--- east.console.txt 2019-09-20 17:49:12.415187196 +0000 +++ OUTPUT/east.console.txt 2019-09-21 07:29:29.632159553 +0000 @@ -15,43 +15,17 @@ initdone east # grep -e 'parse IKEv2 Certificate' -e 'emit IKEv2 Certificate' -e 'ikev2 cert encoding' /tmp/pluto.log -| ***emit IKEv2 Certificate Request Payload: -| ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) -| **parse IKEv2 Certificate Payload: -| ikev2 cert encoding: CERT_PKCS7_WRAPPED_X509 (0x1) -| ****emit IKEv2 Certificate Payload: -| ikev2 cert encoding: CERT_PKCS7_WRAPPED_X509 (0x1) east # ../../pluto/bin/ipsec-look.sh east NOW XFRM state: -src 192.1.2.45 dst 192.1.2.23 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 -src 192.1.2.23 dst 192.1.2.45 - proto esp spi 0xSPISPI reqid REQID mode tunnel - replay-window 32 flag af-unspec - aead rfc4106(gcm(aes)) 0xENCAUTHKEY 128 XFRM policy: -src 192.0.1.0/24 dst 192.0.2.0/24 - dir fwd priority 1042407 ptype main - tmpl src 192.1.2.45 dst 192.1.2.23 - proto esp reqid REQID mode tunnel -src 192.0.1.0/24 dst 192.0.2.0/24 - dir in priority 1042407 ptype main - tmpl src 192.1.2.45 dst 192.1.2.23 - proto esp reqid REQID mode tunnel -src 192.0.2.0/24 dst 192.0.1.0/24 - dir out priority 1042407 ptype main - tmpl src 192.1.2.23 dst 192.1.2.45 - proto esp reqid REQID mode tunnel XFRM done IPSEC mangle TABLES NEW_IPSEC_CONN mangle TABLES ROUTING TABLES default via 192.1.2.254 dev eth1 -192.0.1.0/24 dev eth1 scope link src 192.0.2.254 +192.0.1.0/24 via 192.1.2.45 dev eth1 192.0.2.0/24 dev eth0 proto kernel scope link src 192.0.2.254 192.1.2.0/24 dev eth1 proto kernel scope link src 192.1.2.23 NSS_CERTIFICATES