blob: 8531b8553caad048f522d0d37d455f93998539b7 [file] [log] [blame]
Renato Botelho do Coutoead1e532019-10-31 13:31:07 -05001#!/usr/bin/env python3
Neale Ranns6f631152017-10-03 08:20:21 -07002import unittest
3
4from framework import VppTestCase, VppTestRunner
Neale Ranns097fa662018-05-01 05:17:55 -07005from vpp_ip_route import VppIpRoute, VppRoutePath, FibPathType
Paul Vinciguerra95c0ca42019-03-28 13:07:00 -07006from vpp_l2 import L2_PORT_TYPE
7from vpp_sub_interface import L2_VTR_OP, VppDot1QSubint
Jakub Grajciar2f8cd912020-03-27 06:55:06 +01008from vpp_acl import AclRule, VppAcl, VppAclInterface
Neale Ranns6f631152017-10-03 08:20:21 -07009
10from scapy.packet import Raw
Klement Sekerab9ef2732018-06-24 22:49:33 +020011from scapy.layers.l2 import Ether, Dot1Q
Neale Ranns6f631152017-10-03 08:20:21 -070012from scapy.layers.inet import IP, UDP
Neale Rannsf068c3e2018-01-03 04:18:48 -080013from socket import AF_INET, inet_pton
Jakub Grajciar2f8cd912020-03-27 06:55:06 +010014from ipaddress import IPv4Network
Neale Ranns6f631152017-10-03 08:20:21 -070015
Paul Vinciguerra4271c972019-05-14 13:25:49 -040016NUM_PKTS = 67
17
Neale Ranns6f631152017-10-03 08:20:21 -070018
19class TestDVR(VppTestCase):
Neale Ranns62fe07c2017-10-31 12:28:22 -070020 """ Distributed Virtual Router """
Neale Ranns6f631152017-10-03 08:20:21 -070021
Paul Vinciguerra7f9b7f92019-03-12 19:23:27 -070022 @classmethod
23 def setUpClass(cls):
24 super(TestDVR, cls).setUpClass()
25
26 @classmethod
27 def tearDownClass(cls):
28 super(TestDVR, cls).tearDownClass()
29
Neale Ranns6f631152017-10-03 08:20:21 -070030 def setUp(self):
31 super(TestDVR, self).setUp()
32
33 self.create_pg_interfaces(range(4))
Klement Sekerab9ef2732018-06-24 22:49:33 +020034 self.create_loopback_interfaces(1)
Neale Ranns6f631152017-10-03 08:20:21 -070035
36 for i in self.pg_interfaces:
37 i.admin_up()
38
39 self.loop0.config_ip4()
40
41 def tearDown(self):
42 for i in self.pg_interfaces:
43 i.admin_down()
44 self.loop0.unconfig_ip4()
45
46 super(TestDVR, self).tearDown()
47
Neale Ranns55d03782017-10-21 06:34:22 -070048 def assert_same_mac_addr(self, tx, rx):
49 t_eth = tx[Ether]
50 for p in rx:
51 r_eth = p[Ether]
52 self.assertEqual(t_eth.src, r_eth.src)
53 self.assertEqual(t_eth.dst, r_eth.dst)
54
55 def assert_has_vlan_tag(self, tag, rx):
56 for p in rx:
57 r_1q = p[Dot1Q]
58 self.assertEqual(tag, r_1q.vlan)
59
60 def assert_has_no_tag(self, rx):
61 for p in rx:
62 self.assertFalse(p.haslayer(Dot1Q))
63
Neale Ranns6f631152017-10-03 08:20:21 -070064 def test_dvr(self):
65 """ Distributed Virtual Router """
66
67 #
68 # A packet destined to an IP address that is L2 bridged via
69 # a non-tag interface
70 #
71 ip_non_tag_bridged = "10.10.10.10"
72 ip_tag_bridged = "10.10.10.11"
73 any_src_addr = "1.1.1.1"
74
75 pkt_no_tag = (Ether(src=self.pg0.remote_mac,
76 dst=self.loop0.local_mac) /
77 IP(src=any_src_addr,
78 dst=ip_non_tag_bridged) /
79 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +010080 Raw(b'\xa5' * 100))
Neale Ranns6f631152017-10-03 08:20:21 -070081 pkt_tag = (Ether(src=self.pg0.remote_mac,
82 dst=self.loop0.local_mac) /
83 IP(src=any_src_addr,
84 dst=ip_tag_bridged) /
85 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +010086 Raw(b'\xa5' * 100))
Neale Ranns6f631152017-10-03 08:20:21 -070087
88 #
89 # Two sub-interfaces so we can test VLAN tag push/pop
90 #
91 sub_if_on_pg2 = VppDot1QSubint(self, self.pg2, 92)
92 sub_if_on_pg3 = VppDot1QSubint(self, self.pg3, 93)
93 sub_if_on_pg2.admin_up()
94 sub_if_on_pg3.admin_up()
95
96 #
97 # Put all the interfaces into a new bridge domain
98 #
Ole Troana5b2eec2019-03-11 19:23:25 +010099 self.vapi.sw_interface_set_l2_bridge(
100 rx_sw_if_index=self.pg0.sw_if_index, bd_id=1)
101 self.vapi.sw_interface_set_l2_bridge(
102 rx_sw_if_index=self.pg1.sw_if_index, bd_id=1)
103 self.vapi.sw_interface_set_l2_bridge(
104 rx_sw_if_index=sub_if_on_pg2.sw_if_index, bd_id=1)
105 self.vapi.sw_interface_set_l2_bridge(
106 rx_sw_if_index=sub_if_on_pg3.sw_if_index, bd_id=1)
107 self.vapi.sw_interface_set_l2_bridge(
108 rx_sw_if_index=self.loop0.sw_if_index, bd_id=1,
109 port_type=L2_PORT_TYPE.BVI)
Neale Ranns6f631152017-10-03 08:20:21 -0700110
Ole Troane1ade682019-03-04 23:55:43 +0100111 self.vapi.l2_interface_vlan_tag_rewrite(
Ole Troana5b2eec2019-03-11 19:23:25 +0100112 sw_if_index=sub_if_on_pg2.sw_if_index, vtr_op=L2_VTR_OP.L2_POP_1,
113 push_dot1q=92)
Ole Troane1ade682019-03-04 23:55:43 +0100114 self.vapi.l2_interface_vlan_tag_rewrite(
Ole Troana5b2eec2019-03-11 19:23:25 +0100115 sw_if_index=sub_if_on_pg3.sw_if_index, vtr_op=L2_VTR_OP.L2_POP_1,
116 push_dot1q=93)
Neale Ranns6f631152017-10-03 08:20:21 -0700117
Neale Ranns6f631152017-10-03 08:20:21 -0700118 #
119 # Add routes to bridge the traffic via a tagged an nontagged interface
120 #
121 route_no_tag = VppIpRoute(
122 self, ip_non_tag_bridged, 32,
123 [VppRoutePath("0.0.0.0",
124 self.pg1.sw_if_index,
Neale Ranns097fa662018-05-01 05:17:55 -0700125 type=FibPathType.FIB_PATH_TYPE_DVR)])
Neale Ranns6f631152017-10-03 08:20:21 -0700126 route_no_tag.add_vpp_config()
127
128 #
129 # Inject the packet that arrives and leaves on a non-tagged interface
130 # Since it's 'bridged' expect that the MAC headed is unchanged.
131 #
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400132 rx = self.send_and_expect(self.pg0, pkt_no_tag * NUM_PKTS, self.pg1)
Neale Rannsf068c3e2018-01-03 04:18:48 -0800133 self.assert_same_mac_addr(pkt_no_tag, rx)
134 self.assert_has_no_tag(rx)
Neale Ranns6f631152017-10-03 08:20:21 -0700135
136 #
137 # Add routes to bridge the traffic via a tagged interface
138 #
Neale Ranns55d03782017-10-21 06:34:22 -0700139 route_with_tag = VppIpRoute(
Neale Ranns6f631152017-10-03 08:20:21 -0700140 self, ip_tag_bridged, 32,
141 [VppRoutePath("0.0.0.0",
142 sub_if_on_pg3.sw_if_index,
Neale Ranns097fa662018-05-01 05:17:55 -0700143 type=FibPathType.FIB_PATH_TYPE_DVR)])
Neale Ranns55d03782017-10-21 06:34:22 -0700144 route_with_tag.add_vpp_config()
Neale Ranns6f631152017-10-03 08:20:21 -0700145
146 #
Neale Rannsf068c3e2018-01-03 04:18:48 -0800147 # Inject the packet that arrives non-tag and leaves on a tagged
148 # interface
Neale Ranns6f631152017-10-03 08:20:21 -0700149 #
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400150 rx = self.send_and_expect(self.pg0, pkt_tag * NUM_PKTS, self.pg3)
Neale Ranns55d03782017-10-21 06:34:22 -0700151 self.assert_same_mac_addr(pkt_tag, rx)
152 self.assert_has_vlan_tag(93, rx)
Neale Ranns6f631152017-10-03 08:20:21 -0700153
154 #
155 # Tag to tag
156 #
157 pkt_tag_to_tag = (Ether(src=self.pg2.remote_mac,
158 dst=self.loop0.local_mac) /
159 Dot1Q(vlan=92) /
160 IP(src=any_src_addr,
161 dst=ip_tag_bridged) /
162 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +0100163 Raw(b'\xa5' * 100))
Neale Ranns6f631152017-10-03 08:20:21 -0700164
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400165 rx = self.send_and_expect(self.pg2,
166 pkt_tag_to_tag * NUM_PKTS,
167 self.pg3)
Neale Ranns55d03782017-10-21 06:34:22 -0700168 self.assert_same_mac_addr(pkt_tag_to_tag, rx)
169 self.assert_has_vlan_tag(93, rx)
Neale Ranns6f631152017-10-03 08:20:21 -0700170
171 #
172 # Tag to non-Tag
173 #
174 pkt_tag_to_non_tag = (Ether(src=self.pg2.remote_mac,
175 dst=self.loop0.local_mac) /
176 Dot1Q(vlan=92) /
177 IP(src=any_src_addr,
178 dst=ip_non_tag_bridged) /
179 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +0100180 Raw(b'\xa5' * 100))
Neale Ranns6f631152017-10-03 08:20:21 -0700181
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400182 rx = self.send_and_expect(self.pg2,
183 pkt_tag_to_non_tag * NUM_PKTS,
184 self.pg1)
Neale Ranns55d03782017-10-21 06:34:22 -0700185 self.assert_same_mac_addr(pkt_tag_to_tag, rx)
186 self.assert_has_no_tag(rx)
Neale Ranns6f631152017-10-03 08:20:21 -0700187
Neale Ranns55d03782017-10-21 06:34:22 -0700188 #
Neale Rannsf068c3e2018-01-03 04:18:48 -0800189 # Add an output L3 ACL that will block the traffic
190 #
Jakub Grajciar2f8cd912020-03-27 06:55:06 +0100191 rule_1 = AclRule(is_permit=0, proto=17, ports=1234,
192 src_prefix=IPv4Network((any_src_addr, 32)),
193 dst_prefix=IPv4Network((ip_non_tag_bridged, 32)))
194 acl = VppAcl(self, rules=[rule_1])
195 acl.add_vpp_config()
Neale Rannsf068c3e2018-01-03 04:18:48 -0800196
197 #
198 # Apply the ACL on the output interface
199 #
Jakub Grajciar2f8cd912020-03-27 06:55:06 +0100200 acl_if1 = VppAclInterface(self, sw_if_index=self.pg1.sw_if_index,
201 n_input=0, acls=[acl])
202 acl_if1.add_vpp_config()
Neale Rannsf068c3e2018-01-03 04:18:48 -0800203
204 #
205 # Send packet's that should match the ACL and be dropped
206 #
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400207 rx = self.send_and_assert_no_replies(self.pg2,
208 pkt_tag_to_non_tag * NUM_PKTS)
Neale Rannsf068c3e2018-01-03 04:18:48 -0800209
210 #
Neale Ranns55d03782017-10-21 06:34:22 -0700211 # cleanup
212 #
Jakub Grajciar2f8cd912020-03-27 06:55:06 +0100213 acl_if1.remove_vpp_config()
214 acl.remove_vpp_config()
Neale Rannsf068c3e2018-01-03 04:18:48 -0800215
Ole Troana5b2eec2019-03-11 19:23:25 +0100216 self.vapi.sw_interface_set_l2_bridge(
217 rx_sw_if_index=self.pg0.sw_if_index, bd_id=1, enable=0)
218 self.vapi.sw_interface_set_l2_bridge(
219 rx_sw_if_index=self.pg1.sw_if_index, bd_id=1, enable=0)
220 self.vapi.sw_interface_set_l2_bridge(
221 rx_sw_if_index=sub_if_on_pg2.sw_if_index, bd_id=1, enable=0)
222 self.vapi.sw_interface_set_l2_bridge(
223 rx_sw_if_index=sub_if_on_pg3.sw_if_index, bd_id=1, enable=0)
224 self.vapi.sw_interface_set_l2_bridge(
225 rx_sw_if_index=self.loop0.sw_if_index, bd_id=1,
226 port_type=L2_PORT_TYPE.BVI, enable=0)
Neale Ranns55d03782017-10-21 06:34:22 -0700227
228 #
Neale Ranns81458422018-03-12 06:59:36 -0700229 # Do a FIB dump to make sure the paths are correctly reported as DVR
230 #
Neale Ranns097fa662018-05-01 05:17:55 -0700231 routes = self.vapi.ip_route_dump(0)
Neale Ranns81458422018-03-12 06:59:36 -0700232
233 for r in routes:
Neale Ranns097fa662018-05-01 05:17:55 -0700234 if (ip_tag_bridged == str(r.route.prefix.network_address)):
235 self.assertEqual(r.route.paths[0].sw_if_index,
Neale Ranns81458422018-03-12 06:59:36 -0700236 sub_if_on_pg3.sw_if_index)
Neale Ranns097fa662018-05-01 05:17:55 -0700237 self.assertEqual(r.route.paths[0].type,
238 FibPathType.FIB_PATH_TYPE_DVR)
239 if (ip_non_tag_bridged == str(r.route.prefix.network_address)):
240 self.assertEqual(r.route.paths[0].sw_if_index,
Neale Ranns81458422018-03-12 06:59:36 -0700241 self.pg1.sw_if_index)
Neale Ranns097fa662018-05-01 05:17:55 -0700242 self.assertEqual(r.route.paths[0].type,
243 FibPathType.FIB_PATH_TYPE_DVR)
Neale Ranns81458422018-03-12 06:59:36 -0700244
245 #
Neale Ranns55d03782017-10-21 06:34:22 -0700246 # the explicit route delete is require so it happens before
247 # the sbu-interface delete. subinterface delete is required
248 # because that object type does not use the object registry
249 #
250 route_no_tag.remove_vpp_config()
251 route_with_tag.remove_vpp_config()
252 sub_if_on_pg3.remove_vpp_config()
253 sub_if_on_pg2.remove_vpp_config()
254
255 def test_l2_emulation(self):
256 """ L2 Emulation """
257
258 #
259 # non distinct L3 packets, in the tag/non-tag combos
260 #
261 pkt_no_tag = (Ether(src=self.pg0.remote_mac,
262 dst=self.pg1.remote_mac) /
263 IP(src="2.2.2.2",
264 dst="1.1.1.1") /
265 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +0100266 Raw(b'\xa5' * 100))
Neale Ranns55d03782017-10-21 06:34:22 -0700267 pkt_to_tag = (Ether(src=self.pg0.remote_mac,
268 dst=self.pg2.remote_mac) /
269 IP(src="2.2.2.2",
270 dst="1.1.1.2") /
271 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +0100272 Raw(b'\xa5' * 100))
Neale Ranns55d03782017-10-21 06:34:22 -0700273 pkt_from_tag = (Ether(src=self.pg3.remote_mac,
274 dst=self.pg2.remote_mac) /
275 Dot1Q(vlan=93) /
276 IP(src="2.2.2.2",
277 dst="1.1.1.1") /
278 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +0100279 Raw(b'\xa5' * 100))
Neale Ranns55d03782017-10-21 06:34:22 -0700280 pkt_from_to_tag = (Ether(src=self.pg3.remote_mac,
281 dst=self.pg2.remote_mac) /
282 Dot1Q(vlan=93) /
283 IP(src="2.2.2.2",
284 dst="1.1.1.2") /
285 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +0100286 Raw(b'\xa5' * 100))
Neale Ranns55d03782017-10-21 06:34:22 -0700287 pkt_bcast = (Ether(src=self.pg0.remote_mac,
288 dst="ff:ff:ff:ff:ff:ff") /
289 IP(src="2.2.2.2",
290 dst="255.255.255.255") /
291 UDP(sport=1234, dport=1234) /
Ole Troan770a0de2019-11-07 13:52:21 +0100292 Raw(b'\xa5' * 100))
Neale Ranns55d03782017-10-21 06:34:22 -0700293
294 #
295 # A couple of sub-interfaces for tags
296 #
297 sub_if_on_pg2 = VppDot1QSubint(self, self.pg2, 92)
298 sub_if_on_pg3 = VppDot1QSubint(self, self.pg3, 93)
299 sub_if_on_pg2.admin_up()
300 sub_if_on_pg3.admin_up()
301
302 #
303 # Put all the interfaces into a new bridge domain
304 #
Ole Troana5b2eec2019-03-11 19:23:25 +0100305 self.vapi.sw_interface_set_l2_bridge(
306 rx_sw_if_index=self.pg0.sw_if_index, bd_id=1)
307 self.vapi.sw_interface_set_l2_bridge(
308 rx_sw_if_index=self.pg1.sw_if_index, bd_id=1)
309 self.vapi.sw_interface_set_l2_bridge(
310 rx_sw_if_index=sub_if_on_pg2.sw_if_index, bd_id=1)
311 self.vapi.sw_interface_set_l2_bridge(
312 rx_sw_if_index=sub_if_on_pg3.sw_if_index, bd_id=1)
Ole Troane1ade682019-03-04 23:55:43 +0100313 self.vapi.l2_interface_vlan_tag_rewrite(
Ole Troana5b2eec2019-03-11 19:23:25 +0100314 sw_if_index=sub_if_on_pg2.sw_if_index, vtr_op=L2_VTR_OP.L2_POP_1,
315 push_dot1q=92)
Ole Troane1ade682019-03-04 23:55:43 +0100316 self.vapi.l2_interface_vlan_tag_rewrite(
Ole Troana5b2eec2019-03-11 19:23:25 +0100317 sw_if_index=sub_if_on_pg3.sw_if_index, vtr_op=L2_VTR_OP.L2_POP_1,
318 push_dot1q=93)
Neale Ranns55d03782017-10-21 06:34:22 -0700319
320 #
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -0700321 # Disable UU flooding, learning and ARP termination. makes this test
Neale Ranns55d03782017-10-21 06:34:22 -0700322 # easier as unicast packets are dropped if not extracted.
323 #
Ole Troana5b2eec2019-03-11 19:23:25 +0100324 self.vapi.bridge_flags(bd_id=1, is_set=0,
325 flags=(1 << 0) | (1 << 3) | (1 << 4))
Neale Ranns55d03782017-10-21 06:34:22 -0700326
327 #
328 # Add a DVR route to steer traffic at L3
329 #
Neale Ranns097fa662018-05-01 05:17:55 -0700330 route_1 = VppIpRoute(
331 self, "1.1.1.1", 32,
332 [VppRoutePath("0.0.0.0",
333 self.pg1.sw_if_index,
334 type=FibPathType.FIB_PATH_TYPE_DVR)])
335 route_2 = VppIpRoute(
336 self, "1.1.1.2", 32,
337 [VppRoutePath("0.0.0.0",
338 sub_if_on_pg2.sw_if_index,
339 type=FibPathType.FIB_PATH_TYPE_DVR)])
Neale Ranns55d03782017-10-21 06:34:22 -0700340 route_1.add_vpp_config()
341 route_2.add_vpp_config()
342
343 #
Andrey "Zed" Zaikin701625b2018-04-18 17:07:07 +0300344 # packets are dropped because bridge does not flood unknown unicast
Neale Ranns55d03782017-10-21 06:34:22 -0700345 #
346 self.send_and_assert_no_replies(self.pg0, pkt_no_tag)
347
348 #
349 # Enable L3 extraction on pgs
350 #
Ole Troane1ade682019-03-04 23:55:43 +0100351 self.vapi.l2_emulation(self.pg0.sw_if_index)
352 self.vapi.l2_emulation(self.pg1.sw_if_index)
353 self.vapi.l2_emulation(sub_if_on_pg2.sw_if_index)
354 self.vapi.l2_emulation(sub_if_on_pg3.sw_if_index)
Neale Ranns55d03782017-10-21 06:34:22 -0700355
356 #
357 # now we expect the packet forward according to the DVR route
358 #
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400359 rx = self.send_and_expect(self.pg0, pkt_no_tag * NUM_PKTS, self.pg1)
Neale Ranns55d03782017-10-21 06:34:22 -0700360 self.assert_same_mac_addr(pkt_no_tag, rx)
361 self.assert_has_no_tag(rx)
362
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400363 rx = self.send_and_expect(self.pg0, pkt_to_tag * NUM_PKTS, self.pg2)
Neale Ranns55d03782017-10-21 06:34:22 -0700364 self.assert_same_mac_addr(pkt_to_tag, rx)
365 self.assert_has_vlan_tag(92, rx)
366
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400367 rx = self.send_and_expect(self.pg3, pkt_from_tag * NUM_PKTS, self.pg1)
Neale Ranns55d03782017-10-21 06:34:22 -0700368 self.assert_same_mac_addr(pkt_from_tag, rx)
369 self.assert_has_no_tag(rx)
370
Paul Vinciguerra4271c972019-05-14 13:25:49 -0400371 rx = self.send_and_expect(self.pg3,
372 pkt_from_to_tag * NUM_PKTS,
373 self.pg2)
Neale Ranns55d03782017-10-21 06:34:22 -0700374 self.assert_same_mac_addr(pkt_from_tag, rx)
375 self.assert_has_vlan_tag(92, rx)
376
377 #
378 # but broadcast packets are still flooded
379 #
380 self.send_and_expect(self.pg0, pkt_bcast * 33, self.pg2)
381
382 #
383 # cleanup
384 #
Ole Troane1ade682019-03-04 23:55:43 +0100385 self.vapi.l2_emulation(self.pg0.sw_if_index,
386 enable=0)
387 self.vapi.l2_emulation(self.pg1.sw_if_index,
388 enable=0)
389 self.vapi.l2_emulation(sub_if_on_pg2.sw_if_index,
390 enable=0)
391 self.vapi.l2_emulation(sub_if_on_pg3.sw_if_index,
392 enable=0)
Neale Ranns55d03782017-10-21 06:34:22 -0700393
Ole Troana5b2eec2019-03-11 19:23:25 +0100394 self.vapi.sw_interface_set_l2_bridge(
395 rx_sw_if_index=self.pg0.sw_if_index, bd_id=1, enable=0)
396 self.vapi.sw_interface_set_l2_bridge(
397 rx_sw_if_index=self.pg1.sw_if_index, bd_id=1, enable=0)
398 self.vapi.sw_interface_set_l2_bridge(
399 rx_sw_if_index=sub_if_on_pg2.sw_if_index, bd_id=1, enable=0)
400 self.vapi.sw_interface_set_l2_bridge(
401 rx_sw_if_index=sub_if_on_pg3.sw_if_index, bd_id=1, enable=0)
Neale Ranns55d03782017-10-21 06:34:22 -0700402
403 route_1.remove_vpp_config()
404 route_2.remove_vpp_config()
405 sub_if_on_pg3.remove_vpp_config()
406 sub_if_on_pg2.remove_vpp_config()
407
Neale Ranns6f631152017-10-03 08:20:21 -0700408
409if __name__ == '__main__':
410 unittest.main(testRunner=VppTestRunner)