# strongswan statusall Status of IKE charon daemon (strongSwan 5.5.1, Linux 3.18.54, x86_64): uptime: 13 minutes, since Oct 21 13:08:50 2018 malloc: sbrk 2568192, mmap 0, used 598336, free 1969856 worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 2 loaded plugins: charon aes des rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp xcbc cmac hmac ctr ccm curl attr kernel-netlink resolve socket-default farp stroke vici updown eap-identity eap-md5 eap-gtc eap-mschapv2 eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp duplicheck Virtual IP pools (size/online/offline): 10.0.0.1-10.0.40.255: 10495/1/0 Listening IP addresses: 192.168.142.176 192.168.229.24 192.168.229.14 192.168.229.15 Connections: dev: %any...%any IKEv2 dev: local: [xxx] uses public key authentication dev: cert: "XXX" dev: remote: uses public key authentication dev: child: 0.0.0.0/0 === dynamic TUNNEL Security Associations (1 up, 0 connecting): dev[2]: ESTABLISHED 13 minutes ago, 192.168.142.176[xxx]...10.194.60.10[abc] dev[2]: IKEv2 SPIs: 2c62a18bb622adf0_i a64425bc939b0d2b_r*, public key reauthentication in 2 hours dev[2]: IKE proposal: AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_3072 dev{1}: INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: c641595e_i 2347073b_o dev{1}: AES_CBC_128/HMAC_SHA2_256_128, 19426 bytes_i (86 pkts, 803s ago), 25377 bytes_o (67 pkts, 688s ago), rekeying in 32 minutes dev{1}: 0.0.0.0/0 === 10.0.0.1/32