[strongSwan] Monitoring stronswan
Thomas Will
thomas.will at xinux.de
Sun Dec 17 21:04:06 CET 2017
Hi,
it's quit quick and dirty but it works :-)
#!/bin/bash
cat<<HERE | xxd -r -p | nc -w 1 -u -p 500 $1 500 > /tmp/$1.stat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if test -s /tmp/$1.stat
then
echo $1 ike open
else
echo $1 ike closed
fi
Am 14/12/17 um 11:29 schrieb Michael Schwartzkopff:
> Hi,
>
>
> What is the best way to do a fault monitoring of a strongswan server? In
> the first place, my monitoring service should check if the server is
> able to offer the VPN service, which means i.e. that UDP/500 will send a
> correct answer if checked from the outside.
>
>
> Any ideas?
>
>
> Mit freundlichen Grüßen,
>
--
Thomas Will
Xinux e.K.
Wichernstrasse 18
66482 Zweibruecken
Registergericht
Amtsgericht Zweibruecken
HRA 1518
P: +49 6332 44040
F: +49 6332 899227
M: +49 170 5218548
M: +49 176 97497102
E: thomas.will at xinux.de
W: http://www.xinux.de
More information about the Users
mailing list