⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 west-console.txt

📁 openswan
💻 TXT
字号:
west:~# TESTNAME=dpd-04west:~# source /testing/pluto/bin/westlocal.shwest:~# iptables -F INPUTwest:~# ipsec setup startipsec_setup: Starting Openswan IPsec VERSIONwest:~# /testing/pluto/bin/wait-until-policy-loadedwest:~# ipsec auto --add west-eastwest:~# ipsec auto --add west-eastnetwest:~# ipsec auto --add westnet-eastwest:~# ping -q -c 8 -n 192.1.2.23PING 192.1.2.23 (192.1.2.23): 56 data bytes--- 192.1.2.23 ping statistics ---8 packets transmitted, 8 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mswest:~# ipsec auto --up west-east104 "west-east" #1: STATE_MAIN_I1: initiate003 "west-east" #1: received Vendor ID payload [Openswan 003 "west-east" #1: received Vendor ID payload [Dead Peer Detection]106 "west-east" #1: STATE_MAIN_I2: sent MI2, expecting MR2108 "west-east" #1: STATE_MAIN_I3: sent MI3, expecting MR3004 "west-east" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}117 "west-east" #2: STATE_QUICK_I1: initiate004 "west-east" #2: STATE_QUICK_I2: sent QI2, IPsec SA establishedwest:~# ipsec auto --up west-eastnet117 "west-eastnet" #3: STATE_QUICK_I1: initiate004 "west-eastnet" #3: STATE_QUICK_I2: sent QI2, IPsec SA establishedwest:~# ipsec auto --up westnet-east117 "westnet-east" #4: STATE_QUICK_I1: initiate004 "westnet-east" #4: STATE_QUICK_I2: sent QI2, IPsec SA establishedwest:~# ping -q -c 8 -n 192.1.2.23PING 192.1.2.23 (192.1.2.23): 56 data bytes--- 192.1.2.23 ping statistics ---8 packets transmitted, 8 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mswest:~# ipsec eroute0          192.0.1.0/24       -> 192.1.2.23/32      => tun0x1006@192.1.2.230          192.1.2.45/32      -> 192.0.2.0/24       => tun0x1004@192.1.2.2312         192.1.2.45/32      -> 192.1.2.23/32      => tun0x1002@192.1.2.23west:~# : Let R_U_THERE packets flowwest:~# sleep 20west:~# : Create the blockwest:~# iptables -I INPUT -s 192.1.2.23/32 -d 0/0 -j DROPwest:~# sleep 20west:~# : DPD should have triggered nowwest:~# ipsec eroute0          192.0.1.0/24       -> 192.1.2.23/32      => %trap0          192.1.2.45/32      -> 192.0.2.0/24       => %trap0          192.1.2.45/32      -> 192.1.2.23/32      => %trapwest:~# iptables -D INPUT -s 192.1.2.23/32 -d 0/0 -j DROPwest:~# ping -q -c 8 -n 192.1.2.23PING 192.1.2.23 (192.1.2.23): 56 data bytes--- 192.1.2.23 ping statistics ---8 packets transmitted, 8 packets received, 0% packet lossround-trip min/avg/max = 3.1/4.5/9.26 mswest:~# ipsec eroute0          192.0.1.0/24       -> 192.1.2.23/32      => %trap0          192.1.2.45/32      -> 192.0.2.0/24       => %trap14         192.1.2.45/32      -> 192.1.2.23/32      => tun0x100a@192.1.2.23west:~# echo donedonewest:~# west:~# ipsec setup stopIPSEC EVENT: KLIPS device ipsec0 shut down.ipsec_setup: Stopping Openswan IPsec...west:~# echo endendwest:~# : ==== end ===west:~# ipsec setup stopipsec_setup: Stopping Openswan IPsec...ipsec_setup: stop ordered, but IPsec does not appear to be running!ipsec_setup: doing cleanup anyway...west:~# kill `cat /var/run/klogd.pid`; cat /tmp/klog.logklogd 1.3-3#33.1, log source = /proc/kmsg started.west:~# halt -p -fPower down.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -