This test has a road warrior, ("road") connecting to VPN host east. It shows up from a random IP. It uses PSK to authenticate for phase 1. It uses aggressive mode. It then uses XAUTH to authenticate the phase 1.5. It then uses MODECFG in client pull mode to get an IP. It then proceeds to phase 2.