Hi, I have tried the IKEV2 config-payload example as http://www.strongswan.org/uml/testresults43/ikev2/config-payload/ successfully.
I want to get the inner virtual IP address that are assigned by config-payload for later use in my application by SHELL command or TCL. Is there an easy way to get it? Currently I can only see it by "ipsec status home" and check the last line. This is easy for manual, but not easy for code to get it accurate. So I want to ask if there is an easy and accurate way to get it? [r...@localhost etc]# ipsec statusall home Status of IKEv2 charon daemon (strongSwan 4.3.4): uptime: 28 minutes, since Aug 28 14:57:39 2009 worker threads: 9 idle of 16, job queue load: 0, scheduled events: 3 loaded plugins: aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown resolv-conf Listening IP addresses: 135.252.131.87 Connections: home: 135.252.131.87...135.252.130.87 home: local: [moon.strongswan.org] uses public key authentication home: cert: "C=CN, ST=Shandong, O=ALU, OU=RD, CN=moon.strongswan.org, e=m...@alcatel-lucent.com" home: remote: [sun.strongswan.org] uses any authentication home: child: dynamic === 10.1.0.0/16 Security Associations: home[1]: ESTABLISHED 27 minutes ago, 135.252.131.87[moon.strongswan.org]...135.252.130.87[sun.strongswan.org] home[1]: IKE SPIs: 69208f149b5fab33_i* ca28924955c169b3_r, public key reauthentication in 23 minutes home[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048 home{1}: INSTALLED, TUNNEL, ESP SPIs: caf62dcc_i ccae8f3e_o home{1}: AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 3 minutes home{1}: 10.3.0.1/32 === 10.1.0.0/16 Thanks, Roger _______________________________________________ Users mailing list Users@lists.strongswan.org https://lists.strongswan.org/mailman/listinfo/users