Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Setting the soc property for num_sa_per_sc on macsec encrypt and decrypt #11166

Merged
merged 3 commits into from
Jun 27, 2022

Conversation

arista-nwolfe
Copy link
Contributor

Why I did it

These are the recommended soc property settings by Broadcom.
If we don't specify these it's assumed we have only 1 SA per SC on encrypt.
This causes issues when AN=1 (due to rekey or link flap)

How to verify it

Setup a macsec session and flap 1 of the links.
The macsec session after the link flap should be created successfully.

@@ -994,3 +994,6 @@ serdes_tx_taps_33=nrz:-5:83:-22:0:0:0
serdes_tx_taps_34=nrz:-5:83:-22:0:0:0
serdes_tx_taps_35=nrz:-4:75:-21:0:0:0
serdes_tx_taps_36=nrz:-8:89:-29:0:0:0

xflow_macsec_secure_chan_to_num_secure_assoc_encrypt=2
xflow_macsec_secure_chan_to_num_secure_assoc_decrypt=2
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Broadcom did share these values for J2C+ based ASIC, could you cross-check.

xflow_macsec_secure_chan_to_num_secure_assoc_encrypt=2
xflow_macsec_secure_chan_to_num_secure_assoc_**decrypt=4**

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The reason we chose to use 2 is because on J2C+ the max_sa_per_sc is 2 (we'll never use ANs 2 or 3) so we can't utilize all 4 SAs on the decrypt side.
So in result using decrypt=4 will just burn half the decrypt table scale.
However for macsec the scale will be limited by the number of ports so I don't think we can even reach half the decrypt scale.
So I think it's fine to use decrypt=4 to be consistent with Broadcom's recommendations.

@arlakshm arlakshm added Platform: Arista Chassis 🤖 Modular chassis support labels Jun 21, 2022
@arista-nwolfe
Copy link
Contributor Author

I noticed these changes got approved.
Do you still want me to switch the xflow_macsec_secure_chan_to_num_secure_assoc_decrypt=4?
Or should I leave it as 2?

@arlakshm
Copy link
Contributor

arlakshm commented Jun 22, 2022

I noticed these changes got approved. Do you still want me to switch the xflow_macsec_secure_chan_to_num_secure_assoc_decrypt=4? Or should I leave it as 2?

I misread the code. Can you please update xflow_macsec_secure_chan_to_num_secure_assoc_decrypt=4 as per Judy's comment

Copy link
Contributor

@judyjoseph judyjoseph left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, LGTM

@arlakshm
Copy link
Contributor

Hi @arista-nwolfe , can you resolve the conflicts ?

@judyjoseph judyjoseph merged commit 19dcfd3 into sonic-net:master Jun 27, 2022
@yxieca
Copy link
Contributor

yxieca commented Jun 28, 2022

@arista-nwolfe this change cannot be cherry-picked cleanly. Please create PR for 202205 branch.

@arista-nwolfe
Copy link
Contributor Author

I created PR 11279 for 202205 branch

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants