diff options
author | Jan Gelety <jgelety@cisco.com> | 2017-10-23 12:56:04 +0200 |
---|---|---|
committer | Jan Gelety <jgelety@cisco.com> | 2017-10-23 12:56:04 +0200 |
commit | 2cc797fa23da02eefa19637521098ec41622189b (patch) | |
tree | 9f36e5441ded069634f3d34c43760f200052b959 /tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot | |
parent | b52c43bd354ee658d4f955995a08073a1338e898 (diff) |
FIX: IPSec tunnel interface
- add following line per interface tunnel:
set int unnum <ipsec> use <interface>
Change-Id: Iff75f27b7cf25f3d24eea92366b1fd4a718c253b
Signed-off-by: Jan Gelety <jgelety@cisco.com>
Diffstat (limited to 'tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot')
-rw-r--r-- | tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot | 48 |
1 files changed, 24 insertions, 24 deletions
diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot index 6f9263ad02..80967e706c 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot @@ -99,9 +99,9 @@ | | And Apply startup configuration on all VPP DUTs | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces -| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${n_tunnels} -| | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${laddr_ip4} -| | ... | ${raddr_ip4} | ${addr_range} +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} | | Then Find NDR using binary search and pps | ${framesize} | | ... | ${binary_min} | ${binary_max} | ${traffic_profile} | | ... | ${min_rate} | ${max_rate} | ${threshold} @@ -133,9 +133,9 @@ | | And Apply startup configuration on all VPP DUTs | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces -| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${n_tunnels} -| | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${laddr_ip4} -| | ... | ${raddr_ip4} | ${addr_range} +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} | | Then Find PDR using binary search and pps | ${framesize} | | ... | ${binary_min} | ${binary_max} | ${traffic_profile} | | ... | ${min_rate} | ${max_rate} | ${threshold} | ${perf_pdr_loss_acceptance} @@ -167,9 +167,9 @@ | | And Apply startup configuration on all VPP DUTs | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces -| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${n_tunnels} -| | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${laddr_ip4} -| | ... | ${raddr_ip4} | ${addr_range} +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} | | Then Find NDR using binary search and pps | ${framesize} | | ... | ${binary_min} | ${binary_max} | ${traffic_profile} | | ... | ${min_rate} | ${max_rate} | ${threshold} @@ -200,9 +200,9 @@ | | And Apply startup configuration on all VPP DUTs | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces -| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${n_tunnels} -| | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${laddr_ip4} -| | ... | ${raddr_ip4} | ${addr_range} +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} | | Then Find PDR using binary search and pps | ${framesize} | | ... | ${binary_min} | ${binary_max} | ${traffic_profile} | | ... | ${min_rate} | ${max_rate} | ${threshold} | ${perf_pdr_loss_acceptance} @@ -236,9 +236,9 @@ | | And Apply startup configuration on all VPP DUTs | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces -| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${n_tunnels} -| | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${laddr_ip4} -| | ... | ${raddr_ip4} | ${addr_range} +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} | | Then Find NDR using binary search and pps | ${framesize} | | ... | ${binary_min} | ${binary_max} | ${traffic_profile} | | ... | ${min_rate} | ${max_rate} | ${threshold} @@ -271,9 +271,9 @@ | | And Apply startup configuration on all VPP DUTs | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces -| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${n_tunnels} -| | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${laddr_ip4} -| | ... | ${raddr_ip4} | ${addr_range} +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} | | Then Find PDR using binary search and pps | ${framesize} | | ... | ${binary_min} | ${binary_max} | ${traffic_profile} | | ... | ${min_rate} | ${max_rate} | ${threshold} | ${perf_pdr_loss_acceptance} @@ -306,9 +306,9 @@ | | And Apply startup configuration on all VPP DUTs | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces -| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${n_tunnels} -| | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${laddr_ip4} -| | ... | ${raddr_ip4} | ${addr_range} +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} | | Then Find NDR using binary search and pps | ${framesize} | | ... | ${binary_min} | ${binary_max} | ${traffic_profile} | | ... | ${min_rate} | ${max_rate} | ${threshold} @@ -340,9 +340,9 @@ | | And Apply startup configuration on all VPP DUTs | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces -| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${n_tunnels} -| | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${laddr_ip4} -| | ... | ${raddr_ip4} | ${addr_range} +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} | | Then Find PDR using binary search and pps | ${framesize} | | ... | ${binary_min} | ${binary_max} | ${traffic_profile} | | ... | ${min_rate} | ${max_rate} | ${threshold} | ${perf_pdr_loss_acceptance} |