description.txt 983 B

1234567891011121314
  1. The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>.
  2. The IKEv2 key exchange is based on the NewHope lattice-based post-quantum algorithm
  3. with a cryptographical strength of 128 bits. Authentication is based on the BLISS
  4. algorithm with strengths 128 bits (BLISS I), 160 bits (BLISS III) and 192 bits (BLISS IV) for
  5. <b>carol</b>, <b>dave</b> and <b>moon</b>, respectively.
  6. <p>
  7. Both <b>carol</b> and <b>dave</b> request a <b>virtual IP</b> via the IKEv2 configuration payload.
  8. The gateway <b>moon</b> assigns virtual IP addresses from the pool 10.3.0.0/28 in a monotonously
  9. increasing order.
  10. <p>
  11. <b>leftfirewall=yes</b> automatically inserts iptables-based firewall rules that let pass
  12. the tunneled traffic. In order to test the tunnels, <b>carol</b> and <b>dave</b> then ping
  13. the client <b>alice</b> behind the gateway <b>moon</b>. The source IP addresses of the two
  14. pings will be the virtual IPs <b>carol1</b> and <b>dave1</b>, respectively.