Note
SVTI requires an IPsec Application License.
SVTI¶
Secure Virtual Tunnel Interfaces are generic virtual interfaces ensuring IPsec transformation. They are used to configure route-based VPNs.
Each SVTI interface has its own SAD and SPD.
Unlike other tunnel interfaces, an SVTI interface is not a point-to-point interface between two specific gateways, the encapsulation addresses are determined by the SPs and SAs matched by the traffic.
These interfaces have an SVTI ID parameter to associate them to IPsec SAs/SPs. This ID must be unique per-VRF 1.
To configure SVTI, enter the interface
context in the desired VRF
and type svti
followed by the SVTI interface name. The interface name must
start with svti
. The configuration is valid as soon as the SVTI identifier
is set.
Here is an example of an SVTI named svti100
with an SVTI identifier 100
:
vsr running vrf main# interface svti svti100
vsr running svti svti100#! svti-id 100
vsr running svti svti100# commit
The SVTI interface is configured and ready to be associated to an IKE VPN.
Let’s fetch the state after committing this configuration:
vsr running vrf main# interface svti svti100
vsr running svti svti100# show state
svti svti100
mtu 1500
promiscuous false
enabled true
ipv6
address fe80::afb4:e94a:240a:23f3/64
..
svti-id 100
oper-status UNKNOWN
counters
in-octets 0
in-unicast-pkts 0
in-discards 0
in-errors 0
out-octets 0
out-unicast-pkts 0
out-discards 0
out-errors 0
..
link-interface lo
..
The same configuration can be made using this NETCONF XML configuration:
vsr> show config xml absolute vrf main interface svti svti100
<config xmlns="urn:6wind:vrouter">
<vrf>
<name>main</name>
<interface xmlns="urn:6wind:vrouter/interface">
<svti xmlns="urn:6wind:vrouter/svti">
<name>svti100</name>
<enabled>true</enabled>
<ipv4>
<enabled>true</enabled>
</ipv4>
<ipv6>
<enabled>true</enabled>
</ipv6>
<svti-id>100</svti-id>
</svti>
</interface>
</vrf>
</config>
- 1
To be precise, the (link VRF, SVTI ID) pair must be unique, see paragraph Cross-VRF.
Cross-VRF¶
Like other tunnel interfaces, an SVTI interface is defined in a VRF and is assigned a possibly different link VRF (the VRF of encapsulated packets). SVTI interfaces can therefore be used to do cross-VRF.
The (link VRF, SVTI ID) pair uniquely identifies an SVTI interface, regardless of the interface VRF.
The SPs, SAs and IKE configuration are located in the SVTI interface link VRF.
Here is an example of an SVTI located in vrf2
but with a link-vrf
in
vrf1
:
vsr running vrf vrf2# interface svti svti100
vsr running svti svti100#! svti-id 100
vsr running svti svti100# link-vrf vrf1
vsr running svti svti100# commit
In this configuration, the clear traffic will be in vrf2 and the encrypted traffic in vrf1.
SVTI templates¶
SVTI templates are models of SVTI interfaces used for dynamic SVTI interface creation. An IKE VPN may reference an SVTI template, so that an SVTI interface is created for each established IKE SA, and the negotiated SAs and SPs attached to it.
To configure an SVTI template, enter the interface
context in the desired
VRF and type svti-template
followed by the SVTI template name.
Here is an example of an SVTI template named svtitemp100
:
vsr running vrf main# interface svti-template svtitemp100
vsr running svti-template svtitemp100# mtu 1300
vsr running svti-template svtitemp100# commit
The dynamically created SVTI interface names will start with dsvti
and do
not depend on the template name. Their SVTI ID is dynamically chosen by IKE.
See also
The command reference for details.