# This file is automatically generated. Do not edit connections { bypass { remote_addrs = 127.0.0.1 children { bypasslan { local_ts = 192.0.2.0/24,2001:db8:1:ee80::/60 remote_ts = 192.0.2.0/24,2001:db8:1:ee80::/60 mode = pass start_action = trap } } } con200000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes256-sha1-modp1024 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.102 local { id = 198.51.100.139 auth = psk } remote { id = 198.51.100.102 auth = psk } children { con200000 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.2.0/24 esp_proposals = aes256-sha1-modp1024 } con200001 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.3.0/24 esp_proposals = aes256-sha1-modp1024 } con200002 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.4.0/24 esp_proposals = aes256-sha1-modp1024 } con200003 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.6.0/24 esp_proposals = aes256-sha1-modp1024 } con200004 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.7.0/24 esp_proposals = aes256-sha1-modp1024 } con200005 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.8.0/24 esp_proposals = aes256-sha1-modp1024 } con200006 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.9.0/25 esp_proposals = aes256-sha1-modp1024 } con200007 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.10.0/24 esp_proposals = aes256-sha1-modp1024 } con200008 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.11.0/25 esp_proposals = aes256-sha1-modp1024 } con200009 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.13.0/24 esp_proposals = aes256-sha1-modp1024 } con200010 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.14.0/24 esp_proposals = aes256-sha1-modp1024 } con200011 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.15.0/24 esp_proposals = aes256-sha1-modp1024 } con200012 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.16.0/25 esp_proposals = aes256-sha1-modp1024 } con200013 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.17.0/24 esp_proposals = aes256-sha1-modp1024 } con200014 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.12.0/24 esp_proposals = aes256-sha1-modp1024 } con200015 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.19.0/24 esp_proposals = aes256-sha1-modp1024 } con200016 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.20.0/24 esp_proposals = aes256-sha1-modp1024 } con200017 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.21.0/24 esp_proposals = aes256-sha1-modp1024 } } } con400000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes256-sha1-modp1536 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.104 local { id = 198.51.100.100 auth = psk } remote { id = 198.51.100.104 auth = psk } children { con400000 { close_action = start dpd_action = restart mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.228.0.0/16 esp_proposals = aes256-sha256-modp1024 } con400001 { close_action = start dpd_action = restart mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.229.0.0/16 esp_proposals = aes256-sha256-modp1024 } con400002 { close_action = start dpd_action = restart mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.30.0/24 esp_proposals = aes256-sha256-modp1024 } con400003 { close_action = start dpd_action = restart mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.31.0/24 esp_proposals = aes256-sha256-modp1024 } con400004 { close_action = start dpd_action = restart mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.1.0/24 esp_proposals = aes256-sha256-modp1024 } con400005 { close_action = start dpd_action = restart mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.5.0/24 esp_proposals = aes256-sha256-modp1024 } } } con500000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes128-sha256-modp1024 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.105 local { id = 198.51.100.100 auth = psk } remote { id = 198.51.100.105 auth = psk } children { con500000 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.237.0.0/16 esp_proposals = aes256-sha1-modp1536 } con500001 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.238.0.0/16 esp_proposals = aes256-sha1-modp1536 } con500002 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.239.0.0/16 esp_proposals = aes256-sha1-modp1536 } } } con600000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes128-sha256-modp1024 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.106 local { id = 198.51.100.100 auth = psk } remote { id = 198.51.100.106 auth = psk } children { con600000 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.206.0.0/16 esp_proposals = aes256-sha1-modp1536 } con600001 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.241.0.0/16 esp_proposals = aes256-sha1-modp1536 } con600002 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.242.0.0/16 esp_proposals = aes256-sha1-modp1536 } con600003 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.243.0.0/16 esp_proposals = aes256-sha1-modp1536 } con600004 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.244.0.0/16 esp_proposals = aes256-sha1-modp1536 } con600005 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.245.0.0/16 esp_proposals = aes256-sha1-modp1536 } } } con300000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes256-sha256-modp1024 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.103 local { id = 198.51.100.100 auth = psk } remote { id = 198.51.100.103 auth = psk } children { con300000 { dpd_action = trap mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.22.0/32 esp_proposals = aes256-sha256-modp1024 } con300001 { dpd_action = trap mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap local_ts = 10.253.0.1/32|10.254.0.0/24 remote_ts = 10.202.23.0/32 esp_proposals = aes256-sha256-modp1024 } con300002 { dpd_action = trap mode = tunnel policies = yes life_time = 28800s rekey_time = 25920s rand_time = 2880s start_action = trap local_ts = 10.253.0.1/32|10.254.0.0/24 remote_ts = 10.202.24.0/32 esp_proposals = aes256-sha256-modp1024 } } } con700000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes256-sha1-modp1024 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.107 local { id = 198.51.100.100 auth = psk } remote { id = 198.51.100.107 auth = psk } children { con700000 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.25.0/24 esp_proposals = aes256-sha1-modp1024 } con700001 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.7.0/24 esp_proposals = aes256-sha1-modp1024 } con700002 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.202.27.0/24 esp_proposals = aes256-sha1-modp1024 } con700003 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.246.0.0/16 esp_proposals = aes256-sha1-modp1024 } con700004 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.247.0.0/16 esp_proposals = aes256-sha1-modp1024 } con700005 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.253.0.1|10.254.0.0/24 remote_ts = 10.248.0.0/16 esp_proposals = aes256-sha1-modp1024 } } } con1000000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes256-sha1-ecp384 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.110 local { id = 198.51.100.100 auth = psk } remote { id = 198.51.100.110 auth = psk } children { con1000000 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.155.0.0/16 esp_proposals = aes256-sha256-modp1536 } con1000001 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.218.0.0/16 esp_proposals = aes256-sha256-modp1536 } con1000002 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.232.0.0/16 esp_proposals = aes256-sha256-modp1536 } con1000003 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.233.0.0/16 esp_proposals = aes256-sha256-modp1536 } con1000004 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.234.0.0/16 esp_proposals = aes256-sha256-modp1536 } con1000005 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.235.0.0/16 esp_proposals = aes256-sha256-modp1536 } } } con800000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes256-sha1-modp1536 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.108 local { id = 198.51.100.100 auth = psk } remote { id = 198.51.100.108 auth = psk } children { con800000 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.51.0/24 esp_proposals = aes256-sha256 } con800001 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.56.0/24 esp_proposals = aes256-sha256 } con800002 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.202.57.0/24 esp_proposals = aes256-sha256 } } } con100000 { fragmentation = yes unique = replace version = 1 aggressive = no proposals = aes256-sha256-modp1536 dpd_delay = 10s dpd_timeout = 60s reauth_time = 25920s over_time = 2880s rand_time = 2880s encap = no mobike = no local_addrs = 198.51.100.139 remote_addrs = 198.51.100.101 local { id = 198.51.100.100 auth = psk } remote { id = 198.51.100.101 auth = psk } children { con100000 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.236.0.0/16 esp_proposals = aes256-sha256-modp1536 } con100001 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.249.0.0/16 esp_proposals = aes256-sha256-modp1536 } con100002 { dpd_action = trap mode = tunnel policies = yes life_time = 3600s rekey_time = 3240s rand_time = 360s start_action = trap local_ts = 10.254.0.0/24 remote_ts = 10.250.0.0/16 esp_proposals = aes256-sha256-modp1536 } } } } secrets { ike-0 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.102 } ike-1 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.104 } ike-2 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.105 } ike-3 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.106 } ike-4 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.103 } ike-5 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.107 } ike-6 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.110 } ike-7 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.108 } ike-8 { secret = 0seHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= id-0 = %any id-1 = 198.51.100.101 } }