<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div style="font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0); background-color: rgba(0, 0, 0, 0);">
Hi Andreas,<br>
<br>
Thanks for the help. Please see the command result.<br>
<br>
<div># ip route list table 220</div>
<div>10.2.1.0/24 via 10.168.60.226 dev usb0 proto static src 192.168.199.100<br>
</div>
<br>
Cheers<br>
<br>
George<br>
</div>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>From:</b> Andreas Steffen <andreas.steffen@strongswan.org><br>
<b>Sent:</b> Tuesday, 13 March 2018 7:36 PM<br>
<b>To:</b> Shuchen He; users@lists.strongswan.org<br>
<b>Subject:</b> Re: [strongSwan] Strongswan IPSec VPN is up but does not pass traffic</font>
<div> </div>
</div>
<div class="BodyFragment"><font size="2"><span style="font-size:11pt;">
<div class="PlainText">Hi,<br>
<br>
I don't see the virtual IP address 10.2.1.211/32 installed on your<br>
physical USB interface with IP address 10.39.63.211. Does the command<br>
<br>
ip route list table 220<br>
<br>
show any source route entries?<br>
<br>
Regards<br>
<br>
Andreas<br>
<br>
On 12.03.2018 11:45, Shuchen He wrote:<br>
> Hi,<br>
> <br>
> I have setup a VPN between ASA and strongswan using IKE1. The strongswan<br>
> work as remote VPN using PSK XAuth.<br>
> <br>
> The VPN tunnel is up but I can not ping the remote site. Below is the<br>
> configuration and some output.<br>
> <br>
> My observation at the moment is that the Linux kernel has setup<br>
> everything but the TS traffic just does not leave the Linux box. When I<br>
> ping remote site, I can see "ip xfrm state" actually shows a flow for my<br>
> traffic... but the flow is somehow dropped by either the kernel or<br>
> strongswan.<br>
> <br>
> Can you please let me know what else I should do to further<br>
> troubleshoot the issue?<br>
> <br>
> *Configuration<br>
> *<br>
> connections {<br>
> home {<br>
> aggressive = yes<br>
> dpd_delay = 30<br>
> dpd_timeout = 90<br>
> version = 1<br>
> remote_addrs = 126.2.1.4<br>
> # uncomment if the responder only supports crappy crypto. But<br>
> seriously,<br>
> # every single one of those algorithms is broken. Better spend<br>
> some $$$<br>
> # on a better solution.<br>
> proposals = aes256-sha1-modp1024<br>
> vips = 0.0.0.0,::<br>
> local-1 {<br>
> auth = psk<br>
> id = acompanyTest<br>
> }<br>
> local-2 {<br>
> auth = xauth-generic<br>
> xauth_id = acompanyTest<br>
> }<br>
> remote-1 {<br>
> auth = psk<br>
> # You might have to set this to the correct value, if the<br>
> responder isn't configure correctly.<br>
> #id = 126.2.1.4<br>
> }<br>
> children {<br>
> home {<br>
> remote_ts = 10.2.1.0/24<br>
> #local_ts=192.168.199.0/24,0.0.0.0<br>
> # uncomment if the responder only supports crappy<br>
> crypto. But seriously,<br>
> # every single one of those algorithms is broken. Better<br>
> spend some $$$<br>
> # on a better solution.<br>
> # esp_proposals = 3des-md5!<br>
> # Use this, if you want PFS with DH group 2.<br>
> # esp_proposals = 3des-md5-modp1024!<br>
> esp_proposals = aes128-sha1-modp768<br>
> }<br>
> }<br>
> }<br>
> }<br>
> secrets {<br>
> ike-home {<br>
> id = 126.2.1.4<br>
> secret = "acompany123"<br>
> }<br>
> eap-home {<br>
> id = acompanyTest<br>
> secret = "acompany123"<br>
> }<br>
> }<br>
> <br>
> # ipsec statusall<br>
> Status of IKE charon daemon (strongSwan 5.6.2, Linux<br>
> 3.0.35-2666-gbdde708-g889281e-dirty, armv7l):<br>
> uptime: 18 minutes, since Mar 12 18:15:45 2018<br>
> malloc: sbrk 253952, mmap 0, used 158560, free 95392<br>
> worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0,<br>
> scheduled: 6<br>
> loaded plugins: charon aes des rc2 sha2 sha1 md5 mgf1 random nonce<br>
> x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey<br>
> sshkey pem fips-prf gmp curve25519 xcbc cmac hmac attr kernel-netlink<br>
> resolve socket-default stroke vici updown xauth-generic counters<br>
> Listening IP addresses:<br>
> 192.168.199.100<br>
> 192.168.199.254<br>
> 192.168.199.141<br>
> 192.168.126.1<br>
> 10.39.63.211<br>
> Connections:<br>
> site: %any...126.2.1.4 IKEv1<br>
> site: local: [mylocalsite] uses pre-shared key authentication<br>
> site: remote: uses pre-shared key authentication<br>
> site: child: 192.168.199.0/24 === 10.2.1.0/24 TUNNEL<br>
> home: %any...126.2.1.4 IKEv1 Aggressive, dpddelay=30s<br>
> home: local: [acompanyTest] uses pre-shared key authentication<br>
> home: local: uses XAuth authentication: generic with XAuth<br>
> identity 'acompanyTest'<br>
> home: remote: uses pre-shared key authentication<br>
> home: child: dynamic === 10.2.1.0/24 TUNNEL, dpdaction=clear<br>
> Routed Connections:<br>
> site{1}: ROUTED, TUNNEL, reqid 1<br>
> site{1}: 192.168.199.0/24 === 10.2.1.0/24<br>
> Security Associations (1 up, 0 connecting):<br>
> home[1]: ESTABLISHED 17 minutes ago,<br>
> 10.39.63.211[acompanyTest]...126.2.1.4[126.2.1.4]<br>
> home[1]: IKEv1 SPIs: 504550d01ee905e2_i* 2311e0ae0c6c454f_r,<br>
> rekeying in 3 hours<br>
> home[1]: IKE proposal:<br>
> AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024<br>
> home{2}: INSTALLED, TUNNEL, reqid 2, ESP in UDP SPIs:<br>
> cc621d5e_i 3545bd6a_o<br>
> home{2}: AES_CBC_128/HMAC_SHA1_96/MODP_768, 0 bytes_i, 0<br>
> bytes_o, rekeying in 40 minutes<br>
> home{2}: 10.2.1.211/32 === 10.2.1.0/24<br>
> root@wheezy-armel:~ 18:33:49<br>
> # ifconfig<br>
> eth0 Link encap:Ethernet HWaddr 50:ff:99:30:13:10 <br>
> inet addr:192.168.199.100 Bcast:192.168.199.255 <br>
> Mask:255.255.255.0<br>
> inet6 addr: fe80::52ff:99ff:fe30:1310/64 Scope:Link<br>
> UP BROADCAST RUNNING PROMISC MULTICAST MTU:1500 Metric:1<br>
> RX packets:3585 errors:0 dropped:0 overruns:0 frame:0<br>
> TX packets:1318 errors:0 dropped:0 overruns:0 carrier:0<br>
> collisions:0 txqueuelen:1000<br>
> RX bytes:422967 (413.0 KiB) TX bytes:177070 (172.9 KiB)<br>
> eth1 Link encap:Ethernet HWaddr 50:ff:99:30:13:11 <br>
> inet addr:192.168.199.141 Bcast:192.168.199.255 <br>
> Mask:255.255.255.0<br>
> inet6 addr: fe80::52ff:99ff:fe30:1311/64 Scope:Link<br>
> UP BROADCAST MULTICAST MTU:1500 Metric:1<br>
> RX packets:11288 errors:0 dropped:0 overruns:0 frame:0<br>
> TX packets:25 errors:0 dropped:0 overruns:0 carrier:0<br>
> collisions:0 txqueuelen:1000<br>
> RX bytes:2799722 (2.6 MiB) TX bytes:3078 (3.0 KiB)<br>
> Interrupt:155 Base address:0x8000<br>
> lo Link encap:Local Loopback <br>
> inet addr:127.0.0.1 Mask:255.0.0.0<br>
> inet6 addr: ::1/128 Scope:Host<br>
> UP LOOPBACK RUNNING MTU:16436 Metric:1<br>
> RX packets:1334 errors:0 dropped:0 overruns:0 frame:0<br>
> TX packets:1334 errors:0 dropped:0 overruns:0 carrier:0<br>
> collisions:0 txqueuelen:0<br>
> RX bytes:465386 (454.4 KiB) TX bytes:465386 (454.4 KiB)<br>
> usb0 Link encap:Ethernet HWaddr 02:1e:10:1f:00:00 <br>
> inet addr:10.39.63.211 Bcast:10.39.63.215 Mask:255.255.255.248<br>
> inet6 addr: fe80::1e:10ff:fe1f:0/64 Scope:Link<br>
> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1<br>
> RX packets:1049 errors:0 dropped:0 overruns:0 frame:0<br>
> TX packets:973 errors:0 dropped:0 overruns:0 carrier:0<br>
> collisions:0 txqueuelen:1000<br>
> RX bytes:67244 (65.6 KiB) TX bytes:153707 (150.1 KiB)<br>
> wlan0 Link encap:Ethernet HWaddr 08:ea:40:72:28:b7 <br>
> inet addr:192.168.126.1 Bcast:192.168.126.255 Mask:255.255.255.0<br>
> inet6 addr: fe80::aea:40ff:fe72:28b7/64 Scope:Link<br>
> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1<br>
> RX packets:3229 errors:0 dropped:0 overruns:0 frame:0<br>
> TX packets:1 errors:0 dropped:0 overruns:0 carrier:0<br>
> collisions:0 txqueuelen:1000<br>
> RX bytes:0 (0.0 B) TX bytes:112 (112.0 B)<br>
> <br>
> # route -n<br>
> Kernel IP routing table<br>
> Destination Gateway Genmask Flags Metric Ref Use<br>
> Iface<br>
> 0.0.0.0 10.39.63.209 0.0.0.0 UG 0 0 0 usb0<br>
> 10.39.63.208 0.0.0.0 255.255.255.248 U 0 0 0 usb0<br>
> 192.168.126.0 0.0.0.0 255.255.255.0 U 0 0 0<br>
> wlan0<br>
> 192.168.199.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0<br>
> 192.168.199.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1<br>
> <br>
> # ip route show table 220<br>
> 10.2.1.0/24 via 10.39.63.209 dev usb0 proto static src 192.168.199.100<br>
> <br>
> # ip -s xfrm state<br>
> src 10.39.63.211 dst 126.2.1.4<br>
> proto esp spi 0x3545bd6a(893762922) reqid 2(0x00000002) mode tunnel<br>
> replay-window 0 seq 0x00000000 flag af-unspec (0x00100000)<br>
> auth-trunc hmac(sha1) 0xaeb85f4b30fec0ccc1240cf9f6204a74e1785df5<br>
> (160 bits) 96<br>
> enc cbc(aes) 0xa0711780a30caaad143960ede951ef46 (128 bits)<br>
> encap type espinudp sport 4500 dport 4500 addr 0.0.0.0<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 3501(sec), hard 3960(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:52 use -<br>
> stats:<br>
> replay-window 0 replay 0 failed 0<br>
> src 126.2.1.4 dst 10.39.63.211<br>
> proto esp spi 0xcc621d5e(3428982110) reqid 2(0x00000002) mode tunnel<br>
> replay-window 32 seq 0x00000000 flag af-unspec (0x00100000)<br>
> auth-trunc hmac(sha1) 0xbe6d3dc8b3c032f0059ece1a0234cbd87858d25e<br>
> (160 bits) 96<br>
> enc cbc(aes) 0x7d99b233194ab31328cec11ea2ce7aa1 (128 bits)<br>
> encap type espinudp sport 4500 dport 4500 addr 0.0.0.0<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 3596(sec), hard 3960(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:52 use -<br>
> stats:<br>
> replay-window 0 replay 0 failed 0<br>
> root@wheezy-armel:~ 18:34:25<br>
> # ping -i 192.168.199.100 10.2.1.60<br>
> PING 10.2.1.60 (10.2.1.60) 56(84) bytes of data.<br>
> ^C<br>
> --- 10.2.1.60 ping statistics ---<br>
> 1 packets transmitted, 0 received, 100% packet loss, time 0ms<br>
> <br>
> # ip -s xfrm state<br>
> src 10.39.63.211 dst 126.2.1.4<br>
> proto esp spi 0x00000000(0) reqid 1(0x00000001) mode tunnel<br>
> replay-window 0 seq 0x00000003 flag (0x00000000)<br>
> sel src 192.168.199.100/32 dst 10.2.1.60/32 proto udp sport 48645<br>
> dport 1025 uid 0<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 0(sec), hard 165(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:34:35 use -<br>
> stats:<br>
> replay-window 0 replay 0 failed 0<br>
> src 10.39.63.211 dst 126.2.1.4<br>
> proto esp spi 0x3545bd6a(893762922) reqid 2(0x00000002) mode tunnel<br>
> replay-window 0 seq 0x00000000 flag af-unspec (0x00100000)<br>
> auth-trunc hmac(sha1) 0xaeb85f4b30fec0ccc1240cf9f6204a74e1785df5<br>
> (160 bits) 96<br>
> enc cbc(aes) 0xa0711780a30caaad143960ede951ef46 (128 bits)<br>
> encap type espinudp sport 4500 dport 4500 addr 0.0.0.0<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 3501(sec), hard 3960(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:52 use -<br>
> stats:<br>
> replay-window 0 replay 0 failed 0<br>
> src 126.2.1.4 dst 10.39.63.211<br>
> proto esp spi 0xcc621d5e(3428982110) reqid 2(0x00000002) mode tunnel<br>
> replay-window 32 seq 0x00000000 flag af-unspec (0x00100000)<br>
> auth-trunc hmac(sha1) 0xbe6d3dc8b3c032f0059ece1a0234cbd87858d25e<br>
> (160 bits) 96<br>
> enc cbc(aes) 0x7d99b233194ab31328cec11ea2ce7aa1 (128 bits)<br>
> encap type espinudp sport 4500 dport 4500 addr 0.0.0.0<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 3596(sec), hard 3960(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:52 use -<br>
> stats:<br>
> replay-window 0 replay 0 failed 0<br>
> root@wheezy-armel:~ 18:34:37<br>
> # ip -s xfrm policy<br>
> src 10.2.1.211/32 dst 10.2.1.0/24 uid 0<br>
> dir out action allow index 105 priority 371327 share any flag <br>
> (0x00000000)<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:52 use -<br>
> tmpl src 10.39.63.211 dst 126.2.1.4<br>
> proto esp spi 0x3545bd6a(893762922) reqid 2(0x00000002) mode tunnel<br>
> level required share any<br>
> enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff<br>
> src 10.2.1.0/24 dst 10.2.1.211/32 uid 0<br>
> dir fwd action allow index 98 priority 371327 share any flag <br>
> (0x00000000)<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:52 use -<br>
> tmpl src 126.2.1.4 dst 10.39.63.211<br>
> proto esp spi 0x00000000(0) reqid 2(0x00000002) mode tunnel<br>
> level required share any<br>
> enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff<br>
> src 10.2.1.0/24 dst 10.2.1.211/32 uid 0<br>
> dir in action allow index 88 priority 371327 share any flag <br>
> (0x00000000)<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:52 use -<br>
> tmpl src 126.2.1.4 dst 10.39.63.211<br>
> proto esp spi 0x00000000(0) reqid 2(0x00000002) mode tunnel<br>
> level required share any<br>
> enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff<br>
> src 192.168.199.0/24 dst 10.2.1.0/24 uid 0<br>
> dir out action allow index 81 priority 375424 share any flag <br>
> (0x00000000)<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:48 use -<br>
> tmpl src 10.39.63.211 dst 126.2.1.4<br>
> proto esp spi 0x00000000(0) reqid 1(0x00000001) mode tunnel<br>
> level required share any<br>
> enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff<br>
> src 10.2.1.0/24 dst 192.168.199.0/24 uid 0<br>
> dir fwd action allow index 74 priority 375424 share any flag <br>
> (0x00000000)<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:48 use -<br>
> tmpl src 126.2.1.4 dst 10.39.63.211<br>
> proto esp spi 0x00000000(0) reqid 1(0x00000001) mode tunnel<br>
> level required share any<br>
> enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff<br>
> src 10.2.1.0/24 dst 192.168.199.0/24 uid 0<br>
> dir in action allow index 64 priority 375424 share any flag <br>
> (0x00000000)<br>
> lifetime config:<br>
> limit: soft (INF)(bytes), hard (INF)(bytes)<br>
> limit: soft (INF)(packets), hard (INF)(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:48 use -<br>
> tmpl src 126.2.1.4 dst 10.39.63.211<br>
> proto esp spi 0x00000000(0) reqid 1(0x00000001) mode tunnel<br>
> level required share any<br>
> enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff<br>
> src 0.0.0.0/0 dst 0.0.0.0/0 uid 0<br>
> socket in action allow index 59 priority 0 share any flag (0x00000000)<br>
> lifetime config:<br>
> limit: soft 0(bytes), hard 0(bytes)<br>
> limit: soft 0(packets), hard 0(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:44 use 2018-03-12 18:34:33<br>
> src 0.0.0.0/0 dst 0.0.0.0/0 uid 0<br>
> socket out action allow index 52 priority 0 share any flag (0x00000000)<br>
> lifetime config:<br>
> limit: soft 0(bytes), hard 0(bytes)<br>
> limit: soft 0(packets), hard 0(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:44 use 2018-03-12 18:34:28<br>
> src 0.0.0.0/0 dst 0.0.0.0/0 uid 0<br>
> socket in action allow index 43 priority 0 share any flag (0x00000000)<br>
> lifetime config:<br>
> limit: soft 0(bytes), hard 0(bytes)<br>
> limit: soft 0(packets), hard 0(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:44 use 2018-03-12 18:34:39<br>
> src 0.0.0.0/0 dst 0.0.0.0/0 uid 0<br>
> socket out action allow index 36 priority 0 share any flag (0x00000000)<br>
> lifetime config:<br>
> limit: soft 0(bytes), hard 0(bytes)<br>
> limit: soft 0(packets), hard 0(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:44 use 2018-03-12 18:34:39<br>
> src ::/0 dst ::/0 uid 0<br>
> socket in action allow index 27 priority 0 share any flag (0x00000000)<br>
> lifetime config:<br>
> limit: soft 0(bytes), hard 0(bytes)<br>
> limit: soft 0(packets), hard 0(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:44 use -<br>
> src ::/0 dst ::/0 uid 0<br>
> socket out action allow index 20 priority 0 share any flag (0x00000000)<br>
> lifetime config:<br>
> limit: soft 0(bytes), hard 0(bytes)<br>
> limit: soft 0(packets), hard 0(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:44 use -<br>
> src ::/0 dst ::/0 uid 0<br>
> socket in action allow index 11 priority 0 share any flag (0x00000000)<br>
> lifetime config:<br>
> limit: soft 0(bytes), hard 0(bytes)<br>
> limit: soft 0(packets), hard 0(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:44 use -<br>
> src ::/0 dst ::/0 uid 0<br>
> socket out action allow index 4 priority 0 share any flag (0x00000000)<br>
> lifetime config:<br>
> limit: soft 0(bytes), hard 0(bytes)<br>
> limit: soft 0(packets), hard 0(packets)<br>
> expire add: soft 0(sec), hard 0(sec)<br>
> expire use: soft 0(sec), hard 0(sec)<br>
> lifetime current:<br>
> 0(bytes), 0(packets)<br>
> add 2018-03-12 18:15:44 use -<br>
> <br>
> <br>
> Thanks<br>
> <br>
> George<br>
<br>
-- <br>
======================================================================<br>
Andreas Steffen andreas.steffen@strongswan.org<br>
strongSwan - the Open Source VPN Solution! <a href="http://www.strongswan.org">
www.strongswan.org</a><br>
Institute for Networked Solutions<br>
HSR University of Applied Sciences Rapperswil<br>
CH-8640 Rapperswil (Switzerland)<br>
===========================================================[INS-HSR]==<br>
<br>
</div>
</span></font></div>
</body>
</html>