Status of IKE charon daemon (strongSwan 5.7.1, FreeBSD 11.2-RELEASE-p6, amd64): uptime: 36 minutes, since Mar 25 01:49:13 2019 worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 18 loaded plugins: charon unbound aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey ipseckey pem openssl fips-prf curve25519 xcbc cmac hmac curl attr kernel-pfkey kernel-pfroute resolve socket-default stroke vici updown eap-identity eap-sim eap-md5 eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap whitelist addrblock counters Listening IP addresses: 192.168.1.1 XXXXXXX 10.0.8.1 Connections: con4000: XXXXXXX...XXXXXXX IKEv2, dpddelay=10s con4000: local: [XXXXXXX] uses pre-shared key authentication con4000: remote: [XXXXXXX] uses pre-shared key authentication con4000: child: 192.168.1.0/24|/0 === 192.168.2.0/24|/0 TUNNEL, dpdaction=restart Routed Connections: con4000{8}: ROUTED, TUNNEL, reqid 1 con4000{8}: 192.168.1.0/24|/0 === 192.168.2.0/24|/0 Security Associations (1 up, 0 connecting): con4000[6]: ESTABLISHED 4 minutes ago, XXXXXXX[XXXXXXX]...XXXXXXX[XXXXXXX] con4000[6]: IKEv2 SPIs: d537fce7f37bbba4_i* 110db1608162b08f_r, pre-shared key reauthentication in 7 hours con4000[6]: IKE proposal: AES_GCM_16_256/PRF_AES128_XCBC/MODP_2048 con4000{10}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: c12e593b_i c47ddec2_o con4000{10}: AES_GCM_16_256, 336 bytes_i (4 pkts, 99s ago), 1584 bytes_o (12 pkts, 99s ago), rekeying in 39 minutes con4000{10}: 192.168.1.0/24|/0 === 192.168.2.0/24|/0