west:~# ipsec setup start ipsec_setup: Starting Libreswan IPsec VERSION west:~# /testing/pluto/bin/wait-until-policy-loaded west:~# ipsec whack --label "\"west-east\" leftrsasigkey" --keyid "@west" --pubkeyrsa "0sAQNzGEFs18VKT00sA+4p+GUKn9C55PYuPQca6C+9Qhj0jfMdQnTRTDLeI+lp9TnidHH7fVpq+PkfiF2LHlZtDwMurLlwzbNOghlEYKfQ080WlOTTUAmOLhAzH28MF70q3hzq0m5fCaVZWtxcV+LfHWdxceCkjBUSaTFtR2W12urFCBz+SB3+OM33aeIbfHxmck2yzhJ8xyMods5kF3ek/RZlFvgN8VqBdcFVrZwTh0mXDCGN12HNFixL6FzQ1jQKerKBbjb0m/IPqugvpVPWVIUajUpLMEmi1FAXc1mFZE9x1SFuSr0NzYIu2ZaHfvsAZY5oN+I+R2oC67fUCjgxY+t7" west:~# ipsec whack --label "\"west-east\" rightrsasigkey" --keyid "@east" --pubkeyrsa "0sAQN3cn11FrBVbZhWGwRnFDAf8O9FHBmBIyIvmvt0kfkI2UGDDq8k+vYgRkwBZDviLd1p3SkL30LzuV0rqG3vBriqaAUUGoCQ0UMgsuX+k01bROLsqGB1QNXYvYiPLsnoDhKd2Gx9MUMHEjwwEZeyskMT5k91jvoAZvdEkg+9h7urbJ+kRQ4e+IHkMUrreDGwGVptV/hYQVCD54RZep6xp5ymaKRCDgMpzWvlzO80fP7JDjSZf9LI/MMu6c+qwXIKnWoNha75IhFyLWniVczxK2RdhmMhLsi0kC0CoOwWDSIEOb+5zbECDjjud+SF5tT8qRCWnSomX8jtbCdZ50WraQlL" west:~# ipsec whack --name west-east --encrypt --tunnel --pfs --authenticate --rsasig --host "192.1.2.45" --nexthop "192.1.2.23" --updown "ipsec _updown" --id "@west" --to --host "192.1.2.23" --nexthop "192.1.2.45" --updown "ipsec _updown" --id "@east" --ipseclifetime "28800" --keyingtries "3" 002 added connection description "west-east" west:~# echo end westinit.sh end westinit.sh west:~# ping -q -c 8 -n 192.1.2.23 PING 192.1.2.23 (192.1.2.23): 56 data bytes --- 192.1.2.23 ping statistics --- 8 packets transmitted, 8 packets received, 0% packet loss round-trip min/avg/max = 3.1/4.5/9.26 ms west:~# ipsec auto --up west-east 104 "west-east" #1: STATE_MAIN_I1: initiate 003 "west-east" #1: received Vendor ID payload [Libreswan 003 "west-east" #1: received Vendor ID payload [Dead Peer Detection] 106 "west-east" #1: STATE_MAIN_I2: sent MI2, expecting MR2 108 "west-east" #1: STATE_MAIN_I3: sent MI3, expecting MR3 004 "west-east" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} 117 "west-east" #2: STATE_QUICK_I1: initiate 004 "west-east" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode west:~# ping -c 8 -n 192.1.2.23 PING 192.1.2.23 (192.1.2.23): 56 data bytes 64 bytes from 192.1.2.23: icmp_seq=0 ttl=257 time=999 ms 64 bytes from 192.1.2.23: icmp_seq=1 ttl=257 time=999 ms 64 bytes from 192.1.2.23: icmp_seq=2 ttl=257 time=999 ms 64 bytes from 192.1.2.23: icmp_seq=3 ttl=257 time=999 ms 64 bytes from 192.1.2.23: icmp_seq=4 ttl=257 time=999 ms 64 bytes from 192.1.2.23: icmp_seq=5 ttl=257 time=999 ms 64 bytes from 192.1.2.23: icmp_seq=6 ttl=257 time=999 ms 64 bytes from 192.1.2.23: icmp_seq=7 ttl=257 time=999 ms --- 192.1.2.23 ping statistics --- 8 packets transmitted, 8 packets received, 0% packet loss round-trip min/avg/max = 3.1/4.5/9.26 ms west:~# echo done done west:~# echo end westrun.sh end westrun.sh west:~# west:~# echo end westfinal.sh end westfinal.sh