A connection between the subnets behind the gateways moon and sun is set up.
The authentication is based on X.509 certificates using SHA-2 to create signatures
as enabled by the IKEv2 Signature Authentication extension described in RFC 7427.
Upon the successful establishment of the IPsec tunnel, leftfirewall=yes automatically
inserts iptables-based firewall rules that let pass the tunneled traffic.
In order to test both tunnel and firewall, client alice behind gateway moon
pings client bob located behind gateway sun.