标签:generate ubuntu arm red cte can com term ddr
A bridge-domain can be associated with only one BVI. However a vrf can contain routes to multiple BVIs. To configure a BVI interface, create it using a loopback interface, assign a mac address, and set its vrf and bridge-domain. This example uses vrf 0 and bridge-domain 5. Learning should be disabled on the BVI interface. It is harmless but useless to enable it because the BVI l2fib entry is static: vpp# loop create 0000.0B51.0001 vpp# set int l2 bridge loop0 5 bvi vpp# set int ip table loop0 0 vpp# set int l2 learn loop0 disable vpp# set int state loop0 up Add L3 connectivity by creating a route and adjacency for the BVI interface. The static ARP is not strictly necessary -- routing to an IP with an unknown mac will cause an ARP request to be generated. vpp# ip route table 0 8.0.1.0/24 via loop0 vpp# set ip arp loop0 8.0.1.1 00:02:04:06:08:0a
loop create set int state loop0 up set int ip address loop0 10.0.0.1/24 set ip neighbor loop0 10.0.0.2 00:00:11:aa:bb:cc mpls tunnel add via 10.0.0.2 loop0 out-label 33 out-label 34 out-label 35 out-label 36 set int state mpls-tunnel0 up set int ip addr mpls-tunnel0 192.168.0.1/32 ip route add 2.0.0.2/32 via 192.168.0.2 mpls-tunnel0 mpls tunnel add via 10.0.0.2 out-label 33 set int state mpls-tunnel1 up set int ip addr mpls-tunnel1 192.168.1.1/32 ip route add 2.0.1.2/32 via 192.168.1.2 mpls-tunnel1 out-label 99 mpls tunnel add via 10.0.0.2 loop0 out-label 3 set int state mpls-tunnel2 up set int ip addr mpls-tunnel2 192.168.2.1/32 ip route add 2.0.2.2/32 via 192.168.2.2 mpls-tunnel2 mpls tunnel add l2-only via 10.0.0.2 loop0 out-label 234 out-label 0 set int state mpls-tunnel3 up set int l2 bridge mpls-tunnel3 1 loop create set int ip addr loop1 6.0.1.44/24 set int l2 bridge loop1 1 bvi set int l2 learn loop1 disable set int state loop1 up ip route add 2.0.3.2/32 via 6.0.1.45 loop1
The goal is to create a layer-2 encrypted tunnel and hide inner network IP addresses.
To achieve this goal, the traffic will be encapsulated in GRE, protected with IPsec and encapsulated into VxLAN.
GRE is a tunneling protocol developed by Cisco. The GRE frame looks as follows.
VXLAN tunnel is an L2 overlay on top of an L3 network underlay. It uses the UDP protocol to traverse the network. The VXLAN frame looks as follows.
IPsec supports tunnel and transport modes. As far as our tunnel is based on GRE, the transport mode will be used. In this mode, only a payload of the IP packet is encrypted and/or authenticated and the IP header is not touched. The resulting frame looks as follows.
Two Ubuntu VMs with VPP ver. 19.01 and two Ubuntu VMs representing hosts.
In terms of VPP we need to create two loopbacks. One loopback will be bridged with GRE-IPsec tunnel, while another will be bridged with VxLAN tunnel. And using routing we will direct traffic into the first loopback where it will be encapsulated into GRE header and encrypted with IPsec. Then the traffic will be routed into a second loopback where it will receive VxLAN header.
ipsec sa add 10 spi 1001 esp crypto-alg aes-cbc-128 crypto-key 4a506a794f574265564551694d653768 integ-alg sha1-96 integ-key 4339314b55523947594d6d3547666b45764e6a58 ipsec sa add 20 spi 1000 esp crypto-alg aes-cbc-128 crypto-key 4a506a794f574265564551694d653768 integ-alg sha1-96 integ-key 4339314b55523947594d6d3547666b45764e6a58 loopback create mac 1a:ab:3c:4d:5e:7f set interface ip address loop0 10.100.0.7/31 set int mtu 1360 loop0 set int l2 learn loop0 disable create ipsec gre tunnel src 10.101.0.7 dst 10.101.0.6 local-sa 10 remote-sa 20 set int state ipsec-gre0 up create bridge-domain 12 learn 0 forward 1 uu-flood 1 flood 1 arp-term 1 set bridge-domain arp entry 12 10.100.0.7 1a:ab:3c:4d:5e:7f set int l2 bridge loop0 12 bvi set int l2 bridge ipsec-gre0 12 1 loopback create mac 1a:2b:3c:4d:5e:7f set interface ip address loop1 10.101.0.7/31 create vxlan tunnel src 192.168.31.76 dst 192.168.31.47 vni 13 create bridge-domain 13 learn 0 forward 1 uu-flood 1 flood 1 arp-term 1 set bridge-domain arp entry 13 10.101.0.7 1a:2b:3c:4d:5e:7f set interface l2 bridge vxlan_tunnel0 13 1 set interface l2 bridge loop1 13 bvi ip route add 10.10.10.0/24 via 10.100.0.6
ipsec sa add 10 spi 1000 esp crypto-alg aes-cbc-128 crypto-key 4a506a794f574265564551694d653768 integ-alg sha1-96 integ-key 4339314b55523947594d6d3547666b45764e6a58 ipsec sa add 20 spi 1001 esp crypto-alg aes-cbc-128 crypto-key 4a506a794f574265564551694d653768 integ-alg sha1-96 integ-key 4339314b55523947594d6d3547666b45764e6a58 loopback create mac 1a:ab:3c:4d:5e:6f set interface ip address loop0 10.100.0.6/31 set int mtu 1360 loop0 set int l2 learn loop0 disable create ipsec gre tunnel src 10.101.0.6 dst 10.101.0.7 local-sa 10 remote-sa 20 set int state ipsec-gre0 up create bridge-domain 12 learn 0 forward 1 uu-flood 1 flood 1 arp-term 1 set bridge-domain arp entry 12 10.100.0.6 1a:ab:3c:4d:5e:6f set int l2 bridge loop0 12 bvi set int l2 bridge ipsec-gre0 12 1 loopback create mac 1a:2b:3c:4d:5e:6f set interface ip address loop1 10.101.0.6/31 create vxlan tunnel src 192.168.31.47 dst 192.168.31.76 vni 13 create bridge-domain 13 learn 0 forward 1 uu-flood 1 flood 1 arp-term 1 set bridge-domain arp entry 13 10.101.0.6 1a:2b:3c:4d:5e:6f set interface l2 bridge vxlan_tunnel0 13 1 set interface l2 bridge loop1 13 bvi ip route add 20.20.20.0/24 via 10.100.0.7
00:04:26:418264: dpdk-input GigabitEthernet0/8/0 rx queue 0 buffer 0xddb4: current data 0, length 98, free-list 0, clone-count 0, totlen-nifb 0, trace 0x0 ext-hdr-valid l4-cksum-computed l4-cksum-correct PKT MBUF: port 1, nb_segs 1, pkt_len 98 buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr 0x8e376d80 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: 08:00:27:54:67:a2 -> 08:00:27:88:33:fd ICMP: 20.20.20.2 -> 10.10.10.2 tos 0x00, ttl 64, length 84, checksum 0x66a0 fragment id 0x97e7, flags DONT_FRAGMENT ICMP echo_request checksum 0x2ea5 00:04:26:418338: ethernet-input frame: flags 0x3, hw-if-index 2, sw-if-index 2 IP4: 08:00:27:54:67:a2 -> 08:00:27:88:33:fd 00:04:26:418355: ip4-input-no-checksum ICMP: 20.20.20.2 -> 10.10.10.2 tos 0x00, ttl 64, length 84, checksum 0x66a0 fragment id 0x97e7, flags DONT_FRAGMENT ICMP echo_request checksum 0x2ea5 00:04:26:418369: ip4-lookup fib 0 dpo-idx 14 flow hash: 0x00000000 ICMP: 20.20.20.2 -> 10.10.10.2 tos 0x00, ttl 64, length 84, checksum 0x66a0 fragment id 0x97e7, flags DONT_FRAGMENT ICMP echo_request checksum 0x2ea5 00:04:26:418385: ip4-rewrite tx_sw_if_index 3 dpo-idx 14 : ipv4 via 10.100.0.6 loop0: mtu:1360 1aab3c4d5e6f1aab3c4d5e7f0800 flow hash: 0x00000000 00000000: 1aab3c4d5e6f1aab3c4d5e7f08004500005497e740003f0167a0141414020a0a 00000020: 0a0208002ea555ec004d8f3afb5d0000000025b60400000000001011 00:04:26:418393: loop0-output loop0 IP4: 1a:ab:3c:4d:5e:7f -> 1a:ab:3c:4d:5e:6f ICMP: 20.20.20.2 -> 10.10.10.2 tos 0x00, ttl 63, length 84, checksum 0x67a0 fragment id 0x97e7, flags DONT_FRAGMENT ICMP echo_request checksum 0x2ea5 00:04:26:418417: l2-input l2-input: sw_if_index 3 dst 1a:ab:3c:4d:5e:6f src 1a:ab:3c:4d:5e:7f 00:04:26:418423: l2-fwd l2-fwd: sw_if_index 3 dst 1a:ab:3c:4d:5e:6f src 1a:ab:3c:4d:5e:7f bd_index 1 result [0x1020000000004, 4] none 00:04:26:418428: l2-output l2-output: sw_if_index 4 dst 1a:ab:3c:4d:5e:6f src 1a:ab:3c:4d:5e:7f data 08 00 45 00 00 54 97 e7 40 00 3f 01 00:04:26:418434: ipsec-gre0-output ipsec-gre0 00000000: 1aab3c4d5e6f1aab3c4d5e7f08004500005497e740003f0167a0141414020a0a 00000020: 0a0208002ea555ec004d8f3afb5d0000000025b6040000000000101112131415 00000040: 161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435 00000060: 36370000000000000000000000000000000000000000000000000000 00:04:26:418436: ipsec-gre0-tx GRE: tunnel 0 len 122 src 10.101.0.7 dst 10.101.0.6 sa-id 10 00:04:26:418440: esp4-encrypt esp: spi 1001 seq 134 crypto aes-cbc-128 integrity sha1-96 00:04:26:418468: ip4-lookup fib 0 dpo-idx 19 flow hash: 0x00000000 IPSEC_ESP: 10.101.0.7 -> 10.101.0.6 tos 0x00, ttl 254, length 168, checksum 0xa74d fragment id 0x0000 00:04:26:418471: ip4-rewrite tx_sw_if_index 5 dpo-idx 19 : ipv4 via 10.101.0.6 loop1: mtu:9000 1a2b3c4d5e6f1a2b3c4d5e7f0800 flow hash: 0x00000000 00000000: 1a2b3c4d5e6f1a2b3c4d5e7f0800450000a800000000fd32a84d0a6500070a65 00000020: 0006000003e9000000870573ff85554266537fd108913fe1aba4e3fc 00:04:26:418485: loop1-output loop1 IP4: 1a:2b:3c:4d:5e:7f -> 1a:2b:3c:4d:5e:6f IPSEC_ESP: 10.101.0.7 -> 10.101.0.6 tos 0x00, ttl 253, length 168, checksum 0xa84d fragment id 0x0000 00:04:26:418488: l2-input l2-input: sw_if_index 5 dst 1a:2b:3c:4d:5e:6f src 1a:2b:3c:4d:5e:7f 00:04:26:418489: l2-fwd l2-fwd: sw_if_index 5 dst 1a:2b:3c:4d:5e:6f src 1a:2b:3c:4d:5e:7f bd_index 2 result [0x1020000000006, 6] none 00:04:26:418491: l2-output l2-output: sw_if_index 6 dst 1a:2b:3c:4d:5e:6f src 1a:2b:3c:4d:5e:7f data 08 00 45 00 00 a8 00 00 00 00 fd 32 00:04:26:418493: vxlan4-encap VXLAN encap to vxlan_tunnel0 vni 13 00:04:26:418499: ip4-rewrite tx_sw_if_index 1 dpo-idx 18 : ipv4 via 192.168.31.47 GigabitEthernet0/3/0: mtu:9000 08002768d11e0800275a18a50800 flow hash: 0x00000001 00000000: 08002768d11e0800275a18a50800450000da00000000fd11fd46c0a81f4cc0a8 00000020: 1f2f12b512b500c600000800000000000d001a2b3c4d5e6f1a2b3c4d 00:04:26:418500: GigabitEthernet0/3/0-output GigabitEthernet0/3/0 IP4: 08:00:27:5a:18:a5 -> 08:00:27:68:d1:1e UDP: 192.168.31.76 -> 192.168.31.47 tos 0x00, ttl 253, length 218, checksum 0xfd46 fragment id 0x0000 UDP: 4789 -> 4789 length 198, checksum 0x0000 00:04:26:418502: GigabitEthernet0/3/0-tx GigabitEthernet0/3/0 tx queue 0 buffer 0x1c332: current data -50, length 232, free-list 0, clone-count 0, totlen-nifb 0, trace 0x0 PKT MBUF: port 65535, nb_segs 1, pkt_len 232 buf_len 2176, data_len 232, ol_flags 0x0, data_off 78, phys_addr 0x8e70cd00 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: 08:00:27:5a:18:a5 -> 08:00:27:68:d1:1e UDP: 192.168.31.76 -> 192.168.31.47 tos 0x00, ttl 253, length 218, checksum 0xfd46 fragment id 0x0000 UDP: 4789 -> 4789 length 198, checksum 0x0000
00:04:26:419224: dpdk-input GigabitEthernet0/3/0 rx queue 0 buffer 0x1afa: current data 0, length 232, free-list 0, clone-count 0, totlen-nifb 0, trace 0x1 ext-hdr-valid l4-cksum-computed l4-cksum-correct PKT MBUF: port 0, nb_segs 1, pkt_len 232 buf_len 2176, data_len 232, ol_flags 0x0, data_off 128, phys_addr 0x8dc6bf00 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: 08:00:27:68:d1:1e -> 08:00:27:5a:18:a5 UDP: 192.168.31.47 -> 192.168.31.76 tos 0x00, ttl 253, length 218, checksum 0xfd46 fragment id 0x0000 UDP: 4789 -> 4789 length 198, checksum 0x0000 00:04:26:419299: ethernet-input frame: flags 0x3, hw-if-index 1, sw-if-index 1 IP4: 08:00:27:68:d1:1e -> 08:00:27:5a:18:a5 00:04:26:419313: ip4-input-no-checksum UDP: 192.168.31.47 -> 192.168.31.76 tos 0x00, ttl 253, length 218, checksum 0xfd46 fragment id 0x0000 UDP: 4789 -> 4789 length 198, checksum 0x0000 00:04:26:419320: ip4-lookup fib 0 dpo-idx 5 flow hash: 0x00000000 UDP: 192.168.31.47 -> 192.168.31.76 tos 0x00, ttl 253, length 218, checksum 0xfd46 fragment id 0x0000 UDP: 4789 -> 4789 length 198, checksum 0x0000 00:04:26:419328: ip4-local UDP: 192.168.31.47 -> 192.168.31.76 tos 0x00, ttl 253, length 218, checksum 0xfd46 fragment id 0x0000 UDP: 4789 -> 4789 length 198, checksum 0x0000 00:04:26:419334: ip4-udp-lookup UDP: src-port 4789 dst-port 4789 00:04:26:419345: vxlan4-input VXLAN decap from vxlan_tunnel0 vni 13 next 1 error 0 00:04:26:419358: l2-input l2-input: sw_if_index 6 dst 1a:2b:3c:4d:5e:7f src 1a:2b:3c:4d:5e:6f 00:04:26:419365: l2-learn l2-learn: sw_if_index 6 dst 1a:2b:3c:4d:5e:7f src 1a:2b:3c:4d:5e:6f bd_index 2 00:04:26:419375: l2-fwd l2-fwd: sw_if_index 6 dst 1a:2b:3c:4d:5e:7f src 1a:2b:3c:4d:5e:6f bd_index 2 result [0x700000005, 5] static age-not bvi 00:04:26:419381: ip4-input IPSEC_ESP: 10.101.0.6 -> 10.101.0.7 tos 0x00, ttl 253, length 168, checksum 0xa84d fragment id 0x0000 00:04:26:419385: ip4-lookup fib 0 dpo-idx 8 flow hash: 0x00000000 IPSEC_ESP: 10.101.0.6 -> 10.101.0.7 tos 0x00, ttl 253, length 168, checksum 0xa84d fragment id 0x0000 00:04:26:419387: ip4-local IPSEC_ESP: 10.101.0.6 -> 10.101.0.7 tos 0x00, ttl 253, length 168, checksum 0xa84d fragment id 0x0000 00:04:26:419390: ipsec-if-input IPSec: spi 1000 seq 93 00:04:26:419399: esp4-decrypt esp: crypto aes-cbc-128 integrity sha1-96 00:04:26:419421: ipsec-gre-input GRE: tunnel -1 len 122 src 10.101.0.6 dst 10.101.0.7 00:04:26:419427: l2-input l2-input: sw_if_index 4 dst 1a:ab:3c:4d:5e:7f src 1a:ab:3c:4d:5e:6f 00:04:26:419429: l2-learn l2-learn: sw_if_index 4 dst 1a:ab:3c:4d:5e:7f src 1a:ab:3c:4d:5e:6f bd_index 1 00:04:26:419435: l2-fwd l2-fwd: sw_if_index 4 dst 1a:ab:3c:4d:5e:7f src 1a:ab:3c:4d:5e:6f bd_index 1 result [0x700000003, 3] static age-not bvi 00:04:26:419438: ip4-input ICMP: 10.10.10.2 -> 20.20.20.2 tos 0x00, ttl 63, length 84, checksum 0x82f4 fragment id 0xbc93 ICMP echo_reply checksum 0x36a5 00:04:26:419441: ip4-lookup fib 0 dpo-idx 26 flow hash: 0x00000000 ICMP: 10.10.10.2 -> 20.20.20.2 tos 0x00, ttl 63, length 84, checksum 0x82f4 fragment id 0xbc93 ICMP echo_reply checksum 0x36a5 00:04:26:419445: ip4-rewrite tx_sw_if_index 2 dpo-idx 26 : ipv4 via 20.20.20.2 GigabitEthernet0/8/0: mtu:9000 0800275467a20800278833fd0800 flow hash: 0x00000000 00000000: 0800275467a20800278833fd080045000054bc9300003e0183f40a0a0a021414 00000020: 1402000036a555ec004d8f3afb5d0000000025b60400000000001011 00:04:26:419449: GigabitEthernet0/8/0-output GigabitEthernet0/8/0 IP4: 08:00:27:88:33:fd -> 08:00:27:54:67:a2 ICMP: 10.10.10.2 -> 20.20.20.2 tos 0x00, ttl 62, length 84, checksum 0x83f4 fragment id 0xbc93 ICMP echo_reply checksum 0x36a5 00:04:26:419455: GigabitEthernet0/8/0-tx GigabitEthernet0/8/0 tx queue 0 buffer 0x1c359: current data 38, length 98, free-list 0, clone-count 0, totlen-nifb 0, trace 0x1 PKT MBUF: port 65535, nb_segs 1, pkt_len 98 buf_len 2176, data_len 98, ol_flags 0x0, data_off 166, phys_addr 0x8e70d6c0 packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 IP4: 08:00:27:88:33:fd -> 08:00:27:54:67:a2 ICMP: 10.10.10.2 -> 20.20.20.2 tos 0x00, ttl 62, length 84, checksum 0x83f4 fragment id 0xbc93 ICMP echo_reply checksum 0x36a5
标签:generate ubuntu arm red cte can com term ddr
原文地址:https://www.cnblogs.com/dream397/p/12762626.html