From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by dpdk.space (Postfix) with ESMTP id 1F0D7A00E6 for ; Wed, 12 Jun 2019 18:11:54 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 49E9F1D117; Wed, 12 Jun 2019 18:11:43 +0200 (CEST) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by dpdk.org (Postfix) with ESMTP id 4D3761BD41 for ; Sun, 9 Jun 2019 05:42:26 +0200 (CEST) Received: by mail-pf1-f169.google.com with SMTP id m30so2825821pff.8 for ; Sat, 08 Jun 2019 20:42:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=gupiaai7cPVDwv8z3GJBEYLJX5YKmbsyiawYBDjOYpk=; b=MSojLwbZ0EaLy1CXxvBTzp5n2mcGiFnESNp9skoyPFN6FMIAX5I9o0Wk5DepUhqMta Ilg2VLsNO4G9BbXjgmahArMlaJiM8lTzZ8Nv0zKDA86qen1MHXZAg+FTRQLqBIkzeiTe ItQuu5GNHx5czgHblKu41RCahN3oSP2HYrH2SSjYpwXIm+/IteiTPQzo8cJUYDVi68Cu KRwMvBJXUyElGkZWXgnwtp8ATAhLh6BNQeUJx8xB5pBji6WT9mNjm33hKyd7fpbmNhbK /aP932ds5SZf+ZjUUv+4SrfMV0YRCmBIjWOWKAAZJkH9o1pvz+ol/ij9WGmEzkjwbtb3 JESA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=gupiaai7cPVDwv8z3GJBEYLJX5YKmbsyiawYBDjOYpk=; b=OU0oqz0Z+07mOax6vFP0G7xI8tMQ/Yw8dzG4ILBJW1rZUViEbvnrzTYsIVLYdjlGZQ WPD2WgkkfGsJyaneugCfZZrxGzlqEFj2lgy0ADvNIhEC4TsflqENgaYL4Mi7zjAb8C7h C2LfGeHGcQ7ofWgV8qCReUa48ev6Z30Wrm8MHfsHu80U0S/hZZbtKKQ+2zLEHtWQao/x JmyW881ir5y2p8zEA+F1raZZBivvVNiTUR07VALQU8SIjomawuVfesao61nDSS3D/Qp+ Fn3xY9bn9xvtZxFo7X7efIBBjNOeKMRpaBuyVlHEancvXxxgQGYNxEJ5Ir6dzsVnWba9 6hjw== X-Gm-Message-State: APjAAAX+6KxbPEql1FvJSd+Q8QOYtRfIhxj4/UpGI9upz6jJ+aiJskok KmjGXBqjTVnAZ9dwKmbfnaCm3iwdpFrWpwK0PfNspkMS X-Google-Smtp-Source: APXvYqwKo6fSmTCQzE3kY5wIjd04wUrWqXR98bpUWtA2mHh2Ic4j50rX4sgU9YIPc7Cyg9tRGXmBJzVBfHWiLBeomQc= X-Received: by 2002:a63:1c59:: with SMTP id c25mr9806803pgm.395.1560051744935; Sat, 08 Jun 2019 20:42:24 -0700 (PDT) MIME-Version: 1.0 From: Yilin Shieh Date: Sun, 9 Jun 2019 11:42:14 +0800 Message-ID: To: users@dpdk.org X-Mailman-Approved-At: Wed, 12 Jun 2019 18:11:39 +0200 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.15 Subject: [dpdk-users] ipsec_secgw ep1 can't get the inbound message (dpdk-stable-17.11.6) X-BeenThere: users@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK usage discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: users-bounces@dpdk.org Sender: "users" Hi all, I tested the ipsec_secgw with openssl. I use the test-center connected the EP0 and EP1' s port 1 and port0 connected with each other. then send one way packet 10.10.27.2 => 10.9.141.2. But the packet can' be received by test-center The EP0 port 0 and port 1 's ethernet act led was flashing. And EP1 only port 0' ethernet act led was flashing. I tried add debug message at process_pkts() function in ipsec-secgw.c. But no message be print out. It seems the packets not pass to ipsec-secgw. Are there any ways to find out why? Or any problem with my cfg file and command option? test1_ep0.cfg: #SP IPv4 rules sp ipv4 out esp protect 5 pri 1 dst 10.9.141.0/24 sport 0:65535 dport 0:65535 sp ipv4 in esp protect 105 pri 1 dst 10.10.27.0/24 sport 0:65535 dport 0:65535 #SA rules sa out 5 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ mode ipv4-tunnel src 51.15.139.201 dst 51.15.44.48 sa in 105 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ mode ipv4-tunnel src 51.15.44.48 dst 51.15.139.201 #Routing rules rt ipv4 dst 51.15.44.48/32 port 0 rt ipv4 dst 10.10.27.0/24 port 1 execute with: /build/ipsec-secgw -l 7,8 -n 4 --socket-mem 512,0 --vdev "crypto_openssl" -- -p 0xf -P -u 0x1 --config="(0,0,7),(1,0,8)" -f test1_ep0.cfg test1_ep1.cfg: #SP IPv4 rules sp ipv4 in esp protect 5 pri 1 dst 10.9.141.0/24 sport 0:65535 dport 0:65535 sp ipv4 out esp protect 105 pri 1 dst 10.10.27.0/24 sport 0:65535 dport 0:65535 #SA rules sa in 5 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ mode ipv4-tunnel src 51.15.139.201 dst 51.15.44.48 sa out 105 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 \ mode ipv4-tunnel src 51.15.44.48 dst 51.15.139.201 #Routing rules rt ipv4 dst 51.15.139.201/32 port 0 rt ipv4 dst 10.9.141.0/24 port 1 command: ./build/ipsec-secgw -l 7,8 -n 4 --socket-mem 512,0 --vdev "crypto_openssl" -- -p 0xf -P -u 0x1 --config="(0,0,7),(1,0,8)" -f test1_ep1.cfg Any advice and suggestion will be appreciated. Yi-Lin