I have one DUT which is IPsec supported and I want to generate high throughput using to test performance.
As I am new to TRex, I do not have any idea if it is supported by currently not.
I have open question in my mind is as below,
1. Is TRex can perform IKEv2 negotiation on it's own and generate Security association?
2. Is it possible to generate encrypted ESP traffic with specific ciphers any e.g. AES128-SHA2?
3. Is there any TRex documentation available for same ?
Thanks.
--
You received this message because you are subscribed to the Google Groups "TRex Traffic Generator" group.
To unsubscribe from this group and stop receiving emails from it, send an email to trex-tgn+u...@googlegroups.com.
To post to this group, send email to trex...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/trex-tgn/f47dd8b4-6a4a-4d09-90b6-e1559a5a2a61%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Hi,I’m more familiar with TLSLet me ask a question on IPsec, let’s say you build a valid IPsec packet.Would sending the same packet in high rate or changing a field without running AES on the payload is a valid option?Thanks,Hanoh
On Sat, 9 Dec 2017 at 15:36 Tejas Kasundra <tejashk...@gmail.com> wrote:
Hi Experts,
I have one DUT which is IPsec supported and I want to generate high throughput using to test performance.
As I am new to TRex, I do not have any idea if it is supported by currently not.
I have open question in my mind is as below,
1. Is TRex can perform IKEv2 negotiation on it's own and generate Security association?
2. Is it possible to generate encrypted ESP traffic with specific ciphers any e.g. AES128-SHA2?
3. Is there any TRex documentation available for same ?
Thanks.
--
You received this message because you are subscribed to the Google Groups "TRex Traffic Generator" group.
To unsubscribe from this group and stop receiving emails from it, send an email to trex-tgn+unsubscribe@googlegroups.com.
To post to this group, send email to trex...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/trex-tgn/f47dd8b4-6a4a-4d09-90b6-e1559a5a2a61%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Hi,
Let's say it is possible to do the security IKEv2 negotiation betwean each src/dst IPs
My question is about the IPSec traffic after this negotiation.
Could you generate encrypted packets *off-line* (using AES) and then repay it in high rate without doing the encryption again (by just changing fields)?
In TLS it is not possible.
thanks
Hanoh
1. You are using service mode to get all the packets back to Python
2. Using scapy/openSSL-python binding you can do the IPsec negotiation for each pair of src/dst -- In the Wireless service plugin there is an example how we did DTLS stream using scapy/openSSL
3. After you have the keys, generate IPSec template packets (scapy/openSSL) for each pair and create a stream from it.
4. Create a stream Field Engine program to change the seq number (for all the streams)
5. Disable service mode
6. Start traffic @ high rate
It seems as a bit complex, but after you read the stateless manual it become more clear.
The Wireless plugin that we have as an example is more complex than this.
To unsubscribe from this group and stop receiving emails from it, send an email to trex-tgn+u...@googlegroups.com.
To post to this group, send email to trex...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/trex-tgn/f47dd8b4-6a4a-4d09-90b6-e1559a5a2a61%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--HanohSent from my iPhone
--HanohSent from my iPhone
--HanohSent from my iPhone