1# Copyright (c) 2013 The Chromium OS Authors. All rights reserved. 2# Use of this source code is governed by a BSD-style license that can be 3# found in the LICENSE file. 4 5AUTHOR = 'pstew, wiley, quiche' 6NAME = 'network_VPNConnect.l2tpipsec_psk' 7ATTRIBUTES = "suite:bvt-perbuild, suite:network_nightly, suite:toolchain-tests" 8TIME = 'SHORT' 9TEST_TYPE = 'client' 10 11DOC = """ 12 Tests that we can complete L2TP/IPSec PSK VPN authentication. 13 This is a client-only test which verifies function of the L2TP/IPSec 14 client. Since the server it is testing against is itself, this test 15 is best suited for verifying that the connection manager and VPN 16 manager are correctly passing parameters to the underlying VPN client 17 to have it properly connect. 18 19 This test fails if the DUT cannot authenticate to a locally running 20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet 21 interface. 22 23 The -evil variant simulates connecting to a VPN gateway that specifies 24 its public IP as the point-to-point (remote) PPP address. This 25 configuration has caused routing loops in the past, so we test it 26 explicitly in order to catch regressions. 27 28""" 29 30job.run_test('network_VPNConnect', 31 vpn_types=[ 'l2tpipsec-psk', 32 'l2tpipsec-psk-evil' ], 33 tag=NAME.split('.')[1]) 34