📄 wi-log
字号:
../whack --ctlbase ./pluto.west --name ipsec-psk-rw --delete --psk --updown sally --host 127.95.7.1 --ikeport 8500 --client 127.95.7.8/30 --to --updown silly --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2002 added connection description "ipsec-psk-rw"../whack --ctlbase ./pluto.east --name ipsec-psk-rw --delete --psk --updown silly --host %any --ikeport 8500 --client 127.95.7.8/30 --to --updown sally --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --nexthop %direct --encrypt --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2002 added connection description "ipsec-psk-rw"../whack --ctlbase ./pluto.west --listen002 listening for IKE messages002 adding interface virtual127.95.7.1/lo:w 127.95.7.1002 loading secrets from "./ipsec.secrets/west"../whack --ctlbase ./pluto.east --listen002 listening for IKE messages002 adding interface virtual127.95.7.2/lo:e 127.95.7.2002 loading secrets from "./ipsec.secrets/east"../whack --ctlbase ./pluto.west --name ipsec-psk-rw --initiate002 "ipsec-psk-rw" #1: initiating Main Mode104 "ipsec-psk-rw" #1: STATE_MAIN_I1: initiate106 "ipsec-psk-rw" #1: STATE_MAIN_I2: sent MI2, expecting MR2108 "ipsec-psk-rw" #1: STATE_MAIN_I3: sent MI3, expecting MR3002 "ipsec-psk-rw" #1: ISAKMP SA established004 "ipsec-psk-rw" #1: STATE_MAIN_I4: ISAKMP SA established002 "ipsec-psk-rw" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL112 "ipsec-psk-rw" #2: STATE_QUICK_I1: initiate002 "ipsec-psk-rw" #2: sent QI2, IPsec SA established004 "ipsec-psk-rw" #2: STATE_QUICK_I2: sent QI2, IPsec SA established../whack --ctlbase ./pluto.west --shutdown002 shutting down../whack --ctlbase ./pluto.east --shutdown002 shutting down
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -