Annotation of embedaddon/strongswan/src/charon-cmd/charon-cmd.8.in, revision 1.1
1.1 ! misho 1: .TH CHARON\-CMD 8 "2013-06-21" "@PACKAGE_VERSION@" "strongSwan"
! 2: .SH "NAME"
! 3: charon\-cmd \- Simple IKE client (IPsec VPN client)
! 4: .SH SYNOPSIS
! 5: .B charon\-cmd
! 6: .B \-\-host
! 7: .I hostname
! 8: .B \-\-identity
! 9: .I identity
! 10: .B [ options ]
! 11: .PP
! 12: .SH "DESCRIPTION"
! 13: .B charon\-cmd
! 14: is a program for setting up IPsec VPN connections using the Internet Key
! 15: Exchange protocol (IKE) in version 1 and 2. It supports a number of different
! 16: road-warrior scenarios.
! 17: .PP
! 18: Like the IKE daemon
! 19: .BR charon ,
! 20: .B charon\-cmd
! 21: has to be run as
! 22: .B root
! 23: (or more specifically as a user with
! 24: .B CAP_NET_ADMIN
! 25: capability).
! 26: .PP
! 27: Of the following options at least
! 28: .I \-\-host
! 29: and
! 30: .I \-\-identity
! 31: are required. Depending on the selected authentication
! 32: .I profile
! 33: credentials also have to be provided with their respective options.
! 34: .PP
! 35: Many of the
! 36: .BR charon -specific
! 37: configuration options in
! 38: .I strongswan.conf
! 39: also apply to
! 40: .BR charon\-cmd .
! 41: For instance, to configure customized logging to
! 42: .B stdout
! 43: the following snippet can be used:
! 44: .PP
! 45: .EX
! 46: charon-cmd {
! 47: filelog {
! 48: stdout {
! 49: default = 1
! 50: ike = 2
! 51: cfg = 2
! 52: }
! 53: }
! 54: }
! 55: .EE
! 56: .PP
! 57: .SH "OPTIONS"
! 58: .TP
! 59: .B "\-\-help"
! 60: Prints usage information and a short summary of the available options.
! 61: .TP
! 62: .B "\-\-version"
! 63: Prints the strongSwan version.
! 64: .TP
! 65: .BI "\-\-debug " level
! 66: Sets the default log level (defaults to 1).
! 67: .I level
! 68: is a number between -1 and 4.
! 69: Refer to
! 70: .I strongswan.conf
! 71: for options that allow a more fine-grained configuration of the logging
! 72: output.
! 73: .TP
! 74: .BI "\-\-host " hostname
! 75: DNS name or IP address to connect to.
! 76: .TP
! 77: .BI "\-\-identity " identity
! 78: Identity the client uses for the IKE exchange.
! 79: .TP
! 80: .BI "\-\-eap\-identity " identity
! 81: Identity the client uses for EAP authentication.
! 82: .TP
! 83: .BI "\-\-xauth\-username " username
! 84: Username the client uses for XAuth authentication.
! 85: .TP
! 86: .BI "\-\-remote\-identity " identity
! 87: Server identity to expect, defaults to
! 88: .IR hostname .
! 89: .TP
! 90: .BI "\-\-cert " path
! 91: Trusted certificate, either for authentication or trust chain validation.
! 92: To provide more than one certificate multiple
! 93: .B \-\-cert
! 94: options can be used.
! 95: .TP
! 96: .BI "\-\-rsa " path
! 97: RSA private key to use for authentication (if a password is required, it will
! 98: be requested on demand).
! 99: .TP
! 100: .BI "\-\-p12 " path
! 101: PKCS#12 file with private key and certificates to use for authentication and
! 102: trust chain validation (if a password is required it will be requested on
! 103: demand).
! 104: .TP
! 105: .RI "\fB\-\-agent\fR[=" socket ]
! 106: Use SSH agent for authentication. If
! 107: .I socket
! 108: is not specified it is read from the
! 109: .B SSH_AUTH_SOCK
! 110: environment variable.
! 111: .TP
! 112: .BI "\-\-local\-ts " subnet
! 113: Additional traffic selector to propose for our side, the requested virtual IP
! 114: address will always be proposed.
! 115: .TP
! 116: .BI "\-\-remote\-ts " subnet
! 117: Traffic selector to propose for remote side, defaults to 0.0.0.0/0.
! 118: .TP
! 119: .BI "\-\-ike\-proposal " proposal
! 120: IKE proposal to offer instead of default. For IKEv1, a single proposal consists
! 121: of one encryption algorithm, an integrity/PRF algorithm and a DH group. IKEv2
! 122: can propose multiple algorithms of the same kind. To specify multiple proposals,
! 123: repeat the option.
! 124: .TP
! 125: .BI "\-\-esp\-proposal " proposal
! 126: ESP proposal to offer instead of default. For IKEv1, a single proposal consists
! 127: of one encryption algorithm, an integrity algorithm and an optional DH group for
! 128: Perfect Forward Secrecy rekeying. IKEv2 can propose multiple algorithms of the
! 129: same kind. To specify multiple proposals, repeat the option.
! 130: .TP
! 131: .BI "\-\-ah\-proposal " proposal
! 132: AH proposal to offer instead of ESP. For IKEv1, a single proposal consists
! 133: of an integrity algorithm and an optional DH group for Perfect Forward Secrecy
! 134: rekeying. IKEv2 can propose multiple algorithms of the same kind. To specify
! 135: multiple proposals, repeat the option.
! 136: .TP
! 137: .BI "\-\-profile " name
! 138: Authentication profile to use, the list of supported profiles can be found
! 139: in the
! 140: .B Authentication Profiles
! 141: sections below. Defaults to
! 142: .B ikev2\-pub
! 143: if a private key was supplied, and to
! 144: .B ikev2\-eap
! 145: otherwise.
! 146: .PP
! 147: .SS "IKEv2 Authentication Profiles"
! 148: .TP
! 149: .B "ikev2\-pub"
! 150: IKEv2 with public key client and server authentication
! 151: .TP
! 152: .B "ikev2\-eap"
! 153: IKEv2 with EAP client authentication and public key server authentication
! 154: .TP
! 155: .B "ikev2\-pub\-eap"
! 156: IKEv2 with public key and EAP client authentication (RFC 4739) and public key
! 157: server authentication
! 158: .PP
! 159: .SS "IKEv1 Authentication Profiles"
! 160: The following authentication profiles use either Main Mode or Aggressive Mode,
! 161: the latter is denoted with a \fB\-am\fR suffix.
! 162: .TP
! 163: .BR "ikev1\-pub" ", " "ikev1\-pub\-am"
! 164: IKEv1 with public key client and server authentication
! 165: .TP
! 166: .BR "ikev1\-xauth" ", " "ikev1\-xauth\-am"
! 167: IKEv1 with public key client and server authentication, followed by client XAuth
! 168: authentication
! 169: .TP
! 170: .BR "ikev1\-xauth\-psk" ", " "ikev1\-xauth\-psk\-am"
! 171: IKEv1 with pre-shared key (PSK) client and server authentication, followed by
! 172: client XAuth authentication (INSECURE!)
! 173: .TP
! 174: .BR "ikev1\-hybrid" ", " "ikev1\-hybrid\-am"
! 175: IKEv1 with public key server authentication only, followed by client XAuth
! 176: authentication
! 177: .PP
! 178: .SH "SEE ALSO"
! 179: \fBstrongswan.conf\fR(5), \fBipsec\fR(8)
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>