📄 wi-log
字号:
whackwest --name ipsec-psk --delete --psk --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --updown silly --to --updown sally --host 127.95.7.1 --ikeport 8500 --client 127.95.7.8/30 --authenticate --encrypt --pfs --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2002 added connection description "ipsec-psk"whackeast --name ipsec-psk --delete --psk --host 127.95.7.2 --ikeport 8500 --client 127.95.7.20/30 --updown silly --to --updown sally --host 127.95.7.1 --ikeport 8500 --client 127.95.7.8/30 --authenticate --encrypt --pfs --rekeymargin 350 --ikelifetime 900 --ipseclifetime 800 --keyingtries 2002 added connection description "ipsec-psk"whackwest --listen002 listening for IKE messages002 adding interface virtual127.95.7.1/lo:w 127.95.7.1:8500002 loading secrets from "/tmp/ipsec.secrets/west"whackeast --listen002 listening for IKE messages002 adding interface virtual127.95.7.2/lo:e 127.95.7.2:8500002 loading secrets from "/tmp/ipsec.secrets/east"whackwest --name ipsec-psk --initiate002 "ipsec-psk" #1: initiating Main Mode104 "ipsec-psk" #1: STATE_MAIN_I1: initiate003 "ipsec-psk" #1: received Vendor ID payload [Openswan (this version) cvs2005Jun22_21:45:38 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]003 "ipsec-psk" #1: received Vendor ID payload [Dead Peer Detection]106 "ipsec-psk" #1: STATE_MAIN_I2: sent MI2, expecting MR2002 "ipsec-psk" #1: I did not send a certificate because I do not have one.108 "ipsec-psk" #1: STATE_MAIN_I3: sent MI3, expecting MR3004 "ipsec-psk" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}002 "ipsec-psk" #2: initiating Quick Mode PSK+ENCRYPT+AUTHENTICATE+TUNNEL+PFS+UP117 "ipsec-psk" #2: STATE_QUICK_I1: initiate004 "ipsec-psk" #2: STATE_QUICK_I2: sent QI2, IPsec SA establishedwhackwest --shutdown002 shutting downwhackeast --shutdown002 shutting down
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -