⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 eroute.5

📁 This a good VPN source
💻 5
字号:
.TH IPSEC_EROUTE 5 "20 Sep 2001".\".\" RCSID $Id: eroute.5,v 1.10 2003/10/31 02:32:27 mcr Exp $.\".SH NAMEipsec_eroute \- list of existing eroutes.SH SYNOPSIS.B ipsec.B eroute.PP.B cat.B /proc/net/ipsec_eroute.SH DESCRIPTION.I /proc/net/ipsec_eroutelists the IPSEC extended routing tables,which control what (if any) processing is appliedto non-encrypted packets arriving for IPSEC processing and forwarding.At this point it is a read-only file..PPA table entry consists of:.IP + 3packet count,.IP +source address with mask and source port (0 if all ports or not applicable).IP +a '->' separator for visual and automated parsing between src and dst.IP +destination address with mask and destination port (0 if all ports ornot applicable).IP +a '=>' separator for visual and automated parsing between selectioncriteria and SAID to use.IP +SAID (Security Association IDentifier), comprised of:.IP + 6protocol(\fIproto\fR),.IP +address family(\fIaf\fR),where '.' stands for IPv4 and ':' for IPv6.IP +Security Parameters Index(\fISPI\fR),.IP +effective destination(\fIedst\fR),where the packet should be forwarded after processing(normally the other security gateway)together indicate which Security Association should be used to processthe packet,.IP + 3a ':' separating the SAID from the transport protocol (0 if all protocols).IP +source identity text string with no whitespace, in parens,.IP +destination identity text string with no whitespace, in parens.PPAddresses are written as IPv4 dotted quads or IPv6 coloned hex,protocol is one of "ah", "esp", "comp" or "tun"andSPIs are prefixed hexadecimal numbers where the prefix '.' is for IPv4 and the prefix ':' is for IPv6..PPSAIDs are written as "protoafSPI@edst".  There are also 5"magic" SAIDs which have special meaning:.IP + 3.B %dropmeans that matches are to be dropped.IP +.B %rejectmeans that matches are to be dropped and an ICMP returned, ifpossible to inform.IP +.B %trapmeans that matches are to trigger an ACQUIRE message to the KeyManagement daemon(s) and a hold eroute will be put in place toprevent subsequent packets also triggering ACQUIRE messages..IP +.B %holdmeans that matches are to stored until the eroute is replaced oruntil that eroute gets reaped.IP +.B %passmeans that matches are to allowed to pass without IPSEC processing.br.ne 5.SH EXAMPLES.LP.B "1867     172.31.252.0/24:0  -> 0.0.0.0/0:0        => tun0x130@192.168.43.1:0 ".br.B "        ()	()".LPmeans that 1,867 packets have been sent to an.BR eroutethat has been set up to protect traffic between the subnet.BR 172.31.252.0with a subnet mask of.BR 24bits and the default address/mask represented by an address of.BR 0.0.0.0with a subnet mask of.BR 0bits using the local machine as a security gateway on this end of thetunnel and the machine.BR 192.168.43.1on the other end of the tunnel with a Security Association IDentifier of.BR tun0x130@192.168.43.1which means that it is a tunnel mode connection (4, IPPROTO_IPIP) with aSecurity Parameters Index of.BR 130in hexadecimal with no identies defined for either end..LP.B "746     192.168.2.110/32:0  -> 192.168.2.120/32:25   => esp0x130@192.168.2.120:6 ".br.B "        ()	()".LPmeans that 746 packets have been sent to an.BR eroutethat has been set up to protect traffic sent from any port on the host.BR 192.168.2.110to the SMTP (TCP, port 25) port on the host.BR 192.168.2.120with a Security Association IDentifier of.BR tun0x130@192.168.2.120which means that it is a transport mode connection with aSecurity Parameters Index of.BR 130in hexadecimal with no identies defined for either end..LP.B 125      3049:1::/64    -> 0:0/0          => tun:130@3058:4::5	()	().LPmeans that 125 packets have been sent to an.BR eroutethat has been set up to protect traffic between the subnet.BR 3049:1::with a subnet mask of.BR 64bits and the default address/mask represented by an address of.BR 0:0with a subnet mask of.BR 0bits using the local machine as a security gateway on this end of thetunnel and the machine.BR 3058:4::5on the other end of the tunnel with a Security Association IDentifier of.BR tun:130@3058:4::5which means that it is a tunnel mode connection with aSecurity Parameters Index of.BR 130in hexadecimal with no identies defined for either end..LP.B 42         192.168.6.0/24:0   -> 192.168.7.0/24:0   => %passthrough.LPmeans that 42 packets have been sent to an.BR eroutethat has been set up to pass the traffic from the subnet.BR 192.168.6.0with a subnet mask of.BR 24bits and to subnet.BR 192.168.7.0with a subnet mask of.BR 24bits without any IPSEC processing with no identies defined for either end..LP.B 2112     192.168.8.55/32:0  -> 192.168.9.47/24:0  => %hold	(east)	().LPmeans that 2112 packets have been sent to an.BR eroutethat has been set up to hold the traffic from the host.BR 192.168.8.55and to host.BR 192.168.9.47until a key exchange from a Key Management daemonsucceeds and puts in an SA or fails and puts in a passor drop eroute depending on the default configuration with the local clientdefined as "east" and no identy defined for the remote end..LP.B "2001     192.168.2.110/32:0  -> 192.168.2.120/32:0 => ".br.B "        esp0xe6de@192.168.2.120:0	()	()".LPmeans that 2001 packets have been sent to an.BR eroutethat has been set up to protect traffic between the host.BR 192.168.2.110and the host.BR 192.168.2.120using.BR 192.168.2.110as a security gateway on this end of theconnection and the machine.BR 192.168.2.120on the other end of the connection with a Security Association IDentifier of.BR esp0xe6de@192.168.2.120which means that it is a transport mode connection with a SecurityParameters Index of.BR e6dein hexadecimal using Encapsuation Security Payload protocol (50,IPPROTO_ESP) with no identies defined for either end..LP.B "1984     3049:1::110/128   -> 3049:1::120/128   => ".br.B "        ah:f5ed@3049:1::120	()	()".LPmeans that 1984 packets have been sent to an.BR eroutethat has been set up to authenticate traffic between the host.BR 3049:1::110and the host.BR 3049:1::120using.BR 3049:1::110as a security gateway on this end of theconnection and the machine.BR 3049:1::120on the other end of the connection with a Security Association IDentifier of.BR ah:f5ed@3049:1::120which means that it is a transport mode connection with a SecurityParameters Index of.BR f5edin hexadecimal using Authentication Header protocol (51,IPPROTO_AH) with no identies defined for either end..SH FILES/proc/net/ipsec_eroute, /usr/local/bin/ipsec.SH "SEE ALSO"ipsec(8), ipsec_manual(8), ipsec_tncfg(5), ipsec_spi(5),ipsec_spigrp(5), ipsec_klipsdebug(5), ipsec_eroute(8), ipsec_version(5),ipsec_pf_key(5).SH HISTORYWritten for the Linux FreeS/WAN project<http://www.freeswan.org/>by Richard Guy Briggs..\".\" $Log: eroute.5,v $.\" Revision 1.10  2003/10/31 02:32:27  mcr.\" 	pulled up port-selector patches.\".\" Revision 1.9.28.1  2003/09/21 14:00:26  mcr.\" 	pre-liminary X.509 patch - does not yet pass tests..\".\" Revision 1.9  2002/04/24 07:35:38  mcr.\" Moved from ./klips/utils/eroute.5,v.\".\" Revision 1.8  2001/09/20 15:33:13  rgb.\" PF_KEYv2 ident extension output documentation..\".\" Revision 1.7  2001/05/29 05:15:31  rgb.\" Added packet count field at beginning of line..\".\" Revision 1.6  2001/02/26 19:58:32  rgb.\" Put SAID elements in order they appear in SAID..\" Implement magic SAs %drop, %reject, %trap, %hold, %pass as part.\" of the new SPD and to support opportunistic..\".\" Revision 1.5  2000/09/17 18:56:48  rgb.\" Added IPCOMP support..\".\" Revision 1.4  2000/09/13 15:54:31  rgb.\" Added Gerhard's ipv6 updates..\".\" Revision 1.3  2000/06/30 18:21:55  rgb.\" Update SEE ALSO sections to include ipsec_version(5) and ipsec_pf_key(5).\" and correct FILES sections to no longer refer to /dev/ipsec which has.\" been removed since PF_KEY does not use it..\".\" Revision 1.2  2000/06/28 12:44:11  henry.\" format touchup.\".\" Revision 1.1  2000/06/28 05:43:00  rgb.\" Added manpages for all 5 klips utils..\".\".\"

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -