mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-04 00:00:14 -04:00
For documentation purposes the new folders ikev1-algs, ikev2-algs, ikev1-multi-ca and ikev2-multi-ca have been created. Most of the test cases have now been converted to the vici interface. The remaining legacy stroke scenarios yet to be converted have been put into the ikev2-stroke-bye folder. For documentation purposes some legacy stroke scenarios will be kept in the ikev1-stroke, ikev2-stroke and ipv6-stroke folders.
14 lines
796 B
Plaintext
Executable File
14 lines
796 B
Plaintext
Executable File
The roadwarrior <b>carol</b> sets up a connection to gateway <b>moon</b>.
|
|
The authentication is based on RSA signatures using X.509 certificates followed by extended
|
|
authentication (<b>XAUTH</b>) of <b>carol</b> based on a user name equal to the <b>IKEv1</b> identity
|
|
carol@strongswan.org and a user password defined and stored by <b>carol</b> in the secrets
|
|
section of swanctl.conf.
|
|
<p/>
|
|
Gateway <b>moon</b> delegates the verification of <b>carol</b>'s XAUTH user credentials to
|
|
the RADIUS server <b>alice</b>.
|
|
<p>
|
|
Upon the successful establishment of the IPsec tunnel, the updown-script automatically
|
|
inserts iptables-based firewall rules that let pass the tunneled traffic.
|
|
In order to test both tunnel and firewall, <b>carol</b> pings the client <b>alice</b>
|
|
behind the gateway <b>moon</b>.
|