⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spi1-console.txt

📁 openswan
💻 TXT
字号:
west:~# TZ=GMT export TZwest:~# ipsec spi --clearwest:~# ipsec eroute --clearwest:~# enckey=0x4043434545464649494a4a4c4c4f4f515152525454575758west:~# ipsec klipsdebug --set rcvwest:~# ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto esp --src 192.1.2.23 --esp 3des-md5-96 --enckey $enckey --authkey 0x87658765876587658765876587658765  --natt nonesp --sport 4500 --dport 4500west:~# ipsec spi --af inet --edst 192.1.2.45 --spi 0x12345678 --proto tun --src 192.1.2.23 --dst 192.1.2.45 --ip4west:~# ipsec spigrp inet 192.1.2.45 0x12345678 tun inet 192.1.2.45 0x12345678 esp west:~# ipsec tncfg --attach --virtual ipsec0 --physical eth1west:~# ifconfig ipsec0 inet 192.1.2.45 netmask 0xffffff00 broadcast 192.1.2.255 upwest:~# ipsec lookwest NOWipsec0->eth1 mtu=16260(1500)->1500esp0x12345678@192.1.2.45 ESP_3DES_HMAC_MD5: dir=in  src=192.1.2.23 iv_bits=64bits iv=0xDEADF00DDEADF00D alen=128 aklen=128 eklen=192 life(c,s,h)= natencap=nonesp natsport=4500 natdport=4500 refcount=4 ref=3tun0x12345678@192.1.2.45 IPIP: dir=in  src=192.1.2.23 life(c,s,h)= natencap=none natsport=0 natdport=0 refcount=4 ref=4Destination     Gateway         Genmask         Flags   MSS Window  irtt Ifacewest:~# route add -host 192.0.2.1 gw 192.1.2.23 dev ipsec0west:~# ipsec ikeping --ikeport 4500 --listen --natt&[1] 121west:~# tcpdump -t -x -X -e -i ipsec0 -n -P 4tcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on ipsec0, link-type EN10MB (Ethernet), capture size 96 bytes10:00:00:64:64:23 > 10:00:00:64:64:45, ethertype IPv4 (0x0800), length 98: 192.0.2.1 > 192.0.1.1: ICMP echo request seq 1280, length 64	0x0000:  4500 0054 0000 4000 3f01 b8a6 c000 0201	0x0010:  c000 0101 0800 baf0 6f00 0500 239b c73b	0x0020:  f234 0100 0809 0a0b 0c0d 0e0f 1011 1213	0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223	0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233	0x0050:  343510:00:00:64:64:23 > 10:00:00:64:64:45, ethertype IPv4 (0x0800), length 98: 192.0.2.1 > 192.0.1.1: ICMP echo request seq 1536, length 64	0x0000:  4500 0054 0000 4000 3f01 b8a6 c000 0201	0x0010:  c000 0101 0800 72f0 6f00 0600 289b c73b	0x0020:  3435 0100 0809 0a0b 0c0d 0e0f 1011 1213	0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223	0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233	0x0050:  343510:00:00:64:64:23 > 10:00:00:64:64:45, ethertype IPv4 (0x0800), length 98: 192.0.2.1 > 192.0.1.1: ICMP echo request seq 1792, length 64	0x0000:  4500 0054 0000 4000 3f01 b8a6 c000 0201	0x0010:  c000 0101 0800 d9ef 6f00 0700 2d9b c73b	0x0020:  c735 0100 0809 0a0b 0c0d 0e0f 1011 1213	0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223	0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233	0x0050:  343510:00:00:64:64:23 > 10:00:00:64:64:45, ethertype IPv4 (0x0800), length 98: 192.0.2.1 > 192.0.1.1: ICMP echo request seq 2048, length 64	0x0000:  4500 0054 0000 4000 3f01 b8a6 c000 0201	0x0010:  c000 0101 0800 e8ef 6f00 0800 329b c73b	0x0020:  b235 0100 0809 0a0b 0c0d 0e0f 1011 1213	0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223	0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233	0x0050:  34354 packets captured8 packets received by filter0 packets dropped by kernel

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -