description.txt 743 B

123456789
  1. The roadwarriors <b>carol</b> and <b>dave</b> set up a connection to gateway <b>moon</b>.
  2. The authentication is based on RSA public key signatures (<b>pubkey</b>) using X.509 certificates
  3. in the first round followed by extended authentication (<b>xauth</b>) of <b>carol</b> and <b>dave</b>
  4. based on user names equal to the <b>IKEv1 identity</b> (<b>carol@strongswan.org</b> and
  5. <b>dave@strongswan.org</b>, respectively) and corresponding <b>XAuth</b> user passwords.
  6. <p>
  7. Upon the successful establishment of the IPsec tunnel, automatically inserted iptables-based
  8. firewall rules let pass the tunneled traffic. In order to test both tunnel and firewall,
  9. <b>carol</b> and <b>dave</b> ping the client <b>alice</b> behind the gateway <b>moon</b>.