Annotation of embedaddon/strongswan/conf/plugins/eap-radius.opt, revision 1.1

1.1     ! misho       1: charon.plugins.eap-radius.accounting = no
        !             2:        Send RADIUS accounting information to RADIUS servers.
        !             3: 
        !             4: charon.plugins.eap-radius.accounting_close_on_timeout = yes
        !             5:        Close the IKE_SA if there is a timeout during interim RADIUS accounting
        !             6:        updates.
        !             7: 
        !             8: charon.plugins.eap-radius.accounting_interval = 0
        !             9:        Interval in seconds for interim RADIUS accounting updates, if not specified
        !            10:        by the RADIUS server in the Access-Accept message.
        !            11: 
        !            12: charon.plugins.eap-radius.accounting_requires_vip = no
        !            13:        If enabled, accounting is disabled unless an IKE_SA has at least one
        !            14:        virtual IP. Only for IKEv2, for IKEv1 a virtual IP is strictly necessary.
        !            15: 
        !            16: charon.plugins.eap-radius.accounting_send_class = no
        !            17:        If enabled, adds the Class attributes received in Access-Accept message to
        !            18:        the RADIUS accounting messages.
        !            19: 
        !            20: charon.plugins.eap-radius.class_group = no
        !            21:        Use class attributes in Access-Accept messages as group membership
        !            22:        information.
        !            23: 
        !            24:        Use the _class_ attribute sent in the RADIUS-Accept message as group
        !            25:        membership information that is compared to the groups specified in the
        !            26:        **rightgroups** option in **ipsec.conf**(5).
        !            27: 
        !            28: charon.plugins.eap-radius.close_all_on_timeout = no
        !            29:        Closes all IKE_SAs if communication with the RADIUS server times out. If it
        !            30:        is not set only the current IKE_SA is closed.
        !            31: 
        !            32: charon.plugins.eap-radius.dae.enable = no
        !            33:        Enables support for the Dynamic Authorization Extension (RFC 5176).
        !            34: 
        !            35: charon.plugins.eap-radius.dae.listen = 0.0.0.0
        !            36:        Address to listen for DAE messages from the RADIUS server.
        !            37: 
        !            38: charon.plugins.eap-radius.dae.port = 3799
        !            39:        Port to listen for DAE requests.
        !            40: 
        !            41: charon.plugins.eap-radius.dae.secret
        !            42:        Shared secret used to verify/sign DAE messages. If set, make sure to adjust
        !            43:        the permissions of the config file accordingly.
        !            44: 
        !            45: charon.plugins.eap-radius.eap_start = no
        !            46:        Send EAP-Start instead of EAP-Identity to start RADIUS conversation.
        !            47: 
        !            48: charon.plugins.eap-radius.filter_id = no
        !            49:        Use filter_id attribute as group membership information.
        !            50: 
        !            51:        If the RADIUS _tunnel_type_ attribute with value **ESP** is received, use
        !            52:        the _filter_id_ attribute sent in the RADIUS-Accept message as group
        !            53:        membership information that is compared to the groups specified in the
        !            54:        **rightgroups** option in **ipsec.conf**(5).
        !            55: 
        !            56: charon.plugins.eap-radius.forward.ike_to_radius
        !            57:        RADIUS attributes to be forwarded from IKEv2 to RADIUS.
        !            58: 
        !            59:        RADIUS attributes to be forwarded from IKEv2 to RADIUS (can be defined by
        !            60:        name or attribute number, a colon can be used to specify vendor-specific
        !            61:        attributes, e.g. Reply-Message, or 11, or 36906:12).
        !            62: 
        !            63: charon.plugins.eap-radius.forward.radius_to_ike =
        !            64:        Same as ike_to_radius but from RADIUS to IKEv2.
        !            65: 
        !            66:        Same as _charon.plugins.eap-radius.forward.ike_to_radius_ but from RADIUS to
        !            67:        IKEv2, a strongSwan specific private notify (40969) is used to transmit the
        !            68:        attributes.
        !            69: 
        !            70: charon.plugins.eap-radius.id_prefix
        !            71:        Prefix to EAP-Identity, some AAA servers use a IMSI prefix to select the
        !            72:        EAP method.
        !            73: 
        !            74: charon.plugins.eap-radius.nas_identifier = strongSwan
        !            75:        NAS-Identifier to include in RADIUS messages.
        !            76: 
        !            77: charon.plugins.eap-radius.port = 1812
        !            78:        Port of RADIUS server (authentication).
        !            79: 
        !            80: charon.plugins.eap-radius.secret =
        !            81:        Shared secret between RADIUS and NAS. If set, make sure to adjust the
        !            82:        permissions of the config file accordingly.
        !            83: 
        !            84: charon.plugins.eap-radius.server =
        !            85:        IP/Hostname of RADIUS server.
        !            86: 
        !            87: charon.plugins.eap-radius.retransmit_base = 1.4
        !            88:        Base to use for calculating exponential back off.
        !            89: 
        !            90: charon.plugins.eap-radius.retransmit_timeout = 2.0
        !            91:        Timeout in seconds before sending first retransmit.
        !            92: 
        !            93: charon.plugins.eap-radius.retransmit_tries = 4
        !            94:        Number of times to retransmit a packet before giving up.
        !            95: 
        !            96: charon.plugins.eap-radius.servers {}
        !            97:        Section to specify multiple RADIUS servers.
        !            98: 
        !            99:        Section to specify multiple RADIUS servers. The **nas_identifier**,
        !           100:        **secret**, **sockets** and **port** (or **auth_port**) options can be
        !           101:        specified for each server. A server's IP/Hostname can be configured using
        !           102:        the **address** option. The **acct_port** [1813] option can be used to
        !           103:        specify the port used for RADIUS accounting. For each RADIUS server a
        !           104:        priority can be specified using the **preference** [0] option. The
        !           105:        retransmission time for each server can set set using **retransmit_base**,
        !           106:        **retransmit_timeout** and **retransmit_tries**.
        !           107: 
        !           108: charon.plugins.eap-radius.sockets = 1
        !           109:        Number of sockets (ports) to use, increase for high load.
        !           110: 
        !           111: charon.plugins.eap-radius.station_id_with_port = yes
        !           112:        Whether to include the UDP port in the Called- and Calling-Station-Id
        !           113:        RADIUS attributes.
        !           114: 
        !           115: charon.plugins.eap-radius.xauth {}
        !           116:        Section to configure multiple XAuth authentication rounds via RADIUS.
        !           117: 
        !           118:        Section to configure multiple XAuth authentication rounds via RADIUS.
        !           119:        The subsections define so called authentication profiles with arbitrary
        !           120:        names. In each profile section one or more XAuth types can be configured,
        !           121:        with an assigned message. For each type a separate XAuth exchange will be
        !           122:        initiated and all replies get concatenated into the User-Password attribute,
        !           123:        which then gets verified over RADIUS.
        !           124: 
        !           125:        Available XAuth types are **password**, **passcode**, **nextpin**, and
        !           126:        **answer**. This type is not relevant to strongSwan or the AAA server, but
        !           127:        the client may show a different dialog (along with the configured message).
        !           128: 
        !           129:        To use the configured profiles, they have to be configured in the respective
        !           130:        connection in **ipsec.conf**(5) by appending the profile name, separated by
        !           131:        a colon, to the **xauth-radius** XAauth backend configuration in _rightauth_
        !           132:        or _rightauth2_, for instance, _rightauth2=xauth-radius:profile_.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>