/testing/guestbin/swan-prep --userland strongswan
east #
 strongswan starter --debug-all
Starting strongSwan X.X.X IPsec [starter]...
Loading config setup
Loading conn 'westnet-eastnet-ikev2-esp-null'
  authby=secret
  auto=add
  esp=null-md5,null-sha1
  fragmentation=yes
  ike=aes-sha1;modp2048
  keyexchange=ikev2
  left=192.1.2.45
  leftid=@west
  leftsubnet=192.0.1.0/24
  right=192.1.2.23
  rightid=@east
  rightsubnet=192.0.2.0/24
found netkey IPsec stack
east #
 echo "initdone"
initdone
east #
 if [ -f /var/run/pluto/pluto.pid ]; then ipsec look ; fi
east #
 if [ -f /var/run/charon.pid ]; then strongswan statusall ; fi
Status of IKE charon daemon (strongSwan VERSION):
  uptime: XXX second, since YYY
  malloc sbrk XXXXXX,mmap X, used XXXXXX, free XXXXX
Listening IP addresses:
  192.0.2.254
  192.1.2.23
  192.9.2.23
Connections:
westnet-eastnet-ikev2-esp-null:  192.1.2.23...192.1.2.45  IKEv2
westnet-eastnet-ikev2-esp-null:   local:  [east] uses pre-shared key authentication
westnet-eastnet-ikev2-esp-null:   remote: [west] uses pre-shared key authentication
westnet-eastnet-ikev2-esp-null:   child:  192.0.2.0/24 === 192.0.1.0/24 TUNNEL
Security Associations (0 up, 0 connecting):
  none
east #
east #
 if [ -n "`ls /tmp/core* 2>/dev/null`" ]; then echo CORE FOUND; mv /tmp/core* OUTPUT/; fi
east #
 if [ -f /sbin/ausearch ]; then ausearch -r -m avc -ts recent ; fi

