description.txt 1.0 KB

123456789101112131415
  1. The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>.
  2. The IKEv2 key exchange is based on the NewHope lattice-based post-quantum algorithm
  3. with a cryptographical strength of 128 bits. Authentication is based on the BLISS
  4. algorithm with strengths 128 bits (BLISS I), 160 bits (BLISS III) and 192 bits (BLISS IV) for
  5. <b>carol</b>, <b>dave</b> and <b>moon</b>, respectively.
  6. <p>
  7. Both <b>carol</b> and <b>dave</b> request a <b>virtual IP</b> via the IKEv2 configuration payload
  8. by using the <b>leftsourceip=%config</b> parameter. The gateway <b>moon</b> assigns virtual
  9. IP addresses from a simple pool defined by <b>rightsourceip=10.3.0.0/28</b> in a monotonously
  10. increasing order.
  11. <p>
  12. <b>leftfirewall=yes</b> automatically inserts iptables-based firewall rules that let pass
  13. the tunneled traffic. In order to test the tunnels, <b>carol</b> and <b>dave</b> then ping
  14. the client <b>alice</b> behind the gateway <b>moon</b>. The source IP addresses of the two
  15. pings will be the virtual IPs <b>carol1</b> and <b>dave1</b>, respectively.