⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 eastinit.sh

📁 ipsec vpn
💻 SH
字号:
: ==== start ====set -uroute delete -net 192.0.1.0 netmask 255.255.255.0route delete -net defaultroute add -net default gw 192.1.2.45# start the local name servernamed# verify that we have some dns data!dig sunrise-oe.uml.freeswan.org anetstat -rne# create modified ipsec control filesexport IPSEC_CONFS="/tmp/etc"mkdir $IPSEC_CONFScp -a /etc/ipsec.conf /etc/ipsec.d $IPSEC_CONFS/# some useless secret (not ours, but we don't know that)cp -a /testing/baseconfigs/japan/etc/ipsec.secrets $IPSEC_CONFS/ipsec setup start/testing/pluto/bin/wait-until-pluto-startedipsec auto --add privateipsec whack --listenipsec auto --route private: ==== cut ====ipsec look: ==== tuc ====#route delete -net 192.1.2.0 netmask 255.255.255.0 dev ipsec0# this eroute was added because we were suspicous that KLIPS might be# catching packets and not know what do to with them since they matched# no eroute (and thus weren't eligble for the port-500 hole). This belief# proved to be wrong.#ipsec eroute --add --eraf inet --src 192.1.2.23/32 --dst 0.0.0.0/0 --said %pass#ipsec klipsdebug --set tunnel#ipsec look#(echo $$ >/tmp/eth1.pid   && tcpdump -i eth1   -l -n -p -s 1600 > /tmp/eth1.txt) &#(echo $$ >/tmp/ipsec0.pid && tcpdump -i ipsec0 -l -n -p -s 1600 > /tmp/ipsec0.txt) &

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -