Lines Matching full:ping
12 # ns1: ping 10.0.2.2: passes via ipsec tunnel.
13 # ns2: ping 10.0.1.2: passes via ipsec tunnel.
15 # ns1: ping 10.0.1.253: passes via ipsec tunnel (direct policy)
16 # ns2: ping 10.0.2.253: passes via ipsec tunnel (direct policy)
18 # ns1: ping 10.0.2.254: does NOT pass via ipsec tunnel (exception)
19 # ns2: ping 10.0.1.254: does NOT pass via ipsec tunnel (exception)
206 ip netns exec ${ns[1]} ping -q -c 1 10.0.2.$ip > /dev/null
217 ip netns exec ${ns[2]} ping -q -c 1 10.0.1.$ip > /dev/null
236 # ping to .254 should be excluded from the tunnel (exception is in place).
239 echo "FAIL: expected ping to .254 to fail ($logpostfix)"
242 echo "PASS: ping to .254 bypassed ipsec tunnel ($logpostfix)"
245 # ping to .253 should use use ipsec due to direct policy exception.
248 echo "FAIL: expected ping to .253 to use ipsec tunnel ($logpostfix)"
254 # ping to .2 should use ipsec.
257 echo "FAIL: expected ping to .2 to use ipsec tunnel ($logpostfix)"
401 # abuse iptables rule counter to check if ping matches a policy
424 # ping to .254 should use ipsec, exception is not installed.
427 echo "FAIL: expected ping to .254 to use ipsec tunnel"