#!/bin/sh kroot@swantest:/home/build/libreswan/testing/pluto/nat-pluto-03\[root@nic nat-pluto-03]# # Display the table, so we know it is correct. kroot@swantest:/home/build/libreswan/testing/pluto/nat-pluto-03\[root@nic nat-pluto-03]# iptables -t nat -L Chain PREROUTING (policy ACCEPT) target prot opt source destination Chain INPUT (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination kroot@swantest:/home/build/libreswan/testing/pluto/nat-pluto-03\[root@nic nat-pluto-03]# echo "initdone" initdone kroot@swantest:/home/build/libreswan/testing/pluto/nat-pluto-03\[root@nic nat-pluto-03]# : ==== end ==== kroot@swantest:/home/build/libreswan/testing/pluto/nat-pluto-03\[root@nic nat-pluto-03]# # this should show encap tunnel on both ends kroot@swantest:/home/build/libreswan/testing/pluto/nat-pluto-03\[root@nic nat-pluto-03]# ip xfrm state |grep encap kroot@swantest:/home/build/libreswan/testing/pluto/nat-pluto-03\[root@nic nat-pluto-03 1]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'ip xfrm state |grep encap' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<