east-console.txt

来自「ipsec vpn」· 文本 代码 · 共 88 行

TXT
88
字号
east:~# route delete -net 192.0.1.0 netmask 255.255.255.0east:~# route delete -net defaulteast:~# route add -net default gw 192.1.2.45east:~# ipsec setup startipsec_setup: Starting Openswan IPsec VERSIONeast:~# /testing/pluto/basic-pluto-01/eroutewait.sh trapeast:~# ipsec lookeast NOW0.0.0.0/0          -> 0.0.0.0/0          => %trapipsec0->eth1 mtu=16260(9999)->1500Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface0.0.0.0         192.1.2.45      0.0.0.0         UG       99 0          0 eth10.0.0.0         192.1.2.45      128.0.0.0       UG       99 0          0 ipsec0128.0.0.0       192.1.2.45      128.0.0.0       UG       99 0          0 ipsec0192.1.2.0       0.0.0.0         255.255.255.0   U        99 0          0 eth1192.1.2.0       0.0.0.0         255.255.255.0   U        99 0          0 ipsec0east:~# ipsec auto --add cleareast:~# ipsec whack --listen002 listening for IKE messages002 forgetting secrets002 loading secrets from "/etc/ipsec.secrets"002 loading group "/etc/ipsec.d/policies/clear"east:~# ipsec eroute0          0.0.0.0/0          -> 0.0.0.0/0          => %trapeast:~# ipsec auto --route cleareast:~# ipsec eroute0          0.0.0.0/0          -> 0.0.0.0/0          => %trap0          192.1.2.23/32      -> 192.0.1.0/24       => %passeast:~# echo endendeast:~# ping -c 8 -n 192.0.1.1PING 192.0.1.1 (192.0.1.1): 56 data bytes64 bytes from 192.0.1.1: icmp_seq=0 ttl=257 time=999 ms64 bytes from 192.0.1.1: icmp_seq=1 ttl=257 time=999 ms64 bytes from 192.0.1.1: icmp_seq=2 ttl=257 time=999 ms64 bytes from 192.0.1.1: icmp_seq=3 ttl=257 time=999 ms64 bytes from 192.0.1.1: icmp_seq=4 ttl=257 time=999 ms64 bytes from 192.0.1.1: icmp_seq=5 ttl=257 time=999 ms64 bytes from 192.0.1.1: icmp_seq=6 ttl=257 time=999 ms64 bytes from 192.0.1.1: icmp_seq=7 ttl=257 time=999 ms--- 192.0.1.1 ping statistics ---8 packets transmitted, 8 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mseast:~# ipsec lookeast NOW0.0.0.0/0          -> 0.0.0.0/0          => %trap192.1.2.23/32      -> 192.0.1.0/24       => %passipsec0->eth1 mtu=16260(9999)->1500Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface0.0.0.0         192.1.2.45      0.0.0.0         UG       99 0          0 eth10.0.0.0         192.1.2.45      128.0.0.0       UG       99 0          0 ipsec0128.0.0.0       192.1.2.45      128.0.0.0       UG       99 0          0 ipsec0192.0.1.0       192.1.2.45      255.255.255.0   UG       99 0          0 ipsec0192.1.2.0       0.0.0.0         255.255.255.0   U        99 0          0 eth1192.1.2.0       0.0.0.0         255.255.255.0   U        99 0          0 ipsec0east:~# echo endendeast:~# east:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...east:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.east:~# halt -p -fPower down.

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?