Lines Matching full:ipsec
10 # ns3 and ns4 are connected via ipsec tunnel.
12 # ns1: ping 10.0.2.2: passes via ipsec tunnel.
13 # ns2: ping 10.0.1.2: passes via ipsec tunnel.
15 # ns1: ping 10.0.1.253: passes via ipsec tunnel (direct policy)
16 # ns2: ping 10.0.2.253: passes via ipsec tunnel (direct policy)
18 # ns1: ping 10.0.2.254: does NOT pass via ipsec tunnel (exception)
19 # ns2: ping 10.0.1.254: does NOT pass via ipsec tunnel (exception)
242 echo "PASS: ping to .254 bypassed ipsec tunnel ($logpostfix)"
245 # ping to .253 should use use ipsec due to direct policy exception.
248 echo "FAIL: expected ping to .253 to use ipsec tunnel ($logpostfix)"
254 # ping to .2 should use ipsec.
257 echo "FAIL: expected ping to .2 to use ipsec tunnel ($logpostfix)"
342 # needed to check if policy lookup got valid ipsec result
402 ip netns exec ${ns[3]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
403 ip netns exec ${ns[4]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
424 # ping to .254 should use ipsec, exception is not installed.
427 echo "FAIL: expected ping to .254 to use ipsec tunnel"