IPSEC.pm - utility functions for IPsec test
use IPSEC;
This module contains methods to test IPsec.
Output 'OK' to log and exit (exit code is Pass).
Output no message and Exit (exit code is Ignore).
Output 'This test is not supported now' to log and Exit (exit code is NS).
Output 'Warn' (color is green) to log and Exit (exit code is Warn).
Output 'This test is for the host only' to log and Exit (exit code is HostOnly).
Output 'This test is for the router only' to log and Exit (exit code is HostOnly).
Output 'NG' (color is red) to log and Exit (exit code is Fail).
Output 'Fatal' (color is red) to log and Exit (exit code is Fatal).
Reboot the target.
This function calls 'reboot.rmt' simply.
Check NUT type in 'nut.def'. Parameter $require
is one of
'host' or 'router'.
If 'Type' in nut.def does not match to $require, output message and exit (HostOnly, RouterOnly or Fatal).
Set SAD (Security Association Database) entry.
This function calls 'ipsecSetSAD.rmt' with @params
simply. If
remote command fails, output message and exit (Fail).
Same function as the above. But set SAD (Security Association Database) entry asynchronously.
Set SPD (Security Policy Database) entry.
This function calls 'ipsecSetSPD.rmt' with @params
simply. If
remote command fails, output message and exit (Fail).
Same function as the above. But set SPD (Security Policy Database) entry asynchronously.
Clear all SAD and SPD entries.
This function calls 'ipsecClearAll.rmt' simply. If remote command fails, output message and exit (Fail).
Enable and start IPsec function.
This function calls 'ipsecEnable.rmt' simply. If remote command fails, output message and exit (Fail).
Emulate Ping to NUT.
Send $req
to NUT and wait $rep
from NUT.
If NS is received from NUT, send NA to NUT and wait $rep
again.
Emulate Fragmented Ping to NUT.
Send $req1st
and $req2nd
to NUT and wait
$rep1st
and $rep2nd
from NUT.
Check packet forwarding with encapsulation.
Send $p1
to NUT's $IFs
and wait $p2
from NUT's $IFr.
If NS is received from NUT, send NA to NUT and wait $p2
again.
Check packet forwarding with decapsulation.
Send $p1
to NUT's $IFs
and wait $p2
from NUT's $IFr.
If NS is received from NUT, send NA to NUT and wait $p2
again.
perldoc V6EvalTool perldoc V6Remote perldoc /usr/local/v6eval/bin/manual/ipsecSetSAD.rmt perldoc /usr/local/v6eval/bin/manual/ipsecSetSPD.rmt perldoc /usr/local/v6eval/bin/manual/ipsecClearAll.rmt perldoc /usr/local/v6eval/bin/manual/ipsecEnable.rmt