description.txt 760 B

12345678910
  1. The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>.
  2. The authentication is based on trustworthy public keys stored as <b>IPSECKEY</b>
  3. resource records in the Domain Name System (DNS) and protected by <b>DNSSEC</b>.
  4. </p>
  5. Both <b>carol</b> and <b>dave</b> request a <b>virtual IP</b> via the IKEv2 configuration payload
  6. by using the <b>leftsourceip=%config</b> parameter. <b>leftfirewall=yes</b> automatically
  7. inserts iptables-based firewall rules that let pass the tunneled traffic. In order to test the
  8. tunnels, <b>carol</b> and <b>dave</b> then ping the client <b>alice</b> behind the gateway
  9. <b>moon</b>. The source IP addresses of the two pings will be the virtual IPs <b>carol1</b>
  10. and <b>dave1</b>, respectively.