PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --label "\"mms\" leftrsasigkey" --keyid "@203.19.245.83" --pubkeyrsa "0sAQP...." \ || exit $? ipsec whack --label "\"mms\" rightrsasigkey" --keyid "@203.202.188.202" --pubkeyrsa "0sAQ..." \ || exit $? ipsec whack --name mms --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \ --host "203.19.245.83" --client "203.9.249.0/24" --nexthop "203.19.245.81" --updown "ipsec _updown" --id "@203.19.245.83" \ --to --host "203.202.188.202" --client "203.13.0.0/16" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202" \ --ipseclifetime "28800" --rekeymargin "540" \ --keyingtries "0" \ || exit $? PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --name singtel1 --encrypt --tunnel --ikelifetime "3600" --disablearrivalcheck --psk \ --host "165.21.42.232" --client "10.251.250.0/24" --nexthop "165.21.42.237" --updown "ipsec _updown" --id "165.21.42.232" \ --to --host "203.202.188.202" --client "10.59.6.0/24" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "203.202.188.202" \ --ipseclifetime "28800" --rekeymargin "540" \ --keyingtries "0" \ || exit $? PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --name amethon --encrypt --tunnel --pfs --disablearrivalcheck --psk \ --host "203.174.137.190" --client "192.168.5.0/24" --nexthop "%direct" --updown "ipsec _updown" --id "203.174.137.190" \ --to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" \ --ipseclifetime "28800" --rekeymargin "540" \ --keyingtries "0" \ || exit $? PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --label "\"elogic\" leftrsasigkey" --keyid "@203.134.166.148" --pubkeyrsa "0sAQ..." \ || exit $? ipsec whack --label "\"elogic\" rightrsasigkey" --keyid "@203.202.188.202" --pubkeyrsa "0sAQP...." \ || exit $? ipsec whack --name elogic --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \ --host "203.134.166.148" --client "192.168.2.0/24" --nexthop "203.134.166.129" --updown "ipsec _updown" --id "@203.134.166.148" \ --to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202" \ --ipseclifetime "28800" --rekeymargin "540" \ --keyingtries "0" \ || exit $? PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --label "\"mms1\" leftrsasigkey" --keyid "@203.19.245.83" --pubkeyrsa "0sAQP.." \ || exit $? ipsec whack --label "\"mms1\" rightrsasigkey" --keyid "@203.202.188.202" --pubkeyrsa "0sAQ..." \ || exit $? ipsec whack --name mms1 --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \ --host "203.19.245.83" --client "203.9.249.0/24" --nexthop "203.19.245.81" --updown "ipsec _updown" --id "@203.19.245.83" \ --to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202" \ --ipseclifetime "28800" --rekeymargin "540" \ --keyingtries "0" \ || exit $? PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --name singtel --encrypt --tunnel --ikelifetime "28800" --disablearrivalcheck --psk \ --host "165.21.42.232" --client "10.251.250.0/24" --nexthop "161.21.42.237" --updown "ipsec _updown" --id "165.21.42.232" \ --to --host "203.202.188.202" --client "10.59.4.0/24" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "203.202.188.202" \ --ipseclifetime "3600" --rekeymargin "540" \ --keyingtries "0" \ || exit $? PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --label "\"Sasme\" leftrsasigkey" --keyid "@ipsec.ninemsn.com.au" --pubkeyrsa "0sAQP..." \ || exit $? ipsec whack --label "\"Sasme\" rightrsasigkey" --keyid "@203.202.188.202" --pubkeyrsa "0sAQP..." \ || exit $? ipsec whack --name Sasme --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \ --host "%any" --client "192.168.3.0/24" --nexthop "%direct" --updown "ipsec _updown" --id "@ipsec.ninemsn.com.au" \ --to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202" \ --ipseclifetime "28800" --rekeymargin "540" \ --keyingtries "0" \ || exit $? PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --name lateral --encrypt --tunnel --ikelifetime "3600" --disablearrivalcheck --psk \ --host "202.36.231.222" --client "202.36.230.0/24" --nexthop "%direct" --updown "ipsec _updown" --id "202.36.231.222" \ --to --host "203.202.188.202" --client "10.59.0.0/16" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "203.202.188.202" \ --ipseclifetime "86400" --rekeymargin "540" \ --keyingtries "0" \ || exit $? PATH="/usr/local/sbin:/sbin:/usr/sbin:/usr/local/bin:/bin:/usr/bin" export PATH ipsec whack --label "\"wap\" leftrsasigkey" --keyid "@202.139.125.54" --pubkeyrsa "0sAQN..." \ || exit $? ipsec whack --label "\"wap\" rightrsasigkey" --keyid "@203.202.188.202" --pubkeyrsa "0sAQP...." \ || exit $? ipsec whack --name wap --encrypt --tunnel --pfs --disablearrivalcheck --rsasig \ --host "202.139.125.54" --client "192.168.0.0/24" --nexthop "202.139.125.49" --updown "ipsec _updown" --id "@202.139.125.54" \ --to --host "203.202.188.202" --client "10.59.4.16/30" --nexthop "203.202.188.201" --updown "ipsec _updown" --id "@203.202.188.202" \ --ipseclifetime "28800" --rekeymargin "540" \ --keyingtries "0" \ || exit $?