../../guestbin/prep.sh
ipsec.conf -> PATH/etc/ipsec.conf
ipsec.secrets -> PATH/etc/ipsec.secrets
west #
 ifconfig ipsec1 create
west #
 ifconfig ipsec1 -link2
west #
 ifconfig ipsec1 inet tunnel 192.1.2.45 192.1.2.23
west #
 ifconfig ipsec1 inet 192.0.45.1/24 192.0.23.1
west #
 ifconfig ipsec1
ipsec1: flags=0x8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
	tunnel inet 192.1.2.45 --> 192.1.2.23
	status: active
	inet6 fe80::d84f:53:a5c1:3882%ipsec1/64 ->  flags 0x2<TENTATIVE> scopeid 0x5
	inet 192.0.45.1/24 -> 192.0.23.1 flags 0
west #
 ../../guestbin/ipsec-kernel-policy.sh
192.1.2.23[any] 192.1.2.45[any] 4(ipv4)
	in ipsec
	esp/transport//unique#16385
	spid=1 seq=3 pid=PID
	refcnt=0
192.1.2.23[any] 192.1.2.45[any] 41(ipv6)
	in discard
	spid=3 seq=2 pid=PID
	refcnt=0
192.1.2.45[any] 192.1.2.23[any] 4(ipv4)
	out ipsec
	esp/transport//unique#16386
	spid=2 seq=1 pid=PID
	refcnt=0
192.1.2.45[any] 192.1.2.23[any] 41(ipv6)
	out discard
	spid=4 seq=0 pid=PID
	refcnt=0
west #
 ipsec start
Redirecting to: [initsystem]
Initializing NSS database
Starting pluto.
west #
 ../../guestbin/wait-until-pluto-started
west #
 ipsec add east-west
"east-west": command: 'ifconfig' 'ipsec1'
"east-west": output: ipsec1: flags=0x8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280\n\ttunnel inet 192.1.2.45 --> 192.1.2.
"east-west": output: 23\n\tstatus: active\n\tinet6 fe80::d84f:53:a5c1:3882%ipsec1/64 ->  flags 0x2<TENTATIVE> scopeid 0x5\n\tin
"east-west": output: et 192.0.45.1/24 -> 192.0.23.1 flags 0\n
"east-west": eof: 0; exited yes(0); signaled: no(0); stopped: no(0); core: no
"east-west": added IKEv2 connection
west #
 ipsec up east-west
"east-west" #1: initiating IKEv2 connection to 192.1.2.23 using UDP
"east-west" #1: sent IKE_SA_INIT request to 192.1.2.23:UDP/500
"east-west" #1: processed IKE_SA_INIT response from 192.1.2.23:UDP/500 {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=DH19}, initiating IKE_AUTH
"east-west" #1: sent IKE_AUTH request to 192.1.2.23:UDP/500
"east-west" #1: initiator established IKE SA; authenticated peer using authby=secret and ID_FQDN '@east'
"east-west" #2: BSD doesn't add kernel-policy to an ipsec-interface (ipsec1@vioif1)
"east-west" #2: command: 'ifconfig' 'ipsec1' 'inet' '192.0.45.1/24' '192.0.45.1'
"east-west" #2: eof: 0; exited yes(0); signaled: no(0); stopped: no(0); core: no
"east-west" #2: added 192.0.45.1/24 to ipsec-interface ipsec1@vioif1
"east-west" #2: command: 'ifconfig' 'ipsec1' 'up'
"east-west" #2: eof: 0; exited yes(0); signaled: no(0); stopped: no(0); core: no
"east-west" #2: BSD doesn't add kernel-policy to an ipsec-interface (ipsec1@vioif1)
"east-west" #2: initiator established Child SA using #1; IPsec tunnel [192.0.23.0/24===192.0.45.0/24] {ESP=>0xESPESP <0xESPESP xfrm=AES_CBC_128-HMAC_SHA1_96 DPD=passive}
west #
 ../../guestbin/ping-once.sh --up -I 192.0.45.1 192.0.23.1
down UNEXPECTED
# fping  -c 1  --timeout 5s   --src 192.0.45.1 192.0.23.1
192.0.23.1 : [0], timed out (NaN avg, 100% loss) 192.0.23.1 : xmt/rcv/%loss = 1/0/100%
west #
 ../../guestbin/ipsec-kernel-state.sh
192.1.2.23 192.1.2.45 
	esp mode=any spi=SPISPI(0xSPISPI) reqid=16389(0x00004005)
	E: aes-cbc  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
	A: hmac-sha1  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
	seq=0x00000000 replay=16 flags=0x00000000 state=mature 
	created: TIMESTAMP	current: TIMESTAMP
	diff: N(s)	hard: 28800(s)	soft: 28800(s)
	last: TIMESTAMP	hard: 0(s)	soft: 0(s)
	current: 0(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 0	hard: 0	soft: 0
	sadb_seq=1 pid=PID refcnt=0
192.1.2.45 192.1.2.23 
	esp mode=any spi=SPISPI(0xSPISPI) reqid=16389(0x00004005)
	E: aes-cbc  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
	A: hmac-sha1  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
	seq=0x00000000 replay=16 flags=0x00000000 state=mature 
	created: TIMESTAMP	current: TIMESTAMP
	diff: N(s)	hard: 28800(s)	soft: 28800(s)
	last: TIMESTAMP	hard: 0(s)	soft: 0(s)
	current: 0(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 0	hard: 0	soft: 0
	sadb_seq=0 pid=PID refcnt=0
west #
 ../../guestbin/ipsec-kernel-policy.sh
192.1.2.23[any] 192.1.2.45[any] 4(ipv4)
	in ipsec
	esp/transport//unique#16385
	spid=1 seq=3 pid=PID
	refcnt=0
192.1.2.23[any] 192.1.2.45[any] 41(ipv6)
	in discard
	spid=3 seq=2 pid=PID
	refcnt=0
192.1.2.45[any] 192.1.2.23[any] 4(ipv4)
	out ipsec
	esp/transport//unique#16386
	spid=2 seq=1 pid=PID
	refcnt=0
192.1.2.45[any] 192.1.2.23[any] 41(ipv6)
	out discard
	spid=4 seq=0 pid=PID
	refcnt=0
west #
 setkey -F
west #
 ifconfig ipsec1 destroy
west #
 
