Hi,
it's quit quick and dirty but it works :-)
#!/bin/bash
cat< /tmp/$1.stat
e1c1d9460d219c00011002f00d00
0074000100010068000100030324010180010007
800e0080800200048004000f80030001800b0001800c2a3003240201
80010007800e0080800200048004001
Hi
Try ike-scan
regards
Am 14.12.2017 um 11:40 schrieb Michael Stiller:
Hi.
What i do is, that i have another strongswan setup on (another) monitoring
machine.
This one tries to connect to the vpn server periodically using a special
"monitoring user / monitoring command”.
After the conne
Am 14.12.2017 um 11:49 schrieb Michael Stiller:
> Ah ok,
>
> for that i enabled the vici plugin in strongswan and have a go program using
> github.com/bronze1man/goStrongswanVici which implements a small http
> listening healthcheck program.
>
> Best regards,
>
> Michael
Sounds good. I will g
Hi.
What i do is, that i have another strongswan setup on (another) monitoring
machine.
This one tries to connect to the vpn server periodically using a special
"monitoring user / monitoring command”.
After the connection succeeded i do a “curl” to an "ip address mirror” and
compare it with t
Hi,
What is the best way to do a fault monitoring of a strongswan server? In
the first place, my monitoring service should check if the server is
able to offer the VPN service, which means i.e. that UDP/500 will send a
correct answer if checked from the outside.
Any ideas?
Mit freundlichen Gr