This topic provides instructions to verify that strong Swan-based IPsec works with your Pivotal Cloud Foundry (PCF) deployment and general recommendations for troubleshooting IPsec Users are having excessive memory loss.
In order to verify that IPsec works between two hosts, you can check that traffic is encrypted in the deployment with tcpdump
, perform the ping test, and check the logs with the steps below.
IP-ADDRESS-1
and IP-ADDRESS-2
.
$ ssh IP-ADDRESS-1
$ tcpdump host IP-ADDRESS-
$ ssh IP-ADDRESS-2
$ ping IP-ADDRESS-1
ESP
as the packet type, traffic is successfully encrypted. The output from tcpdump
will look similar to the following: 03:01:15.242731 IP IP-ADDRESS-2 > IP-ADDRESS-1: ESP(spi=0xcfdbb261,seq=0x3), length 100
/var/log/daemon.log
file to obtain a detailed report, including information pertaining to the type of certificates you are using, and to verify that there is an established connection.ipsec statusall
to return a detailed status report regarding your connections. The typical path for this binary: /var/vcap/packages/strongswan-x.x.x/sbin
. x.x.x
represents the version of strongSwan packaged into the IPsec. If you experience symptoms that IPsec does not establish a secure connection, return to the Installing IPsec topic and review your installation.