openconfig / featureprofiles

Feature Profiles are groups of OpenConfig paths and tests which verify their behavior
Apache License 2.0
52 stars 149 forks source link

RT-1.2 script run - bgpv6 nbr staying in OpenConfirm state and not receiving KeepAlive from ixia #726

Closed stthummuri closed 1 year ago

stthummuri commented 2 years ago

bgpv6 nbr staying in OpenConfirm state on router side when RT-1.2 script is run. IXIA is not sending a KA due to which the neighbor state on juniper cptx is not transitioning from OpenConfirm to Established. No message of length 19(which is the KA message) from ixia to cptx

root@cptx1:/# tcpdump -i eth28 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth28, link-type EN10MB (Ethernet), capture size 262144 bytes 14:42:19.659743 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.13033: Flags [P.], seq 3162156701:3162156720, ack 4168259, win 16327, length 19: BGP 14:42:19.699349 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:20.730959 IP6 2001:db8::192:0:2:6.27104 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 3944093:3945533, ack 3028323552, win 5760, length 1440: BGP 14:42:21.515668 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.13033: Flags [P.], seq 0:19, ack 1, win 16327, length 19: BGP 14:42:21.555500 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:22.816248 IP6 2001:db8::192:0:2:5 > 2001:db8::192:0:2:6: ICMP6, neighbor solicitation, who has 2001:db8::192:0:2:6, length 32 14:42:22.816329 IP6 2001:db8::192:0:2:6 > 2001:db8::192:0:2:5: ICMP6, neighbor advertisement, tgt is 2001:db8::192:0:2:6, length 32 14:42:24.730751 IP6 2001:db8::192:0:2:6.27104 > 2001:db8::192:0:2:5.bgp: Flags [R.], seq 4320, ack 1, win 5760, length 0 14:42:24.733521 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.27104: Flags [.], ack 0, win 16327, length 0 14:42:24.733586 IP6 2001:db8::192:0:2:6.27104 > 2001:db8::192:0:2:5.bgp: Flags [R.], seq 0, ack 1, win 0, length 0 14:42:25.227033 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.13033: Flags [P.], seq 0:19, ack 1, win 16327, length 19: BGP 14:42:25.266822 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:27.280045 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [P.], seq 688669:688688, ack 333074675, win 5840, length 19: BGP 14:42:27.282486 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [.], ack 19, win 15738, length 0 14:42:29.266778 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:31.187790 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [P.], seq 1:20, ack 19, win 15738, length 19: BGP 14:42:31.228337 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [.], ack 20, win 5840, length 0 14:42:32.907282 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.13033: Flags [P.], seq 0:19, ack 1, win 16327, length 19: BGP 14:42:32.947527 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:36.947545 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:40.947471 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:44.947792 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:47.760928 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.13033: Flags [P.], seq 0:19, ack 1, win 16327, length 19: BGP 14:42:47.800865 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:51.800683 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:55.800447 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:42:57.280231 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [P.], seq 19:38, ack 20, win 5840, length 19: BGP 14:42:57.283556 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [.], ack 38, win 15738, length 0 14:42:59.800785 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:43:00.847597 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [P.], seq 20:39, ack 38, win 15738, length 19: BGP 14:43:00.889214 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [.], ack 39, win 5840, length 0 14:43:03.800570 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:43:07.800836 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:43:11.800672 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:43:15.800466 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:43:17.452663 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.13033: Flags [P.], seq 0:19, ack 1, win 16327, length 19: BGP 14:43:17.493249 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 19, win 5760, length 1440: BGP 14:43:21.210579 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.13033: Flags [FP.], seq 19:78, ack 1, win 16327, length 59: BGP 14:43:21.210765 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], ack 79, win 5760, length 0 14:43:21.250171 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:21.942109 IP6 2001:db8::192:0:2:5 > 2001:db8::192:0:2:6: ICMP6, neighbor solicitation, who has 2001:db8::192:0:2:6, length 32 14:43:21.942192 IP6 2001:db8::192:0:2:6 > 2001:db8::192:0:2:5: ICMP6, neighbor advertisement, tgt is 2001:db8::192:0:2:6, length 32 14:43:22.211598 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [S], seq 751201, win 0, options [mss 1440], length 0 14:43:22.711695 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [S], seq 751201, win 0, options [mss 1440], length 0 14:43:22.713910 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [S.], seq 3276608150, ack 751202, win 16384, options [mss 1440], length 0 14:43:22.714068 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], ack 1, win 5760, length 0 14:43:23.714378 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [P.], seq 1:58, ack 1, win 5760, length 57: BGP 14:43:23.716886 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [.], ack 58, win 16327, length 0 14:43:23.719867 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 1:64, ack 58, win 16327, length 63: BGP 14:43:23.743791 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], ack 64, win 5760, length 0 14:43:23.922552 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 64:83, ack 58, win 16327, length 19: BGP 14:43:23.922845 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:23.922895 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1498:2938, ack 83, win 5760, length 1440: BGP 14:43:23.922911 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 2938:4378, ack 83, win 5760, length 1440: BGP 14:43:23.962405 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], ack 83, win 5760, length 0 14:43:24.675576 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:25.250508 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:26.180585 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:27.281076 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [P.], seq 38:57, ack 39, win 5840, length 19: BGP 14:43:27.283843 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [.], ack 57, win 15738, length 0 14:43:29.189384 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:29.250814 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:30.342683 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [P.], seq 39:58, ack 57, win 15738, length 19: BGP 14:43:30.383492 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [.], ack 58, win 5840, length 0 14:43:33.189099 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:33.251211 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:37.188998 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:37.251439 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:41.188692 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:41.252522 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:45.189455 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:45.252511 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:49.189586 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:49.252399 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:53.189647 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:43:53.252154 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1:1441, ack 79, win 5760, length 1440: BGP 14:43:53.328874 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:43:53.369254 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:43:53.563565 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:43:53.603279 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:43:54.027050 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:43:54.067343 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:43:54.955123 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:43:54.994823 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:43:56.811565 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:43:56.881216 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:43:57.252519 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [R.], seq 4321, ack 79, win 5760, length 0 14:43:57.254670 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.13033: Flags [.], ack 1, win 16327, length 0 14:43:57.254752 IP6 2001:db8::192:0:2:6.13033 > 2001:db8::192:0:2:5.bgp: Flags [R.], seq 1, ack 79, win 0, length 0 14:43:57.280318 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [P.], seq 57:76, ack 58, win 5840, length 19: BGP 14:43:57.281894 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [.], ack 76, win 15738, length 0 14:43:57.935646 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [P.], seq 58:77, ack 76, win 15738, length 19: BGP 14:43:57.975556 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [.], ack 77, win 5840, length 0 14:43:58.013976 IP6 2001:db8::192:0:2:5 > 2001:db8::192:0:2:6: ICMP6, neighbor solicitation, who has 2001:db8::192:0:2:6, length 32 14:43:58.014110 IP6 2001:db8::192:0:2:6 > 2001:db8::192:0:2:5: ICMP6, neighbor advertisement, tgt is 2001:db8::192:0:2:6, length 32 14:44:00.523612 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:44:00.563351 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:04.563087 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:08.139614 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:44:08.179238 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:12.179577 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:16.179903 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:20.180217 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:22.987261 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:44:23.028302 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:24.036817 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [P.], seq 77:96, ack 76, win 15738, length 19: BGP 14:44:24.078346 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [.], ack 96, win 5840, length 0 14:44:27.027810 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:27.280472 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [P.], seq 76:95, ack 96, win 5840, length 19: BGP 14:44:27.282873 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [.], ack 95, win 15738, length 0 14:44:31.028096 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:35.027955 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:39.027726 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:43.027495 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:47.027304 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:48.139069 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [P.], seq 96:115, ack 95, win 15738, length 19: BGP 14:44:48.179718 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [.], ack 115, win 5840, length 0 14:44:51.027575 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:52.683243 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [P.], seq 83:102, ack 58, win 16327, length 19: BGP 14:44:52.723650 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 102, win 5760, length 1440: BGP 14:44:53.728897 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.28248: Flags [FP.], seq 102:161, ack 58, win 16327, length 59: BGP 14:44:53.730429 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], ack 162, win 5760, length 0 14:44:53.770317 IP6 2001:db8::192:0:2:6.28248 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 162, win 5760, length 1440: BGP 14:44:54.730763 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [S], seq 2721057, win 0, options [mss 1440], length 0 14:44:55.230560 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [S], seq 2721057, win 0, options [mss 1440], length 0 14:44:55.233479 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.30871: Flags [S.], seq 2654809933, ack 2721058, win 16384, options [mss 1440], length 0 14:44:55.233580 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [.], ack 1, win 5760, length 0 14:44:56.234946 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [P.], seq 1:58, ack 1, win 5760, length 57: BGP 14:44:56.237034 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.30871: Flags [.], ack 58, win 16327, length 0 14:44:56.240045 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.30871: Flags [P.], seq 1:64, ack 58, win 16327, length 63: BGP 14:44:56.262906 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [.], ack 64, win 5760, length 0 14:44:56.443049 IP6 2001:db8::192:0:2:5.bgp > 2001:db8::192:0:2:6.30871: Flags [P.], seq 64:83, ack 58, win 16327, length 19: BGP 14:44:56.443738 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:44:56.443795 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 1498:2938, ack 83, win 5760, length 1440: BGP 14:44:56.443820 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 2938:4378, ack 83, win 5760, length 1440: BGP 14:44:56.483668 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [.], ack 83, win 5760, length 0 14:44:57.194680 IP6 2001:db8::192:0:2:6.30871 > 2001:db8::192:0:2:5.bgp: Flags [.], seq 58:1498, ack 83, win 5760, length 1440: BGP 14:44:57.281898 IP 192.0.2.6.57548 > 192.0.2.5.bgp: Flags [P.], seq 95:114, ack 115, win 5840, length 19: BGP 14:44:57.284034 IP 192.0.2.5.bgp > 192.0.2.6.57548: Flags [.], ack 114, win 15738, length 0

greg-dennis commented 1 year ago

@stthummuri Please give full repro steps, including the test command you ran and all flags and at what point you executed tcpdump.

apratimmukherjee commented 1 year ago

Looks to me that whenever TCP fragments of size = MTU ( 1514 ) is entering cptx, it is not able to proceed. In this case, there are 254 routes configured ; for IPv4 the frame size containing BGP Update with 254 routes stays < 1514 but for IPv6 BGP Update frame size becomes > 1514. In this case , the TCP connection does not move forward and eventually the session flaps. If route count is reduced for IPv6 Routes ( to say 25 instead of 254 ) in the otg config , then both v4 and v6 sessions go to Established state.

apratimmukherjee commented 1 year ago

@greg-dennis @stthummuri : One more observation , this issue is not specific to BGPv6 , even for BGPv4 if we increase the Route count to say 2540 from 254 , even the BGPv4 connection on the atedst side does not come up. So looks like issue is specific to any TCP fragment ( v4 or v6) == MTU

greg-dennis commented 1 year ago

@stthummuri, if the assertion is that the Ixia is not exhibiting correct behavior, that will need to be resolved with Keysight engineering. I'll let you and @apratimmukherjee continue to discuss.

apratimmukherjee commented 1 year ago

@stthummuri : This test works fine with other container DUTs. Also, it has been tested in non Ondatra environment in b2b and with other DUTs such as FRR that there is no problem with BGP or BGPv6 sessions with large route counts . One way to confirm this might be to create this sort of setup and testing this manually :

    Src ATE1 ( 128 rts so that UPDATE < 1500 )  -------p1 
                                                        |---- CPTX1 -------p3 -------(256 rts)------------p4 ----CPTX2                                         
    Src ATE2 ( 128 rts so that UPDATE < 1500 ) --------p2

My guess is that the sessions with ATE on p1 and p2 with 128 rts and small UPDATEs will come up but probably the BGPv6 session between p3 and p4 might not come up (assuming CPTX is configured to forward all routes and actually packing routes into MTU sized frames : Maybe by starting CPTX2 BGPv6 peers only after all routes are learned by CPTX1)

[ Note: This might also be related to ISIS issues where ISIS MTU has to be reduced for tests to work. In single node setup in kne + meshnet , only veth interfaces are used and we are able to bring up ISIS sessions without having to reduce ISIS MTU ]

Another suggestion might be to have CPTX1 ---- CPTX2 setup with maybe large no. of /128 static routes ( say 256 such routes ) and redistribute these into BGP . [ Though issue will probably only be seen if CPTX Tx side does try to break them into MTU sized fragments and not send them as smaller frames] Since these look like cptx specific behaviour , assigning this back to you for further investigation on cptx side. I am on leave from today and will be available after the holidays. However, do include me in any mail chain related to this issue and I will try to respond.

apratimmukherjee commented 1 year ago

@stthummuri : Looks like I donot have permissions for assigning you to look into this further from cptx side.

stthummuri commented 1 year ago

@apratimmukherjee We debugged this internally and looks like an mtu issue with cptx. I am closing this issue. Thanks for looking into it