Lines Matching full:ipsec
10 # ns3 and ns4 are connected via ipsec tunnel.
12 # ns1: ping 10.0.2.2: passes via ipsec tunnel.
13 # ns2: ping 10.0.1.2: passes via ipsec tunnel.
15 # ns1: ping 10.0.1.253: passes via ipsec tunnel (direct policy)
16 # ns2: ping 10.0.2.253: passes via ipsec tunnel (direct policy)
18 # ns1: ping 10.0.2.254: does NOT pass via ipsec tunnel (exception)
19 # ns2: ping 10.0.1.254: does NOT pass via ipsec tunnel (exception)
243 echo "PASS: ping to .254 bypassed ipsec tunnel ($logpostfix)"
246 # ping to .253 should use use ipsec due to direct policy exception.
249 echo "FAIL: expected ping to .253 to use ipsec tunnel ($logpostfix)"
255 # ping to .2 should use ipsec.
258 echo "FAIL: expected ping to .2 to use ipsec tunnel ($logpostfix)"
343 # needed to check if policy lookup got valid ipsec result
402 ip netns exec ns3 iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
403 ip netns exec ns4 iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
424 # ping to .254 should use ipsec, exception is not installed.
427 echo "FAIL: expected ping to .254 to use ipsec tunnel"