Hi,

it's quit quick and dirty  but it works :-)

#!/bin/bash
cat<<HERE | xxd -r -p | nc -w 1  -u -p 500 $1 500 > /tmp/$1.stat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if test -s /tmp/$1.stat
 then
  echo $1 ike open
else
  echo $1 ike closed
fi


Am 14/12/17 um 11:29 schrieb Michael Schwartzkopff:
Hi,


What is the best way to do a fault monitoring of a strongswan server? In
the first place, my monitoring service should check if the server is
able to offer the VPN service, which means i.e. that UDP/500 will send a
correct answer if checked from the outside.


Any ideas?


Mit freundlichen Grüßen,


--
Thomas Will

Xinux e.K.
Wichernstrasse 18
66482 Zweibruecken

Registergericht
Amtsgericht Zweibruecken
HRA 1518

P: +49 6332 44040
F: +49 6332 899227
M: +49 170 5218548
M: +49 176 97497102

E: [email protected]
W: http://www.xinux.de

Reply via email to