Command option Sample:ip xfrm

Search command sample in the internet.It is the result.

ip xfrm - setting xfrm    Linux and Unix ip command - CSDNq : http://blog.csdn.net/lee244868149/article/details/46300485
ip xfrm IPsec    Core Utilities - ArchWiki : http://archive.fo/rdd9R
ip xfrm manage IPsec policies ip-xfrm(8)    VPN over SSH - ArchWiki : http://wiki.archlinux.org/index.php/core_utilities
ip xfrm manage IPsec policies man 8 ip-xfrm    Core Utilities - ParabolaWiki : http://wiki.parabola.nu/Core_Utilities
ip xfrm setting xfrm    Linux Network Interfaces [OpenWrt Wiki] : http://wiki.openwrt.org/doc/networking/network.interfaces
ip xfrm \    Experimentation with Linux XFRM : http://www.lorier.net/docs/xfrm.html
ip xfrm \item ss investigates sockets \end : http://www.wplug.org/mediawiki/images/b/ba/Iproute2tutorial.tex.txt
IP XFRM BROKEN]     Configuring IPsec for Greenplum Database | Pivotal Greenplum Database Docs : http://gpdb.docs.pivotal.io/43180/admin_guide/topics/ipsec.html
ip xfrm count PTYPE " := " " [ " main "    Man page 8 : ip : http://man.developpez.com/man8/ip/
ip xfrm count    route(8): show/change IP routing table - Linux man page : http://linux.die.net/man/8/ip
ip xfrm for ipsec testing     [LTP] [PATCH v5 0/3] networking/stress/icmp: add ip xfrm ipsec support : http://lists.linux.it/pipermail/ltp/2016-April/001582.html
ip xfrm ipsec support     [LTP] [PATCH v5 0/3] networking/stress/icmp: add ip xfrm ipsec support : http://lists.linux.it/pipermail/ltp/2016-April/001582.html
ip xfrm is     [LTP] [PATCH v5 0/3] networking/stress/icmp: add ip xfrm ipsec support : http://lists.linux.it/pipermail/ltp/2016-April/001582.html
ip xfrm limit in iproute2 for ipsec    ip xfrm limit in iproute2 for ipsec - Information Security Stack Exchange : http://security.stackexchange.com/questions/91835/ip-xfrm-limit-in-iproute2-for-ipsec
ip xfrm Man Page - Bash - SS64.com    Xfrm : http://www.cleanerbar.com/cb/xfrm/
IP XFRM message output between iproute versions     Configuring IPsec for Greenplum Database | Pivotal Greenplum Database Docs : http://gpdb.docs.pivotal.io/43180/admin_guide/topics/ipsec.html
ip xfrm monitor - state monitoring for xfrm objects    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm monitor state monitoring for xfrm objects    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm monitor [ all-nsid ] [ all    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm monitor [ all    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm monitor acquire    Linux-Kernel Archive: [BUG] problems with "ip xfrm" on 32-bit userspace with 64-bit kernel : http://lkml.iu.edu/hypermail/linux/kernel/1010.2/02430.html
ip xfrm monitor as    IPsec Tools / Mailing Lists : http://sourceforge.net/p/ipsec-tools/mailman/message/31334264/
ip xfrm monitor    Gentoo Forums :: View topic - VPN Client not connecting [SOLVED] : http://forums.gentoo.org/viewtopic-t-998042-start-25.html
ip xfrm pol get src *.*.*.*/24 dst *.*.*.*/24 dir fwd mark 7    xfrm by MARK [LWN.net] : http://lwn.net/Articles/375829/
ip xfrm pol get src *.*.*.*/24 dst *.*.*.*/24 dir fwd    xfrm by MARK [LWN.net] : http://lwn.net/Articles/375829/
ip xfrm pol    How to read status output - Swan : http://libreswan.org/wiki/How_to_read_status_output
ip xfrm policy ( ON SF1)    How to Create an IP Tunnel - Sophos Community : http://community.sophos.com/kb/it-it/117426
ip xfrm policy add \    IPsec_with_ip_command.md GitHub : http://gist.github.com/nojima/3a3d911d11194a540948d09826713731
ip xfrm policy add dir fwd src 2003::/112 dst 2002::/112 tmpl src 2001:0::2 dst 2001:0::1 proto esp mode tunnel    ipsec | Windancer - Stairway to ...Heaven? : http://windancersth.wordpress.com/tag/ipsec/
ip xfrm policy add dir in src *.*.*.* dst *.*.*.* ptype main action allow priority 2080 tmpl src *.*.*.* dst *.*.*.* proto esp reqid 16385 mode transport    IPSEC/L2TP VPN on Ubuntu 12.10 with OpenSwan, xl2tpd and ppp – lowendguide.com : http://www.lowendguide.com/3/networking/ipsecl2tp-vpn-on-ubuntu-12-10-with-openswan-xl2tpd-and-ppp/
ip xfrm policy add dir in src *.*.*.* dst *.*.*.* ptype main    IPsec Tools / Mailing Lists : http://sourceforge.net/p/ipsec-tools/mailman/message/31334264/
ip xfrm policy add dir in src *.*.*.* dst *.*.*.* ptype main action allow priority 2080 tmpl src *.*.*.* dst *.*.*.* proto esp reqid 16385 mode transport    IPSEC/L2TP VPN on Ubuntu 12.10 with OpenSwan, xl2tpd and ppp – lowendguide.com : http://www.lowendguide.com/3/networking/ipsecl2tp-vpn-on-ubuntu-12-10-with-openswan-xl2tpd-and-ppp/
ip xfrm policy add dir in src *.*.*.* dst *.*.*.* ptype main    IPsec Tools / Mailing Lists : http://sourceforge.net/p/ipsec-tools/mailman/message/31334264/
ip xfrm policy add dir in src 2003::/112 dst 2002::/112 tmpl src 2001:0::2 dst 2001:0::1 proto esp mode tunnel    ipsec | Windancer - Stairway to ...Heaven? : http://windancersth.wordpress.com/tag/ipsec/
ip xfrm policy add dir in    Blog : http://blog.croz.net/en/blog/xfrm-programming/
ip xfrm policy add dir out src *.*.*.* dst *.*.*.* ptype main action allow priority 2080 tmpl src *.*.*.* dst *.*.*.* proto esp reqid 16385 mode transport    IPSEC/L2TP VPN on Ubuntu 12.10 with OpenSwan, xl2tpd and ppp – lowendguide.com : http://www.lowendguide.com/3/networking/ipsecl2tp-vpn-on-ubuntu-12-10-with-openswan-xl2tpd-and-ppp/
ip xfrm policy add dir out src *.*.*.* dst *.*.*.* ptype main    IPsec Tools / Mailing Lists : http://sourceforge.net/p/ipsec-tools/mailman/message/31334264/
ip xfrm policy add dir out src *.*.*.* dst *.*.*.* ptype main action allow priority 2080 tmpl src *.*.*.* dst *.*.*.* proto esp reqid 16385 mode transport    IPSEC/L2TP VPN on Ubuntu 12.10 with OpenSwan, xl2tpd and ppp – lowendguide.com : http://www.lowendguide.com/3/networking/ipsecl2tp-vpn-on-ubuntu-12-10-with-openswan-xl2tpd-and-ppp/
ip xfrm policy add dir out src *.*.*.* dst *.*.*.* ptype main    IPsec Tools / Mailing Lists : http://sourceforge.net/p/ipsec-tools/mailman/message/31334264/
ip xfrm policy add dir out src 2002::/112 dst 2003::/112 tmpl src 2001:0::1 dst 2001:0::2 proto esp mode tunnel    ipsec | Windancer - Stairway to ...Heaven? : http://windancersth.wordpress.com/tag/ipsec/
ip xfrm policy add proto tcp sport 873 dport 873 dir in priority 1    linux - ip xfrm policy port - Server Fault : http://serverfault.com/questions/852099/ip-xfrm-policy-port
ip xfrm policy add proto tcp sport 873 dport 873 dir out priority 1    linux - ip xfrm policy port - Server Fault : http://serverfault.com/questions/852099/ip-xfrm-policy-port
ip xfrm policy add SELECTOR dir DIR [LIMITS] [TEMPLATES]    Experimentation with Linux XFRM : http://www.lorier.net/docs/xfrm.html
ip xfrm policy add src *.*.*.*/0 dst *.*.*.*/0 dir in mark 12 tmpl src    Configuring a VPN Connection Using a Linux Machine as a Router - Documentation - Outscale - Confluence : http://wiki.outscale.net/display/DOCU/Configuring+a+VPN+Connection+Using+a+Linux+Machine+as+a+Router
ip xfrm policy add src *.*.*.*/0 dst *.*.*.*/0 dir out mark 12 tmpl src    Configuring a VPN Connection Using a Linux Machine as a Router - Documentation - Outscale - Confluence : http://wiki.outscale.net/display/DOCU/Configuring+a+VPN+Connection+Using+a+Linux+Machine+as+a+Router
ip xfrm policy add src *.*.*.*/0 dst *.*.*.*/24 dir fwd tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x18fcbfd1 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/0 dst *.*.*.*/24 dir in tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x18fcbfd1 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/0 dst *.*.*.*/24 dir out tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x18fcbfd1 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/0 dst    IPSec/L2TP (racoon+xl2tpd) tomato-shibby Asus RT-N16 - TomatoUSB : http://tomatousb.org/forum/t-625093
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/0 dir fwd tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0xd7d184b1 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/0 dir in tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0xd7d184b1 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/0 dir out tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0xd7d184b1 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir fwd tmpl src *.*.*.* dst *.*.*.* proto esp reqid "0x    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir fwd tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x62502e58 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir in tmpl src *.*.*.* dst *.*.*.* proto esp reqid "0x    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir in tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x62502e58 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir out tmpl src *.*.*.* dst *.*.*.* proto esp reqid "0x    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir out tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x62502e58 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/16 dst *.*.*.*/16 proto any dir fwd ptype main priority 1500    Bug #436: ip xfrm policy creation - strongSwan : http://wiki.strongswan.org/issues/1030
ip xfrm policy add src *.*.*.*/16 dst *.*.*.*/16 proto any dir in ptype main priority 1500    Bug #436: ip xfrm policy creation - strongSwan : http://wiki.strongswan.org/issues/1030
ip xfrm policy add src *.*.*.*/16 dst *.*.*.*/16 proto any dir out ptype main priority 1500    Bug #436: ip xfrm policy creation - strongSwan : http://wiki.strongswan.org/issues/1030
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 proto any dir in ptype main priority 1500    OpenWrt, strongSwan and policy-based routing | Turning it off and on again : http://technik.blogs.nde.ag/2012/09/24/openwrt-strongswan-and-policy-based-routing/
ip xfrm policy add src *.*.*.* dst *.*.*.* proto tcp dir in ptype main priority 2080 tmpl src *.*.*.* dst *.*.*.* proto esp mode transport reqid 16389    networking - Is XFRM IPSec not working for localhost? - Ask Ubuntu : http://askubuntu.com/questions/913645/is-xfrm-ipsec-not-working-for-localhost
ip xfrm policy add src *.*.*.* dst *.*.*.* proto tcp dir out ptype main priority 2080 tmpl src *.*.*.* dst *.*.*.* proto esp mode transport reqid 16389    networking - Is XFRM IPSec not working for localhost? - Ask Ubuntu : http://askubuntu.com/questions/913645/is-xfrm-ipsec-not-working-for-localhost
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir fwd tmpl src *.*.*.* dst *.*.*.* proto esp reqid "0x    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir fwd tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x66a32a19 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir in tmpl src *.*.*.* dst *.*.*.* proto esp reqid "0x    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir in tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x66a32a19 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir out tmpl src *.*.*.* dst *.*.*.* proto esp reqid "0x    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 dir out tmpl src *.*.*.* dst *.*.*.* proto esp reqid 0x66a32a19 mode tunnel    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src *.*.*.*/24 dst *.*.*.*/24 \    xfrm by MARK [LWN.net] : http://lwn.net/Articles/375829/
ip xfrm policy add src *.*.*.* dst *.*.*.* proto gre key 3 dir     Packet encryption based on gre key value with ip xfrm command : http://lists.kernelnewbies.org/pipermail/kernelnewbies/2015-May/014325.html
ip xfrm policy add src    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy add src*.*.*.*/24 dst*.*.*.*/24 proto any dir fwd ptype main priority 1500    OpenWrt, strongSwan and policy-based routing | Turning it off and on again : http://technik.blogs.nde.ag/2012/09/24/openwrt-strongswan-and-policy-based-routing/
ip xfrm policy add src*.*.*.*/24 dst*.*.*.*/24 proto any dir out ptype main priority 1500    OpenWrt, strongSwan and policy-based routing | Turning it off and on again : http://technik.blogs.nde.ag/2012/09/24/openwrt-strongswan-and-policy-based-routing/
ip xfrm policy add    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm policy count - count existing policies    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm policy count count existing policies    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm policy count"     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy count\n")     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy count    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm policy creation    Bug #436: ip xfrm policy creation - strongSwan : http://wiki.strongswan.org/issues/436
ip xfrm policy del    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm policy delete - delete an existing policy    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm policy delete - delete existing policy    Linux and Unix ip command - CSDNq : http://blog.csdn.net/lee244868149/article/details/46300485
ip xfrm policy delete delete an existing policy    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm policy delete    ip - Devtech : http://www.devtech.cz/cs_CZ/knowledge-base/man/man8/ip-2/
ip xfrm policy deleteall - delete all existing xfrm policies    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm policy deleteall - delete all existing xfrm policy    Linux and Unix ip command - CSDNq : http://blog.csdn.net/lee244868149/article/details/46300485
ip xfrm policy deleteall delete all existing xfrm policies    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm policy deleteall delete all existing xfrm policies     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy deleteall    ip - Devtech : http://www.devtech.cz/cs_CZ/knowledge-base/man/man8/ip-2/
ip xfrm policy flush - flush policies    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm policy flush " [ " ptype PTYPE " ] "    Man page 8 : ip : http://man.developpez.com/man8/ip/
ip xfrm policy flush [ ptype PTYPE ]\n")     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy flush [ ptype PTYPE ]    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm policy flush flush policies    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm policy flush flush policies     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy flush    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm policy get - get an existing policy    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm policy get - get existing policy    Linux and Unix ip command - CSDNq : http://blog.csdn.net/lee244868149/article/details/46300485
ip xfrm policy get get an existing policy    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm policy get get an existing policy     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy get    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm policy help    Blog : http://blog.croz.net/en/blog/xfrm-programming/
ip xfrm policy list    Blog : http://blog.croz.net/en/blog/xfrm-programming/
ip xfrm policy ls    xfrm by MARK [LWN.net] : http://lwn.net/Articles/375829/
ip xfrm policy nosock    man: document ip xfrm policy nosock - Patchwork : http://patchwork.ozlabs.org/patch/839269/
ip xfrm policy port    ipsec - How to debug ip xfrm rules - Server Fault : http://serverfault.com/questions/739314/how-to-debug-ip-xfrm-rules
ip xfrm policy restore restore xfrm policies table from stdin     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy restore"     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy save"     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy set [ hthresh4 LBITS RBITS ] [ hthresh6 LBITS RBITS ]\n")     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy set [ hthresh4 LBITS RBITS ] [ hthresh6 LBITS RBITS ]    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm policy set"     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy show"     Exporting IPSec routes to OSPF : http://bird.network.cz/pipermail/bird-users/2013-July/008439.html
ip xfrm policy show: Shows IPsec policies    Linux Neighbouring Subsystem - Linux Kernel Networking: Implementation and Theory (2014) : http://apprize.info/linux/kernel/17.html
ip xfrm policy show    Steve's Blog: Debugging IPSEC : http://blog.nexusuk.org/2015/12/debugging-ipsec.html
ip xfrm policy update - update an existing policy    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm policy update src ::/0 dst ::/0 proto ipv6-icmp type \    Debian IPsec Micro]Howto : http://www.recompile.se/~teddy/debian-ipsec-wheezy
ip xfrm policy update src    Debian IPsec Micro]Howto : http://www.recompile.se/~teddy/debian-ipsec-wheezy
ip xfrm policy update update an existing policy    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm policy update    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm policy" "    man: document ip xfrm policy nosock - Patchwork : http://patchwork.ozlabs.org/patch/839269/
ip xfrm policy"     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy: add save/restore     [CRIU] [PATCH 4/6] ip xfrm policy: add save/restore : http://lists.openvz.org/pipermail/criu/2016-September/031366.html
ip xfrm policy    *.*.*.*. R}h - Red Hat Customer Portal : http://access.redhat.com/documentation/ja-jp/red_hat_enterprise_linux/6/html/security_guide/ch02s07s02s02
ip xfrm rules    ipsec - How to debug ip xfrm rules - Server Fault : http://serverfault.com/questions/739314/how-to-debug-ip-xfrm-rules
ip xfrm security context patches    iproute-2.6.32-54.el6.x86_64 RPM : http://rpmfind.net/linux/RPM/centos/6.9/x86_64/Packages/iproute-2.6.32-54.el6.x86_64.html
ip xfrm show     More IPSEC routes for OSPF : http://bird.network.cz/pipermail/bird-users/2013-November/008731.html
ip xfrm spits out)    Experimentation with Linux XFRM : http://www.lorier.net/docs/xfrm.html
ip xfrm state'    IT Blogtorials: Decrypt IPsec packets - Linux to Cisco VPN : http://ithitman.blogspot.com/2012/05/how-to-decrypt-ipsec-packets.html
ip xfrm state --- for windows    How can I decrypt IKEv1 and/or ESP packets ? - Wireshark Q&A : http://osqa-ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets
ip xfrm state ( On SF 1)    How to Create an IP Tunnel - Sophos Community : http://community.sophos.com/kb/it-it/117426
ip xfrm state :    How to read status output - Swan : http://libreswan.org/wiki/How_to_read_status_output
ip xfrm state add - add new state into xfrm    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state add - Stack Overflow    Xfrm : http://www.cleanerbar.com/cb/xfrm/
ip xfrm state add \    IPsec_with_ip_command.md GitHub : http://gist.github.com/nojima/3a3d911d11194a540948d09826713731
ip xfrm state add add new state into xfrm    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state add crashes when supplied an algo    Bug #1611444 gCannot share a namespaces created with 'ip netns' ...h : Bugs : Snappy : http://bugs.launchpad.net/bugs/1220782
ip xfrm state add src *.*.*.* dst *.*.*.* spi 42 proto esp mode tunnel aead 'rfc4106(gcm(aes))' 0x0000000000000000000000000000000000000001 128 sel src *.*.*.* dst *.*.*.*    Troubleshooting cross host communication - SOLVED - Rancher - Rancher Forums : http://forums.rancher.com/t/troubleshooting-cross-host-communication-solved/6105
ip xfrm state add src *.*.*.* dst *.*.*.* spi 42 proto esp mode tunnel aead "rfc4106(gcm(aes))" 0x0000000000000000000000000000000000000001 128 sel src *.*.*.* dst *.*.*.*    Troubleshooting cross host communication - SOLVED - Rancher - Rancher Forums : http://forums.rancher.com/t/troubleshooting-cross-host-communication-solved/6105
ip xfrm state add src *.*.*.* dst *.*.*.* proto comp spi 1 mode tunnel comp deflate 0x     [LTP] [PATCH v5 0/3] networking/stress/icmp: add ip xfrm ipsec support : http://lists.linux.it/pipermail/ltp/2016-April/001582.html
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 123456 sel src *.*.*.* dst *.*.*.* enc blowfish 0xaabbccddee    linux - Purpose of the selector in ip xfrm state add - Stack Overflow : http://stackoverflow.com/questions/20205536/purpose-of-the-selector-in-ip-xfrm-state-add
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 0xcb9cfc0c mode transport reqid 16389 replay-window 32 auth sha1 0xd2194aa97972a9e1a3c78c636d291af1d9e5bddc enc aes 0xeeadc60ef6a06f22a94e3779ca6ca72ab1389a03e1ac80c58428142ca55d315c    networking - Is XFRM IPSec not working for localhost? - Ask Ubuntu : http://askubuntu.com/questions/913645/is-xfrm-ipsec-not-working-for-localhost
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 0x00127764 reqid 0xd7d184b1 mode tunnel auth sha256 0x8dcce7d80f7c8bb81e6a526b9d5d7ce2e7a474e3406c40953108b6d92b61cb77 enc aes 0xf9d41041fc014b94d602ed051800601464cdbc525847d5894ed03f55b8b5e78c    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 0xfd51141e reqid 0x62502e58 mode tunnel auth sha256 0x4046c2f9ff22725b850e2d981968249dc6c25fba189e701cf9a14e921f91cffb enc aes 0xccd80053ae1b55113a89bc476d0de1d9e8b7bc94655f3af1b0dad7bb9ada1065    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc "cbc(aes)" "0x112202030405060708090a0b0c0d0e0f"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc "cbc(aes)" "0x112202030405060708090a0b0c0d0e0f112202030405060708090a0b0c0d0e0f"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc "cbc(des)" "0x1122020304050607"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc "cbc(des3_ede)" "0x112202030405060708090a0b0c0d0e0f0001020304050607"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc "rfc3686(ctr(aes))" "0x112202030405060708090a0b0c0d0e0f00000000"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc "rfc3686(ctr(aes))" "0x112202030405060708090a0b0c0d0e0f112202030405060708090a0b0c0d0e0f00000000"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc cipher_null "" auth-trunc "hmac(md5)" "0x1122" 96    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc cipher_null "" auth "hmac(md5)" "0x1122"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc cipher_null "" auth "hmac(sha1)" "0x1122"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1122" reqid "0x1" mode tunnel enc cipher_null "" auth "hmac(sha256)" "0x1122"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc "cbc(aes)" "0x111102030405060708090a0b0c0d0e0f"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc "cbc(aes)" "0x111102030405060708090a0b0c0d0e0f111102030405060708090a0b0c0d0e0f"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc "cbc(des)" "0x1111020304050607"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc "cbc(des3_ede)" "0x111102030405060708090a0b0c0d0e0f0001020304050607"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc "rfc3686(ctr(aes))" "0x111102030405060708090a0b0c0d0e0f00000000"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc "rfc3686(ctr(aes))" "0x111102030405060708090a0b0c0d0e0f111102030405060708090a0b0c0d0e0f00000000"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc cipher_null "" auth-trunc "hmac(md5)" "0x1111" 96    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc cipher_null "" auth "hmac(md5)" "0x1111"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc cipher_null "" auth "hmac(sha1)" "0x1111"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x1111" reqid "0x1" mode tunnel enc cipher_null "" auth "hmac(sha256)" "0x1111"    Script to set up an ipsec tunnel between two machinesFor Example: ./tunnel.sh *.*.*.* *.*.*.* *.*.*.* *.*.*.* would set up an ipsec tunnel over *.*.*.* address using *.*.*.* as a virtual addresspasswordless sudo required for user on remote machine GitHub : http://gist.github.com/vishvananda/7094676
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 0x00000301 mode tunnel mark 7 auth md5 0x96358c90783bbfa3d7b196ceabe0536b enc des3_ede 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df    xfrm by MARK [LWN.net] : http://lwn.net/Articles/375829/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 0x53fa0fdd mode transport reqid 16386 replay-window 32 auth    IPSEC/L2TP VPN on Ubuntu 12.10 with OpenSwan, xl2tpd and ppp – lowendguide.com : http://www.lowendguide.com/3/networking/ipsecl2tp-vpn-on-ubuntu-12-10-with-openswan-xl2tpd-and-ppp/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi    IPsec Tools / Mailing Lists : http://sourceforge.net/p/ipsec-tools/mailman/message/31334264/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 0x53fa0fdd mode transport reqid 16386 replay-window 32 auth    IPSEC/L2TP VPN on Ubuntu 12.10 with OpenSwan, xl2tpd and ppp – lowendguide.com : http://www.lowendguide.com/3/networking/ipsecl2tp-vpn-on-ubuntu-12-10-with-openswan-xl2tpd-and-ppp/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi    IPsec Tools / Mailing Lists : http://sourceforge.net/p/ipsec-tools/mailman/message/31334264/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi "0x    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 0x34e0aac0 reqid 0x66a32a19 mode tunnel auth sha256 0x1caf04f262e889b9b53b6c95bfbb4ef0292616362e8878fe96123610ca000892 enc aes 0x9380e038247fcd893d4f8799389b90bfa4d0b09195495bb94fe3a9fa5c5b699d    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm state add src *.*.*.* dst *.*.*.* proto esp spi 0xec8fe8cb reqid 0x18fcbfd1 mode tunnel auth sha256 0xc1dbbafc0deff6d4bfe0e2736d443d94ffe25ce8637e6f70e3260c87cf8f9724 enc aes 0x6170cd164092554bfd8402c528439c2c3d9823b74b493d9c18ca05a9c3b40a0d    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm state add src 2001:0::1 dst 2001:0::2 proto esp spi 0x2000 enc    ipsec | Windancer - Stairway to ...Heaven? : http://windancersth.wordpress.com/tag/ipsec/
ip xfrm state add src 2001:0::2 dst 2001:0::1 proto esp spi 0x1000 enc    ipsec | Windancer - Stairway to ...Heaven? : http://windancersth.wordpress.com/tag/ipsec/
ip xfrm state add src fe80::/10 dst ff02::3 proto esp spi 1235 mode transport auth sha1 0xAABBCCDDEEFF0010 enc des 0xAABBCCDDEEFF0010    xfrm: Added the auth and enc update support in "state update" - Patchwork : http://patchwork.kernel.org/patch/9608711/
ip xfrm state add src    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm state add    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm state allocspi - allocate an SPI value    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state allocspi - allocate SPI value    Linux and Unix ip command - CSDNq : http://blog.csdn.net/lee244868149/article/details/46300485
ip xfrm state allocspi allocate an SPI value    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state allocspi ID [ mode MODE ] [ mark MARK [ mask MASK ] ] [ reqid REQID ] [ seq SEQ ] [ min SPI max SPI ]    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state allocspi ID [ mode MODE ] [ mark MARK [ mask MASK ] ] [ reqid REQID ] [ seq SEQ ] [ min SPI max    ip - show / manipulate routing, devices, policy routing and tunnels at Linux.org : http://www.linux.org/docs/man8/ip-xfrm.html
ip xfrm state allocspi ID [ mode MODE ] [ mark MARK [ mask MASK ] ] [    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state allocspi ID [ mode MODE ] [ reqid REQID ] [ seq SEQ ] [ min SPI max SPI ]    route(8): show/change IP routing table - Linux man page : http://linux.die.net/man/8/ip
ip xfrm state allocspi ID [ mode MODE ] [ reqid REQID ] [ seq SEQ ]\n")    netdev - [IP] xfrm: Allow replay setting : http://lists.openwall.net/netdev/2008/04/23/14
ip xfrm state allocspi ID [ mode MODE ] [ reqid REQID ] [ seq SEQ ]    Linux and Unix ip command - CSDNq : http://blog.csdn.net/lee244868149/article/details/46300485
ip xfrm state allocspi    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm state count - count all existing state in xfrm    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state count ID := [ src ADDR ] [ dst ADDR ] [ proto XFRM_PROTO ] [ spi SPI ]    ip - Unix, Linux Command : http://www.tutorialspoint.com/unix_commands/ip.htm
ip xfrm state count count all existing state in xfrm    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state count    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state del src *.*.*.* dst *.*.*.* spi 42 proto esp    Troubleshooting cross host communication - SOLVED - Rancher - Rancher Forums : http://forums.rancher.com/t/troubleshooting-cross-host-communication-solved/6105
ip xfrm state del    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm state delete - delete existing state in xfrm    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state delete delete existing state in xfrm    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state deleteall - delete all existing state in xfrm    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state deleteall delete all existing state in xfrm    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state flush - flush all state in xfrm    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state flush [ proto XFRM-PROTO ]    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state flush [ proto XFRM_PROTO ]    route(8): show/change IP routing table - Linux man page : http://linux.die.net/man/8/ip
ip xfrm state flush [ proto    ip - Devtech : http://www.devtech.cz/cs_CZ/knowledge-base/man/man8/ip-2/
ip xfrm state flush flush all state in xfrm    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state flush    “On the fly” IPsec VPN with iproute2 « \1 : http://backreference.org/2014/11/12/on-the-fly-ipsec-vpn-with-iproute2/
ip xfrm state get - get existing state in xfrm    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state get get existing state in xfrm    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state get ID [ mark MARK [ mask MASK ] ]    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm state get mark 7 src *.*.*.* dst *.*.*.* proto esp spi 0x00000301    xfrm by MARK [LWN.net] : http://lwn.net/Articles/375829/
ip xfrm state gives nothing as Luca had mentioned below    Intro to Configure IPsec VPN (Gateway-to-Gateway ) using Strongswan : http://linoxide.com/how-tos/ipsec-vpn-gateway-gateway-using-strongswan/
ip xfrm state list    xfrm: Added the auth and enc update support in "state update" - Patchwork : http://patchwork.kernel.org/patch/9608711/
ip xfrm state show":    Steve's Blog: Debugging IPSEC : http://blog.nexusuk.org/2015/12/debugging-ipsec.html
ip xfrm state show: Shows IPsec states    Linux Neighbouring Subsystem - Linux Kernel Networking: Implementation and Theory (2014) : http://apprize.info/linux/kernel/17.html
ip xfrm state show    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm state update - update existing state in xfrm    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm state update - update existing xfrm state    Linux and Unix ip command - CSDNq : http://blog.csdn.net/lee244868149/article/details/46300485
ip xfrm state update src fe80::/10 dst ff02::3 proto esp spi 1235 mode transport auth sha1 0xAABBCCDDEEFF0015 enc des 0xAABBCCDDEEFF0020    xfrm: Added the auth and enc update support in "state update" - Patchwork : http://patchwork.kernel.org/patch/9608711/
ip xfrm state update update existing state in xfrm    Man page of IP-XFRM : http://finestructure.net/cgi-bin/man/man2html@ip-xfrm+8
ip xfrm state update    netns - GoDoc : http://godoc.org/github.com/vishvananda/netlink
ip xfrm state" from iproute2    missing xfrm_user.ko kernel module : http://forum.tinycorelinux.net/index.php@topic=14495.0
ip xfrm state    *.*.*.*. R}h - Red Hat Customer Portal : http://access.redhat.com/documentation/ja-jp/red_hat_enterprise_linux/6/html/security_guide/ch02s07s02s02
ip xfrm support     MPLS for Linux / iproute2 / [c0c44b] /ChangeLog : http://sourceforge.net/p/mpls-linux/iproute2/ci/master/tree/ChangeLog
ip xfrm vs setkey'    '[strongSwan] ip xfrm vs setkey' thread - MARC : http://marc.info/@t=121268869000006&r=1&w=2
ip xfrm vs setkey strongswa Philip Bellino    '[strongSwan] ip xfrm vs setkey' thread - MARC : http://marc.info/@t=121268869000006&r=1&w=2
ip xfrm vs setkey strongswa Andreas Steffen    '[strongSwan] ip xfrm vs setkey' thread - MARC : http://marc.info/@t=121268869000006&r=1&w=2
ip xfrm vs setkey strongswa Marco Berizzi    '[strongSwan] ip xfrm vs setkey' thread - MARC : http://marc.info/@t=121268869000006&r=1&w=2
ip xfrm XFRM-OBJECT    ip-xfrm - transform configuration - CSDNq : http://blog.csdn.net/dolphin98629/article/details/14523631
ip xfrm XFRM_OBJECT    route(8): show/change IP routing table - Linux man page : http://linux.die.net/man/8/ip

search Google

https://www.google.com/#q=ip xfrm