# This file is automatically generated. Do not edit connections { bypass { remote_addrs = 127.0.0.1 children { bypasslan { local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 mode = pass start_action = trap } } } con43 { # P1 (ikeid 43): [REDACTED] fragmentation = yes unique = replace version = 1 aggressive = yes proposals = aes256-sha256-modp2048 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con43_85 { # P2 (reqid 85): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/29 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_86 { # P2 (reqid 86): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/25 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_87 { # P2 (reqid 87): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_88 { # P2 (reqid 88): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_89 { # P2 (reqid 89): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_90 { # P2 (reqid 90): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_91 { # P2 (reqid 91): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_92 { # P2 (reqid 92): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_93 { # P2 (reqid 93): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_94 { # P2 (reqid 94): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_95 { # P2 (reqid 95): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_96 { # P2 (reqid 96): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_97 { # P2 (reqid 97): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_98 { # P2 (reqid 98): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_99 { # P2 (reqid 99): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_100 { # P2 (reqid 100): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_101 { # P2 (reqid 101): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con43_102 { # P2 (reqid 102): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/21 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } } } con4 { # P1 (ikeid 4): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con4 { # P2 (reqid 4): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con5 { # P1 (ikeid 5): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con5 { # P2 (reqid 5): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con3 { # P1 (ikeid 3): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con3 { # P2 (reqid 3): [REDACTED] mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256 dpd_action = trap } } } con6 { # P1 (ikeid 6): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con6_6 { # P2 (reqid 6): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/23 esp_proposals = aes256-sha256-modp2048 close_action = start dpd_action = restart } con6_7 { # P2 (reqid 7): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 close_action = start dpd_action = restart } } } con7 { # P1 (ikeid 7): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con7_8 { # P2 (reqid 8): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap local_ts = [REDACTED]/24 remote_ts = [REDACTED]/23 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } con7_9 { # P2 (reqid 9): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con8 { # P1 (ikeid 8): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con8 { # P2 (reqid 10): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con9 { # P1 (ikeid 9): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con9 { # P2 (reqid 11): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con10 { # P1 (ikeid 10): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-ecp384 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con10 { # P2 (reqid 12): [REDACTED] mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con22 { # P1 (ikeid 22): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-ecp384 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con22_43 { # P2 (reqid 43): [REDACTED]1 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } con22_44 { # P2 (reqid 44): [REDACTED]2 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha256-ecp384 close_action = start dpd_action = restart } } } con11 { # P1 (ikeid 11): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con11 { # P2 (reqid 13): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con12 { # P1 (ikeid 12): [REDACTED] fragmentation = yes unique = replace version = 1 aggressive = yes proposals = aes256-sha256-modp2048 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con12_14 { # P2 (reqid 14): [REDACTED]-1-Tunnel-1 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/22 esp_proposals = aes256-sha1 close_action = start dpd_action = restart } con12_15 { # P2 (reqid 15): [REDACTED]-1-Tunnel-2 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha1 close_action = start dpd_action = restart } con12_16 { # P2 (reqid 16): [REDACTED]-1-Tunnel-3 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha1 close_action = start dpd_action = restart } con12_17 { # P2 (reqid 17): [REDACTED]-1-Tunnel-4 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha1 close_action = start dpd_action = restart } con12_18 { # P2 (reqid 18): [REDACTED]-1-Tunnel-5 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = start local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha1 close_action = start dpd_action = restart } } } con13 { # P1 (ikeid 13): [REDACTED] fragmentation = yes unique = replace version = 1 aggressive = yes proposals = aes256-sha256-modp2048 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = [REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con13_19 { # P2 (reqid 19): [REDACTED]-2-Tunnel-1 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = [REDACTED]/24 remote_ts = [REDACTED]/22 esp_proposals = aes256-sha1 dpd_action = trap } con13_20 { # P2 (reqid 20): [REDACTED]-2-Tunnel-2 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha1 dpd_action = trap } con13_21 { # P2 (reqid 21): [REDACTED]-2-Tunnel-3 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha1 dpd_action = trap } con13_22 { # P2 (reqid 22): [REDACTED]-2-Tunnel-4 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha1 dpd_action = trap } con13_23 { # P2 (reqid 23): [REDACTED]-2-Tunnel-5 mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = [REDACTED]/24 remote_ts = [REDACTED]/24 esp_proposals = aes256-sha1 dpd_action = trap } } } con29 { # P1 (ikeid 29): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con29 { # P2 (reqid 52): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/32 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con20 { # P1 (ikeid 20): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con20 { # P2 (reqid 41): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con21 { # P1 (ikeid 21): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con21 { # P2 (reqid 42): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con23 { # P1 (ikeid 23): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con23 { # P2 (reqid 45): [REDACTED] mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con2 { # P1 (ikeid 2): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con2 { # P2 (reqid 2): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con24 { # P1 (ikeid 24): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con24 { # P2 (reqid 46): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con25 { # P1 (ikeid 25): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con25 { # P2 (reqid 48): [REDACTED] # P2 (reqid 47): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24,[REDACTED]/24 local_ts = [REDACTED]/24,[REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con26 { # P1 (ikeid 26): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con26 { # P2 (reqid 49): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 close_action = start dpd_action = restart } } } con27 { # P1 (ikeid 27): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con27 { # P2 (reqid 50): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con14 { # P1 (ikeid 14): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con14 { # P2 (reqid 25): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con28 { # P1 (ikeid 28): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con28 { # P2 (reqid 51): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start remote_ts = [REDACTED] local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 close_action = start dpd_action = restart } } } con30 { # P1 (ikeid 30): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con30 { # P2 (reqid 53): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con31 { # P1 (ikeid 31): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con31 { # P2 (reqid 54): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED] local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con32 { # P1 (ikeid 32): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con32 { # P2 (reqid 55): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con33 { # P1 (ikeid 33): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con33 { # P2 (reqid 56): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con1 { # P1 (ikeid 1): [REDACTED]'s House fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = fqdn:[REDACTED] auth = psk } children { con1 { # P2 (reqid 1): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con37 { # P1 (ikeid 37): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = fqdn:[REDACTED] auth = psk } children { con37 { # P2 (reqid 62): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 close_action = start dpd_action = restart } } } con34 { # P1 (ikeid 34): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256gcm128-sha512-ecp521 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = fqdn:[REDACTED] auth = psk } children { con34 { # P2 (reqid 57): [REDACTED] mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256gcm128-ecp521 dpd_action = trap } } } con46 { # P1 (ikeid 46): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = fqdn:[REDACTED] auth = psk } children { con46 { # P2 (reqid 139): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 close_action = start dpd_action = restart } } } con47 { # P1 (ikeid 47): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 10s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = fqdn:[REDACTED] auth = psk } children { con47 { # P2 (reqid 140): [REDACTED] mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap remote_ts = [REDACTED]/24 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp2048 dpd_action = trap } } } con15 { # P1 (ikeid 15): [REDACTED] fragmentation = yes unique = replace version = 2 proposals = aes256-sha256-modp2048 dpd_delay = 45s rekey_time = 25920s reauth_time = 0s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = [REDACTED] remote_addrs = [REDACTED] local { id = fqdn:[REDACTED] auth = psk } remote { id = [REDACTED] auth = psk } children { con15 { # P2 (reqid 24): [REDACTED] mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = start remote_ts = [REDACTED]/27 local_ts = [REDACTED]/24 esp_proposals = aes256-sha256-modp1024 close_action = start dpd_action = restart } } } } secrets { ike-0 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-1 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-2 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-3 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-4 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-5 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-6 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-7 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-8 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-9 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-10 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-11 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-12 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-13 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-14 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-15 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-16 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-17 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-18 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-19 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-20 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-21 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-22 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-23 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-24 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-25 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-26 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-27 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-28 { secret = [REDACTED] id-0 = %any id-1 = fqdn:[REDACTED] } ike-29 { secret = [REDACTED] id-0 = %any id-1 = fqdn:[REDACTED] } ike-30 { secret = [REDACTED] id-0 = %any id-1 = fqdn:[REDACTED] } ike-31 { secret = [REDACTED] id-0 = %any id-1 = fqdn:[REDACTED] } ike-32 { secret = [REDACTED] id-0 = %any id-1 = fqdn:[REDACTED] } ike-33 { secret = [REDACTED] id-0 = %any id-1 = [REDACTED] } ike-34 { secret = [REDACTED] id-0 = [REDACTED] } }