{"id":12291,"date":"2022-04-15T11:04:56","date_gmt":"2022-04-15T08:04:56","guid":{"rendered":"https:\/\/kifarunix.com\/?p=12291"},"modified":"2022-04-15T11:05:00","modified_gmt":"2022-04-15T08:05:00","slug":"install-and-configure-libreswan-vpn-client-on-ubuntu-debian","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/install-and-configure-libreswan-vpn-client-on-ubuntu-debian\/","title":{"rendered":"Install and Configure Libreswan VPN Client on Ubuntu\/Debian"},"content":{"rendered":"\n
In this tutorial, you will learn how to install and configure Libreswan VPN client on Ubuntu\/Debian Systems. We are using Ubuntu 20.04 and Debian 11 systems as our Libreswan IPSec roadwarrior VPN clients. Road warriors are traveling users with mobile clients with a dynamically assigned\u00a0 In order to setup Libreswan IPSec VPN to allow roadwarriors to connect to VPN, follow our guide on the link provided below;<\/p>\n\n\n\n Setup IPSec VPN server with Libreswan on Rocky Linux<\/a><\/p>\n\n\n\n In the guide above, we have generated certificates for two hosts, As already mentioned, we will use the two certificate files on Ubuntu 20.04 and Debian 11 client hosts respectively.<\/p>\n\n\n\n On your Ubuntu\/Debian systems, install libreswan package.<\/p>\n\n\n\n Create Libreswan Client VPN connection configuration file<\/p>\n\n\n\n Enter the content below;<\/p>\n\n\n\n If you are using hostnames, ensure that they are resolvable.<\/strong><\/p>\n\n\n\n Similarly, on your second client host;<\/p>\n\n\n\n Check the configuration syntax;<\/p>\n\n\n\n On Ubuntu<\/p>\n\n\n\n On Debian;<\/p>\n\n\n\n Similarly, run the command below to verify the configuration;<\/p>\n\n\n\n Sample output;<\/p>\n\n\n\n From the command output, we need to disable the ICMP default\/accept_redirects. This can be done using as follows;<\/p>\n\n\n\n Rerun the verification command again and check the output;<\/p>\n\n\n\n Pluto is not running since we havent started IPSec yet, which is fine for now.<\/p>\n\n\n\n Initialize NSS database;<\/p>\n\n\n\n Import the client’s PKCS#12 X.509 certificate files into the NSS database;<\/p>\n\n\n\n Do the same on the other client host. Press ENTER to skip the PCKS12 password.<\/p>\n\n\n\n You can list available certificates on the client host;<\/p>\n\n\n\n Sample command output;<\/p>\n\n\n\n Start IPSec and enable it to run on system boot.<\/p>\n\n\n\n Check the status;<\/p>\n\n\n\n From the status output, you can check assigned IP address, INTERNAL_IP4_ADDRESS 10.0.8.10<\/strong>.<\/p>\n\n\n\n Check the status on the other remote host as well;<\/p>\n\n\n\n You can also use the command below to check the status;<\/p>\n\n\n\n On my other client host, INTERNAL_IP4_ADDRESS 10.0.8.11<\/strong>.<\/p>\n\n\n\n Load the connection on each client host;<\/p>\n\n\n\n Establish the tunnel by bringing up the connection on each host;<\/p>\n\n\n\n Sample connection output;<\/p>\n\n\n\n From each host, ping the VPN assigned IP address of the other.<\/p>\n\n\n\n On the other host;<\/p>\n\n\n\n The two remote hosts can now communicate via IPsec VPN server.<\/p>\n\n\n\n And that concludes our guide on how to install and configure Libreswan IPSec VPN client on Ubuntu\/Debian Systems.<\/p>\n\n\n\n Read more on Libreswan Configuration Examples page<\/a>.<\/p>\n\n\n\n Configure OpenVPN Clients to use specific DNS Server<\/a><\/p>\n\n\n\nIP<\/code>\u00a0address, such as laptops. These are authenticated using certificates.<\/em><\/p>\n\n\n\n
Install and Configure Libreswan VPN Client on Ubuntu\/Debian Systems<\/h2>\n\n\n\n
janedoe.kifarunix-demo.com<\/code> and
johndoe.kifarunix-demo.com<\/code>.<\/p>\n\n\n\n
Install Libreswan on Ubuntu\/Debian systems<\/h3>\n\n\n\n
apt update<\/code><\/pre>\n\n\n\n
apt install libreswan<\/code><\/pre>\n\n\n\n
Configuring Libreswan Client on Ubuntu\/Debian<\/h3>\n\n\n\n
vim \/etc\/ipsec.d\/johndoe.conf<\/code><\/pre>\n\n\n\n
conn vpn.kifarunix-demo.com\n\tleft=%defaultroute\n\tleftcert=johndoe.kifarunix-demo.com\n\tleftid=%fromcert\n\tleftrsasigkey=%cert\n\tleftsubnet=0.0.0.0\/0 \n\tleftmodecfgclient=yes\n\tright=vpn.kifarunix-demo.com\n\trightsubnet=0.0.0.0\/0 \n\trightid=@vpn.kifarunix-demo.com\n\trightrsasigkey=%cert\n\tnarrowing=yes\n\tikev2=insist\n\trekey=yes\n\tfragmentation=yes\n\tmobike=no\n\tauto=start\n<\/code><\/pre>\n\n\n\n
vim \/etc\/ipsec.d\/janedoe.conf<\/code><\/pre>\n\n\n\n
conn vpn.kifarunix-demo.com\n\tleft=%defaultroute\n\tleftcert=janedoe.kifarunix-demo.com\n\tleftid=%fromcert\n\tleftrsasigkey=%cert\n\tleftsubnet=0.0.0.0\/0 \n\tleftmodecfgclient=yes\n\tright=vpn.kifarunix-demo.com\n\trightsubnet=0.0.0.0\/0 \n\trightid=@vpn.kifarunix-demo.com\n\trightrsasigkey=%cert\n\tnarrowing=yes\n\tikev2=insist\n\trekey=yes\n\tfragmentation=yes\n\tmobike=no\n\tauto=start\n<\/code><\/pre>\n\n\n\n
\/usr\/lib\/ipsec\/addconn --config \/etc\/ipsec.conf --checkconfig<\/code><\/pre>\n\n\n\n
\/usr\/libexec\/ipsec\/addconn --config \/etc\/ipsec.conf --checkconfig<\/code><\/pre>\n\n\n\n
ipsec verify<\/code><\/pre>\n\n\n\n
\nVerifying installed system and configuration files\n\nVersion check and ipsec on-path \t[OK]\nLibreswan 4.3 (netkey) on 5.10.0-8-amd64\nChecking for IPsec support in kernel \t[OK]\n NETKEY: Testing XFRM related proc values\n ICMP default\/send_redirects \t[NOT DISABLED]\n\n Disable \/proc\/sys\/net\/ipv4\/conf\/*\/send_redirects or XFRM\/NETKEY will act on or cause sending of bogus ICMP redirects!\n\n ICMP default\/accept_redirects \t[NOT DISABLED]\n\n Disable \/proc\/sys\/net\/ipv4\/conf\/*\/accept_redirects or XFRM\/NETKEY will act on or cause sending of bogus ICMP redirects!\n\n XFRM larval drop \t[OK]\nPluto ipsec.conf syntax \t[OK]\nChecking rp_filter \t[OK]\nChecking that pluto is running \t[FAILED]\nChecking 'ip' command \t[OK]\nChecking 'iptables' command \t[OK]\nChecking 'prelink' command does not interfere with FIPS\t[OK]\nChecking for obsolete ipsec.conf options \t[OK]\n\nipsec verify: encountered 4 errors - see 'man ipsec_verify' for help\n<\/code><\/pre>\n\n\n\n
echo \"net.ipv4.conf.default.accept_redirects = 0 \nnet.ipv4.conf.default.send_redirects = 0\" >> \/etc\/sysctl.conf<\/code><\/pre>\n\n\n\n
sysctl -p<\/code><\/pre>\n\n\n\n
ipsec verify<\/code><\/pre>\n\n\n\n
\nVerifying installed system and configuration files\n\nVersion check and ipsec on-path \t[OK]\nLibreswan 4.3 (netkey) on 5.10.0-8-amd64\nChecking for IPsec support in kernel \t[OK]\n NETKEY: Testing XFRM related proc values\n ICMP default\/send_redirects \t[OK]\n ICMP default\/accept_redirects \t[OK]\n XFRM larval drop \t[OK]\nPluto ipsec.conf syntax \t[OK]\nChecking rp_filter \t[OK]\nChecking that pluto is running \t[FAILED]\nChecking 'ip' command \t[OK]\nChecking 'iptables' command \t[OK]\nChecking 'prelink' command does not interfere with FIPS\t[OK]\nChecking for obsolete ipsec.conf options \t[OK]\n\nipsec verify: encountered 2 errors - see 'man ipsec_verify' for help\n<\/code><\/pre>\n\n\n\n
sudo ipsec checknss<\/code><\/pre>\n\n\n\n
sudo ipsec import janedoe.kifarunix-demo.com.p12<\/code><\/pre>\n\n\n\n
Enter password for PKCS12 file: ENTER<\/strong>\npk12util: PKCS12 IMPORT SUCCESSFUL\ncorrecting trust bits for Kifarunix-demo CA<\/code><\/pre>\n\n\n\n
sudo certutil -L -d sql:\/var\/lib\/ipsec\/nss<\/code><\/pre>\n\n\n\n
\n\nCertificate Nickname Trust Attributes\n SSL,S\/MIME,JAR\/XPI\n\njohndoe.kifarunix-demo.com u,u,u\nKifarunix-demo CA CT,, \n<\/code><\/pre>\n\n\n\n
sudo systemctl start ipsec<\/code><\/pre>\n\n\n\n
systemctl status ipsec<\/code><\/pre>\n\n\n\n
\n\u25cf ipsec.service - Internet Key Exchange (IKE) Protocol Daemon for IPsec\n Loaded: loaded (\/lib\/systemd\/system\/ipsec.service; disabled; vendor preset: disabled)\n Active: active (running) since Fri 2022-04-15 06:07:16 UTC; 24s ago\n Docs: man:ipsec(8)\n man:pluto(8)\n man:ipsec.conf(5)\n Process: 2952 ExecStartPre=\/usr\/lib\/ipsec\/addconn --config \/etc\/ipsec.conf --checkconfig (code=exited, status=0\/SUCCESS)\n Process: 2953 ExecStartPre=\/usr\/lib\/ipsec\/_stackmanager start (code=exited, status=0\/SUCCESS)\n Process: 3441 ExecStartPre=\/usr\/sbin\/ipsec --checknss (code=exited, status=0\/SUCCESS)\n Process: 3442 ExecStartPre=\/usr\/sbin\/ipsec --checknflog (code=exited, status=0\/SUCCESS)\n Main PID: 3456 (pluto)\n Status: \"Startup completed.\"\n Tasks: 3 (limit: 2282)\n Memory: 6.5M\n CGroup: \/system.slice\/ipsec.service\n \u2514\u25003456 \/usr\/lib\/ipsec\/pluto --leak-detective --config \/etc\/ipsec.conf --nofork\n\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: loading root certificate cache\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: certificate verified OK: O=Kifarunix-demo,CN=vpn.kifarunix-demo.com\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'CN=vpn.kifarunix-demo.com, O=Kifarunix-demo'\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: Authenticated using RSA\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: received INTERNAL_IP4_ADDRESS 10.0.8.10\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: received INTERNAL_IP4_DNS 8.8.8.8\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: received INTERNAL_IP4_DNS 10.0.8.1\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: up-client output: updating resolvconf\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: negotiated connection [10.0.8.10-10.0.8.10:0-65535 0] -> [0.0.0.0-255.255.255.255:0-655>\nApr 15 06:07:16 ubuntu20 pluto[3456]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP\/NAT=>0x7458cc33 <0x84f3773d xfr>\n<\/code><\/pre>\n\n\n\n
systemctl status ipsec<\/code><\/pre>\n\n\n\n
\n\u25cf ipsec.service - Internet Key Exchange (IKE) Protocol Daemon for IPsec\n Loaded: loaded (\/lib\/systemd\/system\/ipsec.service; disabled; vendor preset: disabled)\n Active: active (running) since Fri 2022-04-15 10:28:01 EAT; 46s ago\n Docs: man:ipsec(8)\n man:pluto(8)\n man:ipsec.conf(5)\n Process: 2767 ExecStartPre=\/usr\/libexec\/ipsec\/addconn --config \/etc\/ipsec.conf --checkconfig (code=exited, status=0\/SUCCESS)\n Process: 2768 ExecStartPre=\/usr\/libexec\/ipsec\/_stackmanager start (code=exited, status=0\/SUCCESS)\n Process: 3005 ExecStartPre=\/usr\/sbin\/ipsec --checknss (code=exited, status=0\/SUCCESS)\n Process: 3006 ExecStartPre=\/usr\/sbin\/ipsec --checknflog (code=exited, status=0\/SUCCESS)\n Main PID: 3017 (pluto)\n Status: \"Startup completed.\"\n Tasks: 3 (limit: 4679)\n Memory: 3.6M\n CPU: 436ms\n CGroup: \/system.slice\/ipsec.service\n \u2514\u25003017 \/usr\/libexec\/ipsec\/pluto --leak-detective --config \/etc\/ipsec.conf --nofork\n\nApr 15 10:28:01 debian11 pluto[3017]: loading root certificate cache\nApr 15 10:28:01 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #1: certificate verified OK: O=Kifarunix-demo,CN=vpn.kifarunix-demo.com\nApr 15 10:28:01 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #1: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'CN=vpn.kifarunix-demo.com, O=Kifarunix-demo'\nApr 15 10:28:01 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #1: authenticated using RSA with SHA1\nApr 15 10:28:01 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: received INTERNAL_IP4_ADDRESS 10.0.8.11\nApr 15 10:28:01 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: received INTERNAL_IP4_DNS 8.8.8.8\nApr 15 10:28:01 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: received INTERNAL_IP4_DNS 10.0.8.1\nApr 15 10:28:02 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: up-client output: updating resolvconf\nApr 15 10:28:02 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: negotiated connection [10.0.8.11-10.0.8.11:0-65535 0] -> [0.0.0.0-255.255.255.255:0-655>\nApr 15 10:28:02 debian11 pluto[3017]: \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #2: IPsec SA established tunnel mode {ESPinUDP=>0x6281339e <0xfe11f33f xfrm=AES_GCM_16_256->\n<\/code><\/pre>\n\n\n\n
ipsec status<\/code><\/pre>\n\n\n\n
\n000 using kernel interface: netkey\n000 interface lo\/lo ::1@500\n000 interface lo\/lo 127.0.0.1@4500\n000 interface lo\/lo 127.0.0.1@500\n000 interface enp0s3\/enp0s3 10.0.2.15@4500\n000 interface enp0s3\/enp0s3 10.0.2.15@500\n000 interface enp0s8\/enp0s8 192.168.56.104@4500\n000 interface enp0s8\/enp0s8 192.168.56.104@500\n000 interface enp0s8\/enp0s8 192.168.56.120@4500\n000 interface enp0s8\/enp0s8 192.168.56.120@500\n000 interface enp0s9\/enp0s9 192.168.57.6@4500\n000 interface enp0s9\/enp0s9 192.168.57.6@500\n000 interface enp0s9\/enp0s9 192.168.57.7@4500\n000 interface enp0s9\/enp0s9 192.168.57.7@500\n000 \n000 \n000 fips mode=disabled;\n000 SElinux=disabled\n000 seccomp=unsupported\n000 \n000 config setup options:\n000 \n000 configdir=\/etc, configfile=\/etc\/ipsec.conf, secrets=\/etc\/ipsec.secrets, ipsecdir=\/etc\/ipsec.d\n000 nssdir=\/var\/lib\/ipsec\/nss, dumpdir=\/run\/pluto, statsbin=unset\n000 dnssec-rootkey-file=\/usr\/share\/dns\/root.key, dnssec-trusted=
sudo ipsec auto --add vpn.kifarunix-demo.com<\/code><\/pre>\n\n\n\n
sudo ipsec auto --up vpn.kifarunix-demo.com<\/code><\/pre>\n\n\n\n
\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #3: initiating v2 parent SA\n133 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #3: initiate\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43: constructed local IKE proposals for vpn.kifarunix-demo.com (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 (default)\n133 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #3: STATE_PARENT_I1: sent v2I1, expected v2R1\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #3: Received unauthenticated INVALID_KE_PAYLOAD response to DH MODP2048; resending with suggested DH DH19\n133 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #3: STATE_PARENT_I1: sent v2I1, expected v2R1\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43: constructed local ESP\/AH proposals for vpn.kifarunix-demo.com (IKE SA initiator emitting ESP\/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED 5:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA1_96;ESN=DISABLED (default)\n134 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n\/a prf=HMAC_SHA2_512 group=DH19}\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: certificate verified OK: O=Kifarunix-demo,CN=vpn.kifarunix-demo.com\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'CN=vpn.kifarunix-demo.com, O=Kifarunix-demo'\n003 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: Authenticated using RSA\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: received INTERNAL_IP4_ADDRESS 10.0.8.10\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: received INTERNAL_IP4_DNS 8.8.8.8\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: received INTERNAL_IP4_DNS 10.0.8.1\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: up-client output: updating resolvconf\n002 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: negotiated connection [10.0.8.10-10.0.8.10:0-65535 0] -> [0.0.0.0-255.255.255.255:0-65535 0]\n004 \"vpn.kifarunix-demo.com\"[1] 192.168.58.43 #4: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP\/NAT=>0x882f7889 <0xf418dbb8 xfrm=AES_GCM_16_256-NONE NATOA=none NATD=192.168.58.43:4500 DPD=passive}\n<\/code><\/pre>\n\n\n\n
ping 10.0.8.11 -c 4<\/code><\/pre>\n\n\n\n
PING 10.0.8.11 (10.0.8.11) 56(84) bytes of data.\n64 bytes from 10.0.8.11: icmp_seq=1 ttl=63 time=2.82 ms\n64 bytes from 10.0.8.11: icmp_seq=2 ttl=63 time=2.84 ms\n64 bytes from 10.0.8.11: icmp_seq=3 ttl=63 time=3.06 ms\n64 bytes from 10.0.8.11: icmp_seq=4 ttl=63 time=2.83 ms\n\n--- 10.0.8.11 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3010ms\nrtt min\/avg\/max\/mdev = 2.820\/2.888\/3.060\/0.099 ms\n<\/code><\/pre>\n\n\n\n
ping 10.0.8.10 -c 4<\/code><\/pre>\n\n\n\n
PING 10.0.8.10 (10.0.8.10) 56(84) bytes of data.\n64 bytes from 10.0.8.10: icmp_seq=1 ttl=63 time=1.63 ms\n64 bytes from 10.0.8.10: icmp_seq=2 ttl=63 time=2.38 ms\n64 bytes from 10.0.8.10: icmp_seq=3 ttl=63 time=3.18 ms\n64 bytes from 10.0.8.10: icmp_seq=4 ttl=63 time=2.86 ms\n\n--- 10.0.8.10 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3005ms\nrtt min\/avg\/max\/mdev = 1.631\/2.516\/3.187\/0.588 ms\n<\/code><\/pre>\n\n\n\n
Other Tutorials<\/h3>\n\n\n\n