blob: a28ab0e6f811cf891a554037852c11598ce708be [file] [log] [blame]
# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
AUTHOR = 'pstew, wiley, quiche'
NAME = 'network_VPNConnect.l2tpipsec_psk'
ATTRIBUTES = "suite:bvt-perbuild, suite:network_nightly, suite:toolchain-tests"
TIME = 'SHORT'
TEST_TYPE = 'client'
DOC = """
Tests that we can complete L2TP/IPSec PSK VPN authentication.
This is a client-only test which verifies function of the L2TP/IPSec
client. Since the server it is testing against is itself, this test
is best suited for verifying that the connection manager and VPN
manager are correctly passing parameters to the underlying VPN client
to have it properly connect.
This test fails if the DUT cannot authenticate to a locally running
L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
interface.
The -evil variant simulates connecting to a VPN gateway that specifies
its public IP as the point-to-point (remote) PPP address. This
configuration has caused routing loops in the past, so we test it
explicitly in order to catch regressions.
"""
job.run_test('network_VPNConnect',
vpn_types=[ 'l2tpipsec-psk',
'l2tpipsec-psk-evil' ],
tag=NAME.split('.')[1])