test/nitsi/test/raw-device-get-by-mac \
test/nitsi/test/zone-new-bridge \
test/nitsi/test/zone-port-attach-bridge \
- test/nitsi/test/vpn-ipsec-ipv4-via-ipv4-vti \
- test/nitsi/test/vpn-ipsec-ipv4-via-ipv6-vti \
- test/nitsi/test/vpn-ipsec-ipv64-via-ipv4-vti \
- test/nitsi/test/vpn-ipsec-ipv64-via-ipv6-vti \
- test/nitsi/test/vpn-ipsec-ipv6-via-ipv4-vti \
- test/nitsi/test/vpn-ipsec-ipv6-via-ipv6-vti
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv4-via-ipv4 \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv4-via-ipv6 \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv6-via-ipv4 \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv6-via-ipv6 \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv64-via-ipv4 \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv64-via-ipv6 \
+ test/nitsi/test/port-vlan
EXTRA_DIST += \
test/nitsi/test/settings.in \
test/nitsi/test/zone-new-bridge/settings.in \
test/nitsi/test/zone-port-attach-bridge/recipe \
test/nitsi/test/zone-port-attach-bridge/settings.in \
- test/nitsi/test/vpn-ipsec-ipv4-via-ipv4-vti/recipe \
- test/nitsi/test/vpn-ipsec-ipv4-via-ipv6-vti/recipe \
- test/nitsi/test/vpn-ipsec-ipv64-via-ipv4-vti/recipe \
- test/nitsi/test/vpn-ipsec-ipv64-via-ipv6-vti/recipe \
- test/nitsi/test/vpn-ipsec-ipv6-via-ipv4-vti/recipe \
- test/nitsi/test/vpn-ipsec-ipv6-via-ipv6-vti/recipe \
- test/nitsi/test/vpn-ipsec-ipv4-via-ipv4-vti/settings \
- test/nitsi/test/vpn-ipsec-ipv4-via-ipv6-vti/settings \
- test/nitsi/test/vpn-ipsec-ipv64-via-ipv4-vti/settings \
- test/nitsi/test/vpn-ipsec-ipv64-via-ipv6-vti/settings \
- test/nitsi/test/vpn-ipsec-ipv6-via-ipv4-vti/settings \
- test/nitsi/test/vpn-ipsec-ipv6-via-ipv6-vti/settings
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv4-via-ipv4/recipe \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv4-via-ipv4/settings \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv4-via-ipv6/recipe \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv4-via-ipv6/settings \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv6-via-ipv4/recipe \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv6-via-ipv4/settings \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv6-via-ipv6/recipe \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv6-via-ipv6/settings \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv64-via-ipv4/recipe \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv64-via-ipv4/settings \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv64-via-ipv6/recipe \
+ test/nitsi/test/vpn/ipsec/n2n/vti/ipv64-via-ipv6/settings \
+ test/nitsi/test/port-vlan/recipe \
+ test/nitsi/test/port-vlan/settings
CLEANFILES += \
test/nitsi/test/settings \
-include: ../../include/setup
-include: ../../include/phase1
+include: setup
+include: phase1
# Let Alice ping Bob
alice: ping -c 5 192.168.100.102
--- /dev/null
+include: setup
+
+# This contains the basic network configuration for all vpn-tests
+include: alice-port-vars
+include: bob-port-vars
+
+# Create an uplink zone
+all: network zone new upl0 bridge --stp=off
+
+# Add IP addresses for Alice
+alice: network zone upl0 config new static 192.168.100.101/24
+
+# Add IP addresses for Bob
+bob: network zone upl0 config new static 192.168.100.102/24
+
+# Print what has been brought up
+all: network status
+
+# Create a vlan device with parent port attached to net1
+all: network port new vlan --parent-device=${p_net1} --tag=42
+all: network zone upl0 port attach "${p_net1}v42"
+
+# Test if the vlan works by pinging bob
+alice: ping -c 5 192.168.100.102
+
+# Test that we can detach the vlan port
+all: network zone upl0 port detach "${p_net1}v42"
-include: ../../include/setup
+include: setup
# Get port names for Alice and Bob
-include: ../../include/alice-port-vars
-include: ../../include/bob-port-vars
+include: alice-port-vars
+include: bob-port-vars
# Start a PPPoE server on Alice
alice: network zone new upl0 bridge
-include: ../../include/setup
+include: setup
alice: port="$(network raw device-get-by-mac-address "52:54:00:8a:b8:b5")"
alice: echo $port
alice: [ "52:54:00:8a:b8:b5" = "$(cat /sys/class/net/${port}/address)" ]
[GENERAL]
copy_from = ../../../@PACKAGE_NAME@-@PACKAGE_VERSION@.tar.gz
copy_to = /root/
+include_path = ../include
[VIRTUAL_ENVIRONMENT]
path = ../virtual-environment/basic
+++ /dev/null
-include: ../../include/vpn-ipsec-basic-connection
-include: ../../include/vpn-ipsec-basic-peer-ipv4
-include: ../../include/vpn-ipsec-basic-ts-ipv64
-all: mv -f /root/strongswan.conf /etc/strongswan.conf
-all: systemctl restart strongswan
-all:network vpn ipsec connection basic mode vti
-alice: network vpn ipsec connection basic up
-include: ../../include/vpn-ipsec-basic-ping-test-ipv64
-include: ../../include/vpn-ipsec-basic-vti-test
-all: swanctl --list-sas
-all: ip route show
-all: ip route show table 220
-all: network vpn ipsec connection basic down
-all: network vpn ipsec connection destroy basic
\ No newline at end of file
+++ /dev/null
-include: ../../include/vpn-ipsec-basic-connection
-include: ../../include/vpn-ipsec-basic-peer-ipv6
-include: ../../include/vpn-ipsec-basic-ts-ipv64
-all: mv -f /root/strongswan.conf /etc/strongswan.conf
-all: systemctl restart strongswan
-all:network vpn ipsec connection basic mode vti
-alice: network vpn ipsec connection basic up
-include: ../../include/vpn-ipsec-basic-ping-test-ipv64
-include: ../../include/vpn-ipsec-basic-vti-test
-all: swanctl --list-sas
-all: ip route show
-all: ip route show table 220
-all: network vpn ipsec connection basic down
-all: network vpn ipsec connection destroy basic
\ No newline at end of file
--- /dev/null
+include: vpn-ipsec-basic-connection
+include: vpn-ipsec-basic-peer-ipv4
+include: vpn-ipsec-basic-ts-ipv4
+all: mv -f /root/strongswan.conf /etc/strongswan.conf
+all: systemctl restart strongswan
+all:network vpn ipsec connection basic mode vti
+alice: network vpn ipsec connection basic up
+include: vpn-ipsec-basic-ping-test-ipv4
+include: vpn-ipsec-basic-vti-test
+all: swanctl --list-sas
+all: ip route show
+all: ip route show table 220
+alice: network vpn ipsec connection basic down
+all: network vpn ipsec connection destroy basic
-include: ../../include/vpn-ipsec-basic-connection
-include: ../../include/vpn-ipsec-basic-peer-ipv4
-include: ../../include/vpn-ipsec-basic-ts-ipv4
+include: vpn-ipsec-basic-connection
+include: vpn-ipsec-basic-peer-ipv6
+include: vpn-ipsec-basic-ts-ipv4
all: mv -f /root/strongswan.conf /etc/strongswan.conf
all: systemctl restart strongswan
all:network vpn ipsec connection basic mode vti
alice: network vpn ipsec connection basic up
-include: ../../include/vpn-ipsec-basic-ping-test-ipv4
-include: ../../include/vpn-ipsec-basic-vti-test
+include: vpn-ipsec-basic-ping-test-ipv4
+include: vpn-ipsec-basic-vti-test
all: swanctl --list-sas
all: ip route show
all: ip route show table 220
all: network vpn ipsec connection basic down
-all: network vpn ipsec connection destroy basic
\ No newline at end of file
+all: network vpn ipsec connection destroy basic
-include: ../../include/vpn-ipsec-basic-connection
-include: ../../include/vpn-ipsec-basic-peer-ipv6
-include: ../../include/vpn-ipsec-basic-ts-ipv4
+include: vpn-ipsec-basic-connection
+include: vpn-ipsec-basic-peer-ipv4
+include: vpn-ipsec-basic-ts-ipv6
all: mv -f /root/strongswan.conf /etc/strongswan.conf
all: systemctl restart strongswan
all:network vpn ipsec connection basic mode vti
alice: network vpn ipsec connection basic up
-include: ../../include/vpn-ipsec-basic-ping-test-ipv4
-include: ../../include/vpn-ipsec-basic-vti-test
+include: vpn-ipsec-basic-ping-test-ipv6
+include: vpn-ipsec-basic-vti-test
all: swanctl --list-sas
all: ip route show
all: ip route show table 220
all: network vpn ipsec connection basic down
-all: network vpn ipsec connection destroy basic
\ No newline at end of file
+all: network vpn ipsec connection destroy basic
-include: ../../include/vpn-ipsec-basic-connection
-include: ../../include/vpn-ipsec-basic-peer-ipv4
-include: ../../include/vpn-ipsec-basic-ts-ipv6
+include: vpn-ipsec-basic-connection
+include: vpn-ipsec-basic-peer-ipv6
+include: vpn-ipsec-basic-ts-ipv6
all: mv -f /root/strongswan.conf /etc/strongswan.conf
all: systemctl restart strongswan
all:network vpn ipsec connection basic mode vti
alice: network vpn ipsec connection basic up
-include: ../../include/vpn-ipsec-basic-ping-test-ipv6
-include: ../../include/vpn-ipsec-basic-vti-test
+include: vpn-ipsec-basic-ping-test-ipv6
+include: vpn-ipsec-basic-vti-test
all: swanctl --list-sas
all: ip route show
all: ip route show table 220
all: network vpn ipsec connection basic down
-all: network vpn ipsec connection destroy basic
\ No newline at end of file
+all: network vpn ipsec connection destroy basic
-include: ../../include/vpn-ipsec-basic-connection
-include: ../../include/vpn-ipsec-basic-peer-ipv6
-include: ../../include/vpn-ipsec-basic-ts-ipv6
+include: vpn-ipsec-basic-connection
+include: vpn-ipsec-basic-peer-ipv4
+include: vpn-ipsec-basic-ts-ipv64
all: mv -f /root/strongswan.conf /etc/strongswan.conf
all: systemctl restart strongswan
all:network vpn ipsec connection basic mode vti
alice: network vpn ipsec connection basic up
-include: ../../include/vpn-ipsec-basic-ping-test-ipv6
-include: ../../include/vpn-ipsec-basic-vti-test
+include: vpn-ipsec-basic-ping-test-ipv64
+include: vpn-ipsec-basic-vti-test
all: swanctl --list-sas
all: ip route show
all: ip route show table 220
all: network vpn ipsec connection basic down
-all: network vpn ipsec connection destroy basic
\ No newline at end of file
+all: network vpn ipsec connection destroy basic
--- /dev/null
+include: vpn-ipsec-basic-connection
+include: vpn-ipsec-basic-peer-ipv6
+include: vpn-ipsec-basic-ts-ipv64
+all: mv -f /root/strongswan.conf /etc/strongswan.conf
+all: systemctl restart strongswan
+all:network vpn ipsec connection basic mode vti
+alice: network vpn ipsec connection basic up
+include: vpn-ipsec-basic-ping-test-ipv64
+include: vpn-ipsec-basic-vti-test
+all: swanctl --list-sas
+all: ip route show
+all: ip route show table 220
+all: network vpn ipsec connection basic down
+all: network vpn ipsec connection destroy basic
-include: ../../include/setup
+include: setup
alice: network zone new upl0 bridge
# this returns zero if the device exists
-include: ../../include/setup
+include: setup
alice: network zone new upl0 bridge
# Create a dummy port we can attach to upl0