# This file is automatically generated. Do not edit
connections {
	bypass {
		remote_addrs = 127.0.0.1
		children {
			bypasslan {
				local_ts = 172.22.123.0/24
				remote_ts = 172.22.123.0/24
				mode = pass
				start_action = trap
			}
		}
	}
	con2 {
		# P1 (ikeid 2): Multipath Tunnel 1
		fragmentation = yes
		unique = replace
		version = 2
		proposals = aes256-sha256-modp2048
		dpd_delay = 10s
		rekey_time = 25920s
		reauth_time = 0s
		over_time = 2880s
		rand_time = 2880s
		encap = no
		mobike = no
		local_addrs = 172.22.122.2
		remote_addrs = 172.22.122.1
		local {
			id = 172.22.122.2
			auth = psk
		}
		remote {
			id = 172.22.122.1
			auth = psk
		}
		children {
			con2 {
				# P2 (reqid 2): Multipath VTI 1
				policies = no
				life_time = 3600s
				rekey_time = 3240s
				rand_time = 360s
				start_action = start
				remote_ts = 169.254.62.1,0.0.0.0/0,::/0
				local_ts = 169.254.62.2,0.0.0.0/0,::/0
				reqid = 5002
				esp_proposals = aes256gcm128-modp2048,aes256gcm96-modp2048,aes256gcm64-modp2048
				dpd_action = restart
			}
		}
	}
	con3 {
		# P1 (ikeid 3): Multipath Tunnel 2
		fragmentation = yes
		unique = replace
		version = 2
		proposals = aes256-sha256-modp2048
		dpd_delay = 10s
		rekey_time = 25920s
		reauth_time = 0s
		over_time = 2880s
		rand_time = 2880s
		encap = no
		mobike = no
		local_addrs = 172.22.122.10
		remote_addrs = 172.22.122.9
		local {
			id = 172.22.122.10
			auth = psk
		}
		remote {
			id = 172.22.122.9
			auth = psk
		}
		children {
			con3 {
				# P2 (reqid 3): Multipath VTI 2
				policies = no
				life_time = 3600s
				rekey_time = 3240s
				rand_time = 360s
				start_action = start
				remote_ts = 169.254.62.5,0.0.0.0/0,::/0
				local_ts = 169.254.62.6,0.0.0.0/0,::/0
				reqid = 5003
				esp_proposals = aes256gcm128-modp2048,aes256gcm96-modp2048,aes256gcm64-modp2048
				dpd_action = restart
			}
		}
	}
}
secrets {
	ike-0 {
		secret = <redacted>
		id-0 = %any
		id-1 = 172.22.122.1
	}
	ike-1 {
		secret = <redacted>
		id-0 = %any
		id-1 = 172.22.122.9
	}
}
