File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / src / charon-cmd / charon-cmd.8.in
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 09:46:45 2020 UTC (4 years, 4 months ago) by misho
Branches: strongswan, MAIN
CVS tags: v5_9_2p0, v5_8_4p7, HEAD
Strongswan

    1: .TH CHARON\-CMD 8 "2013-06-21" "@PACKAGE_VERSION@" "strongSwan"
    2: .SH "NAME"
    3: charon\-cmd \- Simple IKE client (IPsec VPN client)
    4: .SH SYNOPSIS
    5: .B charon\-cmd
    6: .B \-\-host
    7: .I hostname
    8: .B \-\-identity
    9: .I identity
   10: .B [ options ]
   11: .PP
   12: .SH "DESCRIPTION"
   13: .B charon\-cmd
   14: is a program for setting up IPsec VPN connections using the Internet Key
   15: Exchange protocol (IKE) in version 1 and 2.  It supports a number of different
   16: road-warrior scenarios.
   17: .PP
   18: Like the IKE daemon
   19: .BR charon ,
   20: .B charon\-cmd
   21: has to be run as
   22: .B root
   23: (or more specifically as a user with
   24: .B CAP_NET_ADMIN
   25: capability).
   26: .PP
   27: Of the following options at least
   28: .I \-\-host
   29: and
   30: .I \-\-identity
   31: are required. Depending on the selected authentication
   32: .I profile
   33: credentials also have to be provided with their respective options.
   34: .PP
   35: Many of the
   36: .BR charon -specific
   37: configuration options in
   38: .I strongswan.conf
   39: also apply to
   40: .BR charon\-cmd .
   41: For instance, to configure customized logging to
   42: .B stdout
   43: the following snippet can be used:
   44: .PP
   45: .EX
   46: 	charon-cmd {
   47: 		filelog {
   48: 			stdout {
   49: 				default = 1
   50: 				ike = 2
   51: 				cfg = 2
   52: 			}
   53: 		}
   54: 	}
   55: .EE
   56: .PP
   57: .SH "OPTIONS"
   58: .TP
   59: .B "\-\-help"
   60: Prints usage information and a short summary of the available options.
   61: .TP
   62: .B "\-\-version"
   63: Prints the strongSwan version.
   64: .TP
   65: .BI "\-\-debug " level
   66: Sets the default log level (defaults to 1).
   67: .I level
   68: is a number between -1 and 4.
   69: Refer to
   70: .I strongswan.conf
   71: for options that allow a more fine-grained configuration of the logging
   72: output.
   73: .TP
   74: .BI "\-\-host " hostname
   75: DNS name or IP address to connect to.
   76: .TP
   77: .BI "\-\-identity " identity
   78: Identity the client uses for the IKE exchange.
   79: .TP
   80: .BI "\-\-eap\-identity " identity
   81: Identity the client uses for EAP authentication.
   82: .TP
   83: .BI "\-\-xauth\-username " username
   84: Username the client uses for XAuth authentication.
   85: .TP
   86: .BI "\-\-remote\-identity " identity
   87: Server identity to expect, defaults to
   88: .IR hostname .
   89: .TP
   90: .BI "\-\-cert " path
   91: Trusted certificate, either for authentication or trust chain validation.
   92: To provide more than one certificate multiple
   93: .B \-\-cert
   94: options can be used.
   95: .TP
   96: .BI "\-\-rsa " path
   97: RSA private key to use for authentication (if a password is required, it will
   98: be requested on demand).
   99: .TP
  100: .BI "\-\-p12 " path
  101: PKCS#12 file with private key and certificates to use for authentication and
  102: trust chain validation (if a password is required it will be requested on
  103: demand).
  104: .TP
  105: .RI "\fB\-\-agent\fR[=" socket ]
  106: Use SSH agent for authentication. If
  107: .I socket
  108: is not specified it is read from the
  109: .B SSH_AUTH_SOCK
  110: environment variable.
  111: .TP
  112: .BI "\-\-local\-ts " subnet
  113: Additional traffic selector to propose for our side, the requested virtual IP
  114: address will always be proposed.
  115: .TP
  116: .BI "\-\-remote\-ts " subnet
  117: Traffic selector to propose for remote side, defaults to 0.0.0.0/0.
  118: .TP
  119: .BI "\-\-ike\-proposal " proposal
  120: IKE proposal to offer instead of default. For IKEv1, a single proposal consists
  121: of one encryption algorithm, an integrity/PRF algorithm and a DH group. IKEv2
  122: can propose multiple algorithms of the same kind. To specify multiple proposals,
  123: repeat the option.
  124: .TP
  125: .BI "\-\-esp\-proposal " proposal
  126: ESP proposal to offer instead of default. For IKEv1, a single proposal consists
  127: of one encryption algorithm, an integrity algorithm and an optional DH group for
  128: Perfect Forward Secrecy rekeying. IKEv2 can propose multiple algorithms of the
  129: same kind. To specify multiple proposals, repeat the option.
  130: .TP
  131: .BI "\-\-ah\-proposal " proposal
  132: AH proposal to offer instead of ESP. For IKEv1, a single proposal consists
  133: of an integrity algorithm and an optional DH group for Perfect Forward Secrecy
  134: rekeying. IKEv2 can propose multiple algorithms of the same kind. To specify
  135: multiple proposals, repeat the option.
  136: .TP
  137: .BI "\-\-profile " name
  138: Authentication profile to use, the list of supported profiles can be found
  139: in the
  140: .B Authentication Profiles
  141: sections below. Defaults to
  142: .B ikev2\-pub
  143: if a private key was supplied, and to
  144: .B ikev2\-eap
  145: otherwise.
  146: .PP
  147: .SS "IKEv2 Authentication Profiles"
  148: .TP
  149: .B "ikev2\-pub"
  150: IKEv2 with public key client and server authentication
  151: .TP
  152: .B "ikev2\-eap"
  153: IKEv2 with EAP client authentication and public key server authentication
  154: .TP
  155: .B "ikev2\-pub\-eap"
  156: IKEv2 with public key and EAP client authentication (RFC 4739) and public key
  157: server authentication
  158: .PP
  159: .SS "IKEv1 Authentication Profiles"
  160: The following authentication profiles use either Main Mode or Aggressive Mode,
  161: the latter is denoted with a \fB\-am\fR suffix.
  162: .TP
  163: .BR "ikev1\-pub" ", " "ikev1\-pub\-am"
  164: IKEv1 with public key client and server authentication
  165: .TP
  166: .BR "ikev1\-xauth" ", " "ikev1\-xauth\-am"
  167: IKEv1 with public key client and server authentication, followed by client XAuth
  168: authentication
  169: .TP
  170: .BR "ikev1\-xauth\-psk" ", " "ikev1\-xauth\-psk\-am"
  171: IKEv1 with pre-shared key (PSK) client and server authentication, followed by
  172: client XAuth authentication (INSECURE!)
  173: .TP
  174: .BR "ikev1\-hybrid" ", " "ikev1\-hybrid\-am"
  175: IKEv1 with public key server authentication only, followed by client XAuth
  176: authentication
  177: .PP
  178: .SH "SEE ALSO"
  179: \fBstrongswan.conf\fR(5), \fBipsec\fR(8)

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>