RTU_E_In - Router Tunnel Mode ESP Inbound (with SPD entry)
Router
RTU_E_In.seq [-tooloption ...] -pkt RTU_E_common.def -tooloption : v6eval tool option See also RTU_common.def
For details of Network Topology, see 00README
Set NUT's SAD and SPD as following:
(Link0) (Link1) NET4 NET2 NET0 NET1 HOST1_NET4 -- SG1 -- Router -- NUT -- HOST1_NET1 =====tunnel======>
Security Association Database (SAD)
source address | SG1_NET2 |
destination address | NUT_NET0 |
SPI | 0x1000 |
mode | tunnel |
protocol | ESP |
ESP algorithm | DES-CBC |
ESP algorithm key | 01234567 |
Security Policy Database (SPD)
tunnel source address | SG1_NET2 |
tunnel destination address | NUT_NET0 |
source address | NET4 |
destination address | NET1 |
upper spec | any |
direction | in |
protocol | ESP |
mode | tunnel |
Tester Target Tester (Link0) (Link1) | | | |-------------------------->| | | ICMP Echo Request | | | (with ESP) | | | |-------------------------->| | | ICMP Echo Request | | | | | | | | | | v v v
ICMP Echo Request with ESP to Link0
IP Header | Source Address | SG1_NET2 |
Destination Address | NUT_NET0 | |
ESP | SPI | 0x1000 |
Algorithm | DES-CBC | |
Key | 01234567 | |
IP Header | Source Address | HOST1_NET4 |
Destination Address | HOST1_NET1 | |
ICMP | Type | 128 (Echo Request) |
ICMP Echo Request from Link1
IP Header | Source Address | HOST1_NET4 |
Destination Address | HOST1_NET1 | |
ICMP | Type | 128 (Echo Request) |
PASS: ICMP Echo Request received
perldoc V6evalTool
IPSEC.html IPsec Test Common Utility