description.txt 637 B

1234567891011
  1. The roadwarrior <b>carol</b> sets up a connection to gateway <b>moon</b>.
  2. At the outset the gateway authenticates itself to the client by sending
  3. an IKEv2 <b>digital signature</b> accompanied by an X.509 certificate.
  4. <p/>
  5. Next <b>carol</b> uses the <i>Authentication and Key Agreement</i> (<b>EAP-AKA</b>)
  6. method of the <i>Extensible Authentication Protocol</i> to authenticate herself.
  7. This EAP method used in UMTS, but here a secret defined in <b>ipsec.secrets</b>
  8. is used instead of a USIM/(R)UIM device.
  9. <p/>
  10. In addition to her IKEv2 identity <b>carol@strongswan.org</b>, roadwarrior <b>carol</b>
  11. uses the EAP identity <b>carol</b>.