TCPDUMP

sun# tcpdump -i eth0 not port ssh and not port domain > /tmp/tcpdump.log 2>&1 &

PRE-TEST

moon# /etc/init.d/iptables start 2> /dev/null
 * Caching service dependencies ...                                       [ ok ]
 * Starting firewall ...                                                  [ ok ]

sun# /etc/init.d/iptables start 2> /dev/null
 * Caching service dependencies ...                                       [ ok ]
 * Starting firewall ...                                                  [ ok ]

moon# rm /etc/ipsec.d/cacerts/*

sun# rm /etc/ipsec.d/cacerts/*

moon# ipsec start
Starting strongSwan 4.6.4 IPsec [starter]...
No leaks detected, 5 suppressed by whitelist

sun# ipsec start
Starting strongSwan 4.6.4 IPsec [starter]...
No leaks detected, 5 suppressed by whitelist

moon# sleep 2

moon# ipsec up net-net
initiating IKE_SA net-net[1] to 192.168.0.2
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from 192.168.0.1[500] to 192.168.0.2[500]
received packet: from 192.168.0.2[500] to 192.168.0.1[500]
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ]
authentication of 'moon.strongswan.org' (myself) with RSA signature successful
establishing CHILD_SA net-net
generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 192.168.0.1[4500] to 192.168.0.2[4500]
received packet: from 192.168.0.2[4500] to 192.168.0.1[4500]
parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) ]
no issuer certificate found for "sun.strongswan.org"
  using trusted certificate "sun.strongswan.org"
authentication of 'b4:2f:31:fe:c8:0a:e3:26:4a:10:1c:85:97:7a:04:ac:8d:16:38:d3' with RSA signature successful
IKE_SA net-net[1] established between 192.168.0.1[moon.strongswan.org]...192.168.0.2[b4:2f:31:fe:c8:0a:e3:26:4a:10:1c:85:97:7a:04:ac:8d:16:38:d3]
scheduling reauthentication in 3362s
maximum IKE_SA lifetime 3542s
No leaks detected, 1 suppressed by whitelist


TEST

moon# ipsec status | grep 'net-net.*INSTALLED' [YES]
No leaks detected, 1 suppressed by whitelist
     net-net{1}:  INSTALLED, TUNNEL, ESP SPIs: ca099ec6_i cdf22329_o

sun# ipsec status | grep 'net-net.*INSTALLED' [YES]
No leaks detected, 1 suppressed by whitelist
     net-net{1}:  INSTALLED, TUNNEL, ESP SPIs: cdf22329_i ca099ec6_o

alice# ping -c 1 10.2.0.10 | grep '64 bytes from 10.2.0.10: icmp_seq=1' [YES]
64 bytes from 10.2.0.10: icmp_seq=1 ttl=62 time=1.28 ms

sun# killall tcpdump

sun# cat /tmp/tcpdump.log | grep 'IP moon.strongswan.org > sun.strongswan.org: ESP' [YES]
21:44:40.015740 IP moon.strongswan.org > sun.strongswan.org: ESP(spi=0xcdf22329,seq=0x1), length 132

sun# cat /tmp/tcpdump.log | grep 'IP sun.strongswan.org > moon.strongswan.org: ESP' [YES]
21:44:40.016283 IP sun.strongswan.org > moon.strongswan.org: ESP(spi=0xca099ec6,seq=0x1), length 132


POST-TEST

moon# ipsec stop
Stopping strongSwan IPsec...

sun# ipsec stop
Stopping strongSwan IPsec...

moon# /etc/init.d/iptables stop 2> /dev/null
 * Stopping firewall ...                                                  [ ok ]

sun# /etc/init.d/iptables stop 2> /dev/null
 * Stopping firewall ...                                                  [ ok ]

moon# rm /etc/ipsec.d/certs/*

moon# rm /etc/ipsec.d/private/*

sun# rm /etc/ipsec.d/certs/*

sun# rm /etc/ipsec.d/private/*