Annotation of embedaddon/strongswan/testing/tests/tnc/tnccs-20-pdp-eap/description.txt, revision 1.1.1.1

1.1       misho       1: The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to the policy enforcement
                      2: point <b>moon</b>. At the outset the gateway authenticates itself to the clients by sending an IKEv2
                      3: <b>RSA signature</b> accompanied by a certificate. <b>carol</b> and <b>dave</b> then set up an
                      4: <b>EAP-TTLS</b> tunnel each via gateway <b>moon</b> to the policy decision point <b>alice</b>
                      5: authenticated by an X.509 AAA certificate. The strong EAP-TTLS tunnel protects the ensuing weak
                      6: client authentication based on <b>EAP-MD5</b>. In a next step the EAP-TNC protocol is used within
                      7: the EAP-TTLS tunnel to determine the health of <b>carol</b> and <b>dave</b> via the <b>IF-TNCCS 2.0</b>
                      8: client-server interface defined by <b>RFC 5793 PB-TNC</b>. The communication between IMCs and IMVs
                      9: is based on the <b>IF-M</b> protocol defined by <b>RFC 5792 PA-TNC</b>. The <b>SWIMA</b> IMC on <b>carol</b>
                     10: is requested to deliver a concise <b>Software ID Inventory</b> whereas <b>dave</b> must send a full
                     11: <b>Software Inventory</b>.
                     12: <p>
                     13: <b>carol</b> passes the health test and <b>dave</b> fails. Based on these measurements the clients
                     14: are connected by gateway <b>moon</b> to the "rw-allow" and "rw-isolate" subnets, respectively.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>