⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 auto.add.v2

📁 ipsec vpn
💻 V2
字号:
PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --label "\"mms\" leftrsasigkey"  --keyid "@203.19.245.83" --pubkeyrsa "0sAQP...." \	|| exit $?ipsec whack --label "\"mms\" rightrsasigkey"  --keyid "@203.202.188.202" --pubkeyrsa "0sAQ..." \	|| exit $?ipsec whack --name mms --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \	--host "203.19.245.83" --client "203.9.249.0/24" --nexthop "203.19.245.81" --updown "ipsec _updown" --id "@203.19.245.83"  \	--to --host "203.202.188.202" --client "203.13.0.0/16" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202"  \	--ipseclifetime "28800" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --name singtel1 --encrypt --tunnel --ikelifetime "3600" --disablearrivalcheck --psk \	--host "165.21.42.232" --client "10.251.250.0/24" --nexthop "165.21.42.237" --updown "ipsec _updown" --id "165.21.42.232"  \	--to --host "203.202.188.202" --client "10.59.6.0/24" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "203.202.188.202"  \	--ipseclifetime "28800" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --name amethon --encrypt --tunnel --pfs --disablearrivalcheck --psk \	--host "203.174.137.190" --client "192.168.5.0/24" --nexthop "%direct" --updown "ipsec _updown" --id "203.174.137.190"  \	--to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown"   \	--ipseclifetime "28800" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --label "\"elogic\" leftrsasigkey"  --keyid "@203.134.166.148" --pubkeyrsa "0sAQ..." \	|| exit $?ipsec whack --label "\"elogic\" rightrsasigkey"  --keyid "@203.202.188.202" --pubkeyrsa "0sAQP...." \	|| exit $?ipsec whack --name elogic --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \	--host "203.134.166.148" --client "192.168.2.0/24" --nexthop "203.134.166.129" --updown "ipsec _updown" --id "@203.134.166.148"  \	--to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202"  \	--ipseclifetime "28800" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --label "\"mms1\" leftrsasigkey"  --keyid "@203.19.245.83" --pubkeyrsa "0sAQP.." \	|| exit $?ipsec whack --label "\"mms1\" rightrsasigkey"  --keyid "@203.202.188.202" --pubkeyrsa "0sAQ..." \	|| exit $?ipsec whack --name mms1 --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \	--host "203.19.245.83" --client "203.9.249.0/24" --nexthop "203.19.245.81" --updown "ipsec _updown" --id "@203.19.245.83"  \	--to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202"  \	--ipseclifetime "28800" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --name singtel --encrypt --tunnel --ikelifetime "28800" --disablearrivalcheck --psk \	--host "165.21.42.232" --client "10.251.250.0/24" --nexthop "161.21.42.237" --updown "ipsec _updown" --id "165.21.42.232"  \	--to --host "203.202.188.202" --client "10.59.4.0/24" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "203.202.188.202"  \	--ipseclifetime "3600" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --label "\"Sasme\" leftrsasigkey"  --keyid "@ipsec.ninemsn.com.au" --pubkeyrsa "0sAQP..." \	|| exit $?ipsec whack --label "\"Sasme\" rightrsasigkey"  --keyid "@203.202.188.202" --pubkeyrsa "0sAQP..." \	|| exit $?ipsec whack --name Sasme --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \	--host "%any" --client "192.168.3.0/24" --nexthop "%direct" --updown "ipsec _updown" --id "@ipsec.ninemsn.com.au"  \	--to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202"  \	--ipseclifetime "28800" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --name lateral --encrypt --tunnel --ikelifetime "3600" --disablearrivalcheck --psk \	--host "202.36.231.222" --client "202.36.230.0/24" --nexthop "%direct" --updown "ipsec _updown" --id "202.36.231.222"  \	--to --host "203.202.188.202" --client "10.59.0.0/16" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "203.202.188.202"  \	--ipseclifetime "86400" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin"export PATHipsec whack --label "\"wap\" leftrsasigkey"  --keyid "@202.139.125.54" --pubkeyrsa "0sAQN..." \	|| exit $?ipsec whack --label "\"wap\" rightrsasigkey"  --keyid "@203.202.188.202" --pubkeyrsa "0sAQP...." \	|| exit $?ipsec whack --name wap --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \	--host "202.139.125.54" --client "192.168.0.0/24" --nexthop "202.139.125.49" --updown "ipsec _updown" --id "@202.139.125.54"  \	--to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202"  \	--ipseclifetime "28800" --rekeymargin "540" \	--keyingtries "0"    \	|| exit $?

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -