iptables -t nat -F kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -F kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# # NAT kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -t nat -A POSTROUTING --source 192.1.3.0/24 --destination 0.0.0.0/0 -j SNAT --to-source 192.1.2.254 kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# # make sure that we never acidentially let ESP through. kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -N LOGDROP kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -A LOGDROP -j LOG kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -A LOGDROP -j DROP kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# # kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -I FORWARD 1 --proto 50 -j LOGDROP kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -I FORWARD 2 --destination 192.0.2.0/24 -j LOGDROP kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -I FORWARD 3 --source 192.0.2.0/24 -j LOGDROP kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# # route kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -I INPUT 1 --destination 192.0.2.0/24 -j LOGDROP kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# # Display the table, so we know it is correct. kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -t nat -L -n Chain PREROUTING (policy ACCEPT) target prot opt source destination Chain INPUT (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination SNAT all -- 192.1.3.0/24 0.0.0.0/0 to:192.1.2.254 kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# iptables -L -n Chain INPUT (policy ACCEPT) target prot opt source destination LOGDROP all -- 0.0.0.0/0 192.0.2.0/24 Chain FORWARD (policy ACCEPT) target prot opt source destination LOGDROP esp -- 0.0.0.0/0 0.0.0.0/0 LOGDROP all -- 0.0.0.0/0 192.0.2.0/24 LOGDROP all -- 192.0.2.0/24 0.0.0.0/0 Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain LOGDROP (4 references) target prot opt source destination LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 DROP all -- 0.0.0.0/0 0.0.0.0/0 kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# echo initdone initdone kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# : ==== end ==== kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# ../../pluto/bin/ipsec-look.sh kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# : ==== cut ==== kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15]# ipsec auto --status whack: Pluto is not running (no "/run/pluto/pluto.ctl") kroot@swantest:/home/build/libreswan/testing/pluto/xauth-pluto-15\[root@nic xauth-pluto-15 33]# >>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 33 final.sh 'ipsec auto --status' <<<<<<<<<>>>>>>>>>cutnonzeroexit>>>>>>>>>> exit status 1 final.sh 'if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi' <<<<<<<<<