Strongswan ipsec tool: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
(Der Seiteninhalt wurde durch einen anderen Text ersetzt: „=start= *ipsec start =stop= *ipsec stop =restart= *ipsec restart =status= *ipsec status =status all= *ipsec statusall =down connect…“)
Markierung: Ersetzt
Zeile 1: Zeile 1:
=ipsec=
+
=start=
==start==
+
*ipsec start
ipsec start
+
=stop=
Starting strongSwan 5.1.2 IPsec [starter]...
+
*ipsec stop  
==stop==
+
=restart=
ipsec stop  
+
*ipsec restart
Stopping strongSwan IPsec...
+
=status=
==restart==
+
*ipsec status
ipsec restart
 
Stopping strongSwan IPsec...
 
Starting strongSwan 5.1.2 IPsec [starter]...
 
==status==
 
ipsec status
 
Security Associations (1 up, 0 connecting):
 
  franz-huey[1]: ESTABLISHED 25 seconds ago, 192.168.244.151[192.168.244.151]...192.168.242.249[192.168.242.249]
 
  franz-huey{1}:  INSTALLED, TUNNEL, ESP SPIs: c31e2d68_i 2b95ea12_o
 
  franz-huey{1}:  10.18.44.0/24 === 10.4.3.0/24
 
 
=status all=
 
=status all=
ipsec statusall
+
*ipsec statusall
Status of IKE charon daemon (strongSwan 5.1.2, Linux 3.13.0-24-generic, x86_64):
+
=down connection=
  uptime: 19 hours, since Oct 15 20:36:48 2014
+
*ipsec down franz-huey
  malloc: sbrk 2433024, mmap 0, used 389488, free 2043536
+
=up connection=
  worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 6
+
*ipsec up franz-huey
  loaded plugins: charon test-vectors aes rc2 sha1 sha2 md4 md5 random nonce x509 revocation constraints pkcs1 pkcs7 pkcs8 pkcs12 pem openssl xcbc cmac hmac ctr ccm gcm attr kernel-netlink resolve socket-default stroke updown eap-identity addrblock
 
Listening IP addresses:
 
  192.168.244.151
 
  10.18.44.1
 
Connections:
 
        net:  192.168.244.151...192.168.242.249  IKEv1
 
        net:  local:  [C=de, ST=rlp, L=zweibruecken, O=xinux, OU=edv, CN=huey.xinux.org, E=technik@xinux.de] uses public key authentication
 
        net:    cert:  "C=de, ST=rlp, L=zweibruecken, O=xinux, OU=edv, CN=huey.xinux.org, E=technik@xinux.de"
 
        net:  remote: [C=de, ST=rlp, L=zweibruecken, O=xinux, OU=edv, CN=franz.xinux.org, E=technik@xinux.de] uses public key authentication
 
        net:  child:  10.18.44.0/24 === 10.4.3.0/24 TUNNEL
 
Security Associations (1 up, 0 connecting):
 
        net[28]: ESTABLISHED 42 minutes ago, 192.168.244.151[C=de, ST=rlp, L=zweibruecken, O=xinux, OU=edv, CN=huey.xinux.org, E=technik@xinux.de]...192.168.242.249[C=de,  ST=rlp, L=zweibruecken, O=xinux, OU=edv, CN=franz.xinux.org, E=technik@xinux.de]
 
        net[28]: IKEv1 SPIs: 2bdce09d8f4f69cb_i 4a508d128f6b10d1_r*, public key reauthentication in 119 minutes
 
        net[28]: IKE proposal: AES_CBC_192/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536
 
        net{2}:  REKEYING, TUNNEL, expires in 13 minutes
 
        net{2}:  10.18.44.0/24 === 10.4.3.0/24
 
        net{2}:  INSTALLED, TUNNEL, ESP SPIs: cc9ee3b8_i 078fd1d4_o
 
        net{2}:  AES_CBC_192/HMAC_MD5_96, 0 bytes_i, 0 bytes_o, rekeying in 44 minutes
 
        net{2}:  10.18.44.0/24 === 10.4.3.0/24
 
==down connection==
 
ipsec down franz-huey
 
closing CHILD_SA franz-huey{1} with SPIs c31e2d68_i (0 bytes) 2b95ea12_o (0 bytes) and TS 10.18.44.0/24 === 10.4.3.0/24
 
sending DELETE for ESP CHILD_SA with SPI c31e2d68
 
generating INFORMATIONAL_V1 request 1665106720 [ HASH D ]
 
  sending packet: from 192.168.244.151[500] to 192.168.242.249[500] (76 bytes)
 
deleting IKE_SA franz-huey[1] between 192.168.244.151[192.168.244.151]...192.168.242.249[192.168.242.249]
 
sending DELETE for IKE_SA franz-huey[1]
 
generating INFORMATIONAL_V1 request 3546724926 [ HASH D ]
 
sending packet: from 192.168.244.151[500] to 192.168.242.249[500] (92 bytes)
 
IKE_SA [1] closed successfully
 
 
 
==up connection==
 
ipsec up franz-huey
 
<pre>
 
initiating IKE_SA franz-huey[3] to 192.168.242.249
 
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
 
sending packet: from 192.168.244.151[500] to 192.168.242.249[500] (1036 bytes)
 
received packet: from 192.168.242.249[500] to 192.168.244.151[500] (248 bytes)
 
parsed IKE_SA_INIT response 0 [ SA KE No V ]
 
received unknown vendor ID: 4f:45:76:79:5c:6b:67:7a:57:71:5c:73
 
authentication of '192.168.244.151' (myself) with pre-shared key
 
establishing CHILD_SA franz-huey
 
generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(EAP_ONLY) ]
 
sending packet: from 192.168.244.151[500] to 192.168.242.249[500] (348 bytes)
 
received packet: from 192.168.242.249[500] to 192.168.244.151[500] (204 bytes)
 
parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr ]
 
authentication of '192.168.242.249' with pre-shared key successful
 
IKE_SA franz-huey[3] established between 192.168.244.151[192.168.244.151]...192.168.242.249[192.168.242.249]
 
scheduling reauthentication in 9905s
 
maximum IKE_SA lifetime 10445s
 
CHILD_SA franz-huey{4} established with SPIs cefb8ece_i 14440f5e_o and TS 10.18.44.0/24 === 10.4.3.0/24
 
connection 'franz-huey' established successfully
 
<pre>
 

Version vom 26. Juli 2021, 10:55 Uhr

start

  • ipsec start

stop

  • ipsec stop

restart

  • ipsec restart

status

  • ipsec status

status all

  • ipsec statusall

down connection

  • ipsec down franz-huey

up connection

  • ipsec up franz-huey