Annotation of embedaddon/strongswan/src/charon-cmd/charon-cmd.8.in, revision 1.1.1.1
1.1 misho 1: .TH CHARON\-CMD 8 "2013-06-21" "@PACKAGE_VERSION@" "strongSwan"
2: .SH "NAME"
3: charon\-cmd \- Simple IKE client (IPsec VPN client)
4: .SH SYNOPSIS
5: .B charon\-cmd
6: .B \-\-host
7: .I hostname
8: .B \-\-identity
9: .I identity
10: .B [ options ]
11: .PP
12: .SH "DESCRIPTION"
13: .B charon\-cmd
14: is a program for setting up IPsec VPN connections using the Internet Key
15: Exchange protocol (IKE) in version 1 and 2. It supports a number of different
16: road-warrior scenarios.
17: .PP
18: Like the IKE daemon
19: .BR charon ,
20: .B charon\-cmd
21: has to be run as
22: .B root
23: (or more specifically as a user with
24: .B CAP_NET_ADMIN
25: capability).
26: .PP
27: Of the following options at least
28: .I \-\-host
29: and
30: .I \-\-identity
31: are required. Depending on the selected authentication
32: .I profile
33: credentials also have to be provided with their respective options.
34: .PP
35: Many of the
36: .BR charon -specific
37: configuration options in
38: .I strongswan.conf
39: also apply to
40: .BR charon\-cmd .
41: For instance, to configure customized logging to
42: .B stdout
43: the following snippet can be used:
44: .PP
45: .EX
46: charon-cmd {
47: filelog {
48: stdout {
49: default = 1
50: ike = 2
51: cfg = 2
52: }
53: }
54: }
55: .EE
56: .PP
57: .SH "OPTIONS"
58: .TP
59: .B "\-\-help"
60: Prints usage information and a short summary of the available options.
61: .TP
62: .B "\-\-version"
63: Prints the strongSwan version.
64: .TP
65: .BI "\-\-debug " level
66: Sets the default log level (defaults to 1).
67: .I level
68: is a number between -1 and 4.
69: Refer to
70: .I strongswan.conf
71: for options that allow a more fine-grained configuration of the logging
72: output.
73: .TP
74: .BI "\-\-host " hostname
75: DNS name or IP address to connect to.
76: .TP
77: .BI "\-\-identity " identity
78: Identity the client uses for the IKE exchange.
79: .TP
80: .BI "\-\-eap\-identity " identity
81: Identity the client uses for EAP authentication.
82: .TP
83: .BI "\-\-xauth\-username " username
84: Username the client uses for XAuth authentication.
85: .TP
86: .BI "\-\-remote\-identity " identity
87: Server identity to expect, defaults to
88: .IR hostname .
89: .TP
90: .BI "\-\-cert " path
91: Trusted certificate, either for authentication or trust chain validation.
92: To provide more than one certificate multiple
93: .B \-\-cert
94: options can be used.
95: .TP
96: .BI "\-\-rsa " path
97: RSA private key to use for authentication (if a password is required, it will
98: be requested on demand).
99: .TP
100: .BI "\-\-p12 " path
101: PKCS#12 file with private key and certificates to use for authentication and
102: trust chain validation (if a password is required it will be requested on
103: demand).
104: .TP
105: .RI "\fB\-\-agent\fR[=" socket ]
106: Use SSH agent for authentication. If
107: .I socket
108: is not specified it is read from the
109: .B SSH_AUTH_SOCK
110: environment variable.
111: .TP
112: .BI "\-\-local\-ts " subnet
113: Additional traffic selector to propose for our side, the requested virtual IP
114: address will always be proposed.
115: .TP
116: .BI "\-\-remote\-ts " subnet
117: Traffic selector to propose for remote side, defaults to 0.0.0.0/0.
118: .TP
119: .BI "\-\-ike\-proposal " proposal
120: IKE proposal to offer instead of default. For IKEv1, a single proposal consists
121: of one encryption algorithm, an integrity/PRF algorithm and a DH group. IKEv2
122: can propose multiple algorithms of the same kind. To specify multiple proposals,
123: repeat the option.
124: .TP
125: .BI "\-\-esp\-proposal " proposal
126: ESP proposal to offer instead of default. For IKEv1, a single proposal consists
127: of one encryption algorithm, an integrity algorithm and an optional DH group for
128: Perfect Forward Secrecy rekeying. IKEv2 can propose multiple algorithms of the
129: same kind. To specify multiple proposals, repeat the option.
130: .TP
131: .BI "\-\-ah\-proposal " proposal
132: AH proposal to offer instead of ESP. For IKEv1, a single proposal consists
133: of an integrity algorithm and an optional DH group for Perfect Forward Secrecy
134: rekeying. IKEv2 can propose multiple algorithms of the same kind. To specify
135: multiple proposals, repeat the option.
136: .TP
137: .BI "\-\-profile " name
138: Authentication profile to use, the list of supported profiles can be found
139: in the
140: .B Authentication Profiles
141: sections below. Defaults to
142: .B ikev2\-pub
143: if a private key was supplied, and to
144: .B ikev2\-eap
145: otherwise.
146: .PP
147: .SS "IKEv2 Authentication Profiles"
148: .TP
149: .B "ikev2\-pub"
150: IKEv2 with public key client and server authentication
151: .TP
152: .B "ikev2\-eap"
153: IKEv2 with EAP client authentication and public key server authentication
154: .TP
155: .B "ikev2\-pub\-eap"
156: IKEv2 with public key and EAP client authentication (RFC 4739) and public key
157: server authentication
158: .PP
159: .SS "IKEv1 Authentication Profiles"
160: The following authentication profiles use either Main Mode or Aggressive Mode,
161: the latter is denoted with a \fB\-am\fR suffix.
162: .TP
163: .BR "ikev1\-pub" ", " "ikev1\-pub\-am"
164: IKEv1 with public key client and server authentication
165: .TP
166: .BR "ikev1\-xauth" ", " "ikev1\-xauth\-am"
167: IKEv1 with public key client and server authentication, followed by client XAuth
168: authentication
169: .TP
170: .BR "ikev1\-xauth\-psk" ", " "ikev1\-xauth\-psk\-am"
171: IKEv1 with pre-shared key (PSK) client and server authentication, followed by
172: client XAuth authentication (INSECURE!)
173: .TP
174: .BR "ikev1\-hybrid" ", " "ikev1\-hybrid\-am"
175: IKEv1 with public key server authentication only, followed by client XAuth
176: authentication
177: .PP
178: .SH "SEE ALSO"
179: \fBstrongswan.conf\fR(5), \fBipsec\fR(8)
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>