A connection between the subnets behind the gateways moon and sun is set up. The authentication is based on X.509 certificates using SHA-2 to create signatures as enabled by the IKEv2 Signature Authentication extension described in RFC 7427. Upon the successful establishment of the IPsec tunnel, leftfirewall=yes automatically inserts iptables-based firewall rules that let pass the tunneled traffic. In order to test both tunnel and firewall, client alice behind gateway moon pings client bob located behind gateway sun.