description.txt 757 B

1234567891011
  1. The roadwarriors <b>carol</b> and <b>dave</b> set up a connection to gateway <b>moon</b>.
  2. The authentication is based on RSA signatures (<b>RSASIG</b>) using X.509 certificates
  3. followed by extended authentication (<b>XAUTH</b>) of <b>carol</b> and <b>dave</b>
  4. based on user names equal to the <b>IKEv1 identity</b> (<b>carol@strongswan.org</b> and
  5. <b>dave@strongswan.org</b>, respectively) and corresponding user passwords defined and
  6. stored in ipsec.secrets.
  7. <p>
  8. Upon the successful establishment of the IPsec tunnel, leftfirewall=yes automatically
  9. inserts iptables-based firewall rules that let pass the tunneled traffic.
  10. In order to test both tunnel and firewall, <b>carol</b> and <b>dave</b> ping the client
  11. <b>alice</b> behind the gateway <b>moon</b>.