Hi,

I have tried the IKEV2 config-payload example as  
http://www.strongswan.org/uml/testresults43/ikev2/config-payload/ successfully.

I want to get the inner virtual IP address that are assigned by config-payload 
for later use in my application by SHELL command or TCL. Is there an easy way 
to get it? Currently I can only see it by "ipsec status home" and check the 
last line. This is easy for manual, but not easy for code to get it accurate. 
So I want to ask if there is an easy and accurate way to get it?

[r...@localhost etc]# ipsec statusall home
Status of IKEv2 charon daemon (strongSwan 4.3.4):
  uptime: 28 minutes, since Aug 28 14:57:39 2009
  worker threads: 9 idle of 16, job queue load: 0, scheduled events: 3
  loaded plugins: aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke 
kernel-netlink updown resolv-conf
Listening IP addresses:
  135.252.131.87
Connections:
        home:  135.252.131.87...135.252.130.87
        home:   local:  [moon.strongswan.org] uses public key authentication
        home:    cert:  "C=CN, ST=Shandong, O=ALU, OU=RD, 
CN=moon.strongswan.org, e=m...@alcatel-lucent.com"
        home:   remote: [sun.strongswan.org] uses any authentication
        home:   child:  dynamic === 10.1.0.0/16
Security Associations:
        home[1]: ESTABLISHED 27 minutes ago, 
135.252.131.87[moon.strongswan.org]...135.252.130.87[sun.strongswan.org]
        home[1]: IKE SPIs: 69208f149b5fab33_i* ca28924955c169b3_r, public key 
reauthentication in 23 minutes
        home[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
        home{1}:  INSTALLED, TUNNEL, ESP SPIs: caf62dcc_i ccae8f3e_o
        home{1}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 3 
minutes
        home{1}:   10.3.0.1/32 === 10.1.0.0/16

Thanks,
Roger

_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to