@RT-AC86U-3F10:/tmp/etc/ipsec.d/cacerts# ipsec statusall
Status of IKE charon daemon (weakSwan 5.2.1, Linux 4.1.27, aarch64):
uptime: 10 minutes, since Mar 01 22:37:05 2018
malloc: sbrk 1462272, mmap 0, used 350448, free 1111824
worker threads: 3 of 8 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 3
loaded plugins: charon aes des rc2 sha1 sha2 md4 md5 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf agent xcbc cmac hmac attr kernel-netlink resolve socket-default stroke updown eap-identity eap-md5 eap-mschapv2 eap-tls eap-peap xauth-generic
Virtual IP pools (size/online/offline):
10.10.10.0/24: 254/1/0
Listening IP addresses:
MYIP
192.168.50.1
10.8.0.1
10.12.0.2
Connections:
Host-to-Net: MYIP...%any IKEv2, dpddelay=10s
Host-to-Net: local: [myddns] uses public key authentication
Host-to-Net: cert: "CN=myddns"
Host-to-Net: remote: uses EAP_MSCHAPV2 authentication with EAP identity '%any'
Host-to-Net: child: 0.0.0.0/0 === dynamic TUNNEL, dpdaction=clear
Security Associations (1 up, 0 connecting):
Host-to-Net[2]: ESTABLISHED 10 minutes ago, myip[myddns]...clientip[Username]
Host-to-Net[2]: IKEv2 SPIs: c81154507baf1ce9_i f45d166df723899b_r*, public key reauthentication in 2 hours
Host-to-Net[2]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
Host-to-Net{1}: INSTALLED, TUNNEL, ESP in UDP SPIs: cf59bd28_i 7dcc77df_o
Host-to-Net{1}: AES_CBC_128/HMAC_SHA1_96, 28637 bytes_i (313 pkts, 144s ago), 48894 bytes_o (298 pkts, 144s ago), rekeying in 32 minutes
Host-to-Net{1}: 0.0.0.0/0 === 10.10.10.1/32