iywbDiAhsagnzaWlYFBrUgeMFnSXiexS’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YIiUOYmGNkjULxAVrYtEInRybIaTsdVz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YIiUOYmGNkjULxAVrYtEInRybIaTsdVz’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fdJiqnpdYCYqBUwTLkyycbItUWAXJnvn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’fdJiqnpdYCYqBUwTLkyycbItUWAXJnvn’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t2c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=2,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=2,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=2,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YbaBQIGRYoEaijinyXuwVtvAvzMvgHwh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’YbaBQIGRYoEaijinyXuwVtvAvzMvgHwh’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zgiaPBOWafRWbcEJuQpwKuUilxCGnSWg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’zgiaPBOWafRWbcEJuQpwKuUilxCGnSWg’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’dBWCahTHErSjvghfwwgNwupNNOVdtHwu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’dBWCahTHErSjvghfwwgNwupNNOVdtHwu’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RaMVafFaQlxOevNuSUYBcywTbYfdAuHU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RaMVafFaQlxOevNuSUYBcywTbYfdAuHU’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t3c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=3,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=3,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=3,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RhzldCqLeVDjqjeEdXNbSTKNdvTGTQzN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’RhzldCqLeVDjqjeEdXNbSTKNdvTGTQzN’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mtGqTTuYLJhtYVjBQdaVRLkraZNFXSfP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’mtGqTTuYLJhtYVjBQdaVRLkraZNFXSfP’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xfyMNWEJpHSqIdvYbZnZsgImmBtlFolt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’xfyMNWEJpHSqIdvYbZnZsgImmBtlFolt’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tDBAwQcFqhGiVkKONxqexswkISFuxtJI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’tDBAwQcFqhGiVkKONxqexswkISFuxtJI’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})

 imix-2t4c-ethip4ipsec8tnlswasync-scheduler- 
ip4base-int-aes256gcm-mrr

 DUT1:  
cli_inband(cmd=’show logging’)
show_version()
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
ipsec_set_async_mode(async_enable=1)
show_threads()
sw_interface_rx_placement_dump(sw_if_index=1)
sw_interface_rx_placement_dump(sw_if_index=2)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=1,queue_id=1,worker_id=4,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=0,worker_id=0,is_main=False)
sw_interface_set_rx_placement(sw_if_index=2,queue_id=1,worker_id=4,is_main=False)
show_threads()
crypto_sw_scheduler_set_worker(worker_index=0,crypto_enable=False)
crypto_sw_scheduler_set_worker(worker_index=4,crypto_enable=False)
sw_interface_set_flags(sw_if_index=2,flags=1)
hw_interface_set_mtu(sw_if_index=2,mtu=9200)
sw_interface_set_flags(sw_if_index=1,flags=1)
hw_interface_set_mtu(sw_if_index=1,mtu=9200)
sw_interface_dump(name_filter_valid=False,name_filter=’’)
sw_interface_add_del_address(sw_if_index=1,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc0xa8x14x0b’}}})
ip_neighbor_add_del(is_add=True,neighbor={‘sw_if_index’: 1, ‘flags’: 0, ‘mac_address’: ‘3c:fd:fe:bd:fa:25’, ‘ip_address’: ‘192.168.20.254’})
ip_route_add_del(is_add=True,is_multipath=True,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’x14x00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 1, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc0xa8x14xfe’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_add_del_address(sw_if_index=2,is_add=True,del_all=False,prefix={‘len’: 24, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x01x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x06x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipip_add_tunnel(tunnel={‘instance’: 4294967295, ‘src’: {‘af’: 0, ‘un’: {‘ip4’: b’xc8x00x00f’}}, ‘dst’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x07x01’}}, ‘table_id’: 0, ‘flags’: 0, ‘mode’: 0, ‘dscp’: 0})
ipsec_sad_entry_add(entry={‘sad_id’: 100000, ‘spi’: 200000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IUoVAbOaDAUilEWKZOORCQkpnliFgdXr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 0, ‘spi’: 100000, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’IUoVAbOaDAUilEWKZOORCQkpnliFgdXr’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100001, ‘spi’: 200001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’sTuxEKGerpEnOYwnwvKmlVCKnzaazqWe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 1, ‘spi’: 100001, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’sTuxEKGerpEnOYwnwvKmlVCKnzaazqWe’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100006, ‘spi’: 200006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AbkGxxmFOMFGNXfjEuhuBQklqvEoDbcV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 6, ‘spi’: 100006, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’AbkGxxmFOMFGNXfjEuhuBQklqvEoDbcV’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 100007, ‘spi’: 200007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PsWbEVtFjCclkzFNIfVLUbRkkubxYyJy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 0, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_sad_entry_add(entry={‘sad_id’: 7, ‘spi’: 100007, ‘protocol’: 50, ‘crypto_algorithm’: 9, ‘crypto_key’: {‘length’: 32, ‘data’: b’PsWbEVtFjCclkzFNIfVLUbRkkubxYyJy’}, ‘integrity_algorithm’: 0, ‘integrity_key’: {‘length’: 0, ‘data’: None}, ‘flags’: 64, ‘tunnel’: {‘src’: 0, ‘dst’: 0, ‘table_id’: 0, ‘encap_decap_flags’: 0, ‘dscp’: 0}, ‘salt’: 0, ‘udp_src_port’: 65535, ‘udp_dst_port’: 65535})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 3, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100000, ‘n_sa_in’: 1, ‘sa_in’: [0]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 4, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100001, ‘n_sa_in’: 1, ‘sa_in’: [1]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 9, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100006, ‘n_sa_in’: 1, ‘sa_in’: [6]})
ipsec_tunnel_protect_update(tunnel={‘sw_if_index’: 10, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘sa_out’: 100007, ‘n_sa_in’: 1, ‘sa_in’: [7]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 8, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’dx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 2, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: {‘ip4’: b’xc8x00x00e’}, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=3)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=4)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=9)
sw_interface_set_unnumbered(is_add=True,sw_if_index=2,unnumbered_sw_if_index=10)
sw_interface_set_flags(sw_if_index=3,flags=1)
sw_interface_set_flags(sw_if_index=4,flags=1)
sw_interface_set_flags(sw_if_index=9,flags=1)
sw_interface_set_flags(sw_if_index=10,flags=1)
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x00’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 3, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x01’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 4, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x06’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 9, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})
ip_route_add_del(is_add=1,is_multipath=0,route={‘table_id’: 0, ‘prefix’: {‘len’: 32, ‘address’: {‘af’: 0, ‘un’: {‘ip4’: b’nx00x00x07’}}}, ‘n_paths’: 1, ‘paths’: [{‘sw_if_index’: 10, ‘table_id’: 0, ‘rpf_id’: 4294967295, ‘weight’: 1, ‘preference’: 1, ‘type’: 0, ‘flags’: 0, ‘proto’: 0, ‘nh’: {‘address’: 0, ‘via_label’: 1048576, ‘obj_id’: 4294967295}, ‘n_labels’: 0, ‘label_stack’: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]}]})