#!/bin/sh kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-nat-pluto-03\[root@nic ikev2-nat-pluto-03]# # Display the table, so we know it is correct. kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-nat-pluto-03\[root@nic ikev2-nat-pluto-03]# iptables -t nat -L Chain PREROUTING (policy ACCEPT) target prot opt source destination Chain INPUT (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-nat-pluto-03\[root@nic ikev2-nat-pluto-03]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-nat-pluto-03\[root@nic ikev2-nat-pluto-03]# : ==== end ==== kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-nat-pluto-03\[root@nic ikev2-nat-pluto-03]# # this should show encap tunnel on both ends kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-nat-pluto-03\[root@nic ikev2-nat-pluto-03]# ip xfrm state |grep encap kroot@swantest:/home/build/libreswan/testing/pluto/ikev2-nat-pluto-03\[root@nic ikev2-nat-pluto-03 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'ip xfrm state |grep encap' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<