![Black Box LS1016A User Manual Download Page 387](http://html.mh-extra.com/html/black-box/ls1016a/ls1016a_user-manual_2763435387.webp)
Appendix G - IPSEC
User Guide
387
ipsec0->eth0 mtu=16260(1443)->1500
[email protected] ESP_3DES_HMAC_MD5: dir=out
src=64.186.161.96 iv_bits=64bits iv=0xd491678073a22185 ooowin=64
alen=128 aklen=128 eklen=192 life(c,s,h)=addtime(4,0,0)
[email protected] ESP_3DES_HMAC_MD5: dir=in
src=64.186.161.128 iv_bits=64bits iv=0x46209cee5f952117 ooowin=64
alen=128 aklen=128 eklen=192 life(c,s,h)=addtime(4,0,0)
[email protected] IPIP: dir=in src=64.186.161.128 pol-
icy=64.186.161.128/32->64.186.161.96/32 flags=0x8<>
life(c,s,h)=addtime(4,0,0)
[email protected] IPIP: dir=out src=64.186.161.96
life(c,s,h)=addtime(4,0,0)
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 64.186.161.1 0.0.0.0 UG 40 0 0 eth0
64.186.161.0 0.0.0.0 255.255.255.0 U 40 0 0 eth0
64.186.161.0 0.0.0.0 255.255.255.0 U 40 0 0 ipsec0
64.186.161.128 64.186.161.128 255.255.255.255 UGH 40 0 0 ipsec0
In this output you can see that there is an activated tunnel between the networks
64.186.161.96/32 and 64.186.161.128/32. You can also see the routing table for this host
after the encryption information .
IPsec whack
The output of ipsec whack -status looks like this:
[root@henrique root]# ipsec whack --status
000 interface ipsec0/eth0 64.186.161.96
000
000 "teste": 64.186.161.96[@micro]...64.186.161.128[@BLACK BOX ®
Advanced Console Server
]