⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spi1-console.txt

📁 openswan
💻 TXT
字号:
west:~# TZ=GMT export TZwest:~# ipsec spi --clearwest:~# ipsec eroute --clearwest:~# ipsec klipsdebug --set pfkeywest:~# ipsec eroute --add --eraf inet --src 192.0.1.0/24 --dst 192.0.2.0/24 --said %trapwest:~# ipsec tncfg --attach --virtual ipsec0 --physical eth1west:~# ifconfig ipsec0 inet 192.1.2.45 netmask 0xffffff00 broadcast 192.1.2.255 upwest:~# arp -s 192.1.2.23 10:00:00:64:64:45west:~# arp -s 192.1.2.254 10:00:00:64:64:45west:~# ipsec lookwest NOW192.0.1.0/24       -> 192.0.2.0/24       => %trap (0)ipsec0->eth1 mtu=16260(1500)->1500Destination     Gateway         Genmask         Flags   MSS Window  irtt Ifacewest:~# route add -host 192.0.2.1 gw 192.1.2.23 dev ipsec0west:~# mkdir -p /var/run/plutowest:~# ipsec pf_key --daemon /var/run/pluto/pf_key.pid >/tmp/pfkey.txtwest:~# echo start nowstart nowwest:~# kill `cat /var/run/pluto/pf_key.pid`west:~# cat /tmp/pfkey.txt; echo ===pfkey v2 msg. type=7(register) seq=1 len=5 pid=987 errno=0 satype=2(AH)version=2 type=7 errno=0 satype=2 len=5 seq=1 pid=987 {ext=14 len=3 bytes=0x000000000300a000a00000000200800080000000 } pfkey v2 msg. type=7(register) seq=2 len=9 pid=987 errno=0 satype=3(ESP)version=2 type=7 errno=0 satype=3 len=9 seq=2 pid=987 {ext=14 len=4 bytes=0x0000000009008000800000000300a000a00000000200800080000000 } {ext=15 len=3 bytes=0x000000000c808000000100000340a800a8000000 } pfkey v2 msg. type=7(register) seq=3 len=4 pid=987 errno=0 satype=9(IPIP)version=2 type=7 errno=0 satype=9 len=4 seq=3 pid=987 {ext=15 len=2 bytes=0x000000000100200020000000 } pfkey v2 msg. type=7(register) seq=4 len=4 pid=987 errno=0 satype=10(COMP)version=2 type=7 errno=0 satype=10 len=4 seq=4 pid=987 {ext=15 len=2 bytes=0x000000000200010001000000 } pf_key: Exiting on signal 15===west:~# ipsec eroute0          192.0.1.0/24       -> 192.0.2.0/24       => %trap

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -