Annotation of embedaddon/strongswan/src/ipsec/_ipsec.8, revision 1.1
1.1 ! misho 1: .TH IPSEC 8 "2013-10-29" "5.7.2dr1" "strongSwan"
! 2: .
! 3: .SH NAME
! 4: .
! 5: ipsec \- invoke IPsec utilities
! 6: .
! 7: .SH SYNOPSIS
! 8: .
! 9: .SY ipsec
! 10: .I command
! 11: .RI [ arguments ]
! 12: .RI [ options ]
! 13: .YS
! 14: .
! 15: .SH DESCRIPTION
! 16: .
! 17: The
! 18: .B ipsec
! 19: utility invokes any of several utilities involved in controlling and monitoring
! 20: the IPsec encryption/authentication system, running the specified \fIcommand\fP
! 21: with the specified \fIarguments\fP and \fIoptions\fP as if it had been invoked
! 22: directly. This largely eliminates possible name collisions with other software,
! 23: and also permits some centralized services.
! 24: .P
! 25: All the commands described in this manual page are built-in and are used to
! 26: control and monitor IPsec connections as well as the IKE daemon.
! 27: .P
! 28: For other commands
! 29: .I ipsec
! 30: supplies the invoked
! 31: .I command
! 32: with a suitable PATH environment variable,
! 33: and also provides the environment variables listed under
! 34: .IR ENVIRONMENT .
! 35: .
! 36: .SS CONTROL COMMANDS
! 37: .
! 38: .TP
! 39: .BI "start [" "starter options" ]
! 40: calls
! 41: .B "starter"
! 42: which in turn parses \fIipsec.conf\fR and starts the IKE daemon \fIcharon\fR.
! 43: .
! 44: .TP
! 45: .B "update"
! 46: sends a \fIHUP\fR signal to
! 47: .BR "starter"
! 48: which in turn determines any changes in \fIipsec.conf\fR
! 49: and updates the configuration on the running IKE daemon \fIcharon\fR.
! 50: .
! 51: .TP
! 52: .B "reload"
! 53: sends a \fIUSR1\fR signal to
! 54: .BR "starter"
! 55: which in turn reloads the whole configuration of the running IKE daemon
! 56: \fIcharon\fR based on the actual \fIipsec.conf\fR.
! 57: .
! 58: .TP
! 59: .B "restart"
! 60: is equivalent to
! 61: .B "stop"
! 62: followed by
! 63: .B "start"
! 64: after a guard of 2 seconds.
! 65: .
! 66: .TP
! 67: .B "stop"
! 68: terminates all IPsec connections and stops the IKE daemon \fIcharon\fR
! 69: by sending a \fITERM\fR signal to
! 70: .BR "starter".
! 71: .
! 72: .TP
! 73: .BI "up " name
! 74: tells the IKE daemon to start up connection \fIname\fP.
! 75: .
! 76: .TP
! 77: .BI "down " name
! 78: tells the IKE daemon to terminate connection \fIname\fP.
! 79: .
! 80: .TP
! 81: .BI "down " name{n}
! 82: terminates IKEv1 Quick Mode and IKEv2 CHILD SA instance \fIn\fP of
! 83: connection \fIname\fP.
! 84: .
! 85: .TP
! 86: .BI "down " name{*}
! 87: terminates all IKEv1 Quick Mode and IKEv2 CHILD SA instances of connection
! 88: \fIname\fP.
! 89: .
! 90: .TP
! 91: .BI "down " name[n]
! 92: terminates IKE SA instance \fIn\fP of connection \fIname\fP.
! 93: .
! 94: .TP
! 95: .BI "down " name[*]
! 96: terminates all IKE SA instances of connection \fIname\fP.
! 97: .
! 98: .TP
! 99: .BI "down-srcip <" start "> [<" end ">]"
! 100: terminates all IKE SA instances with clients having virtual IPs in the range
! 101: .IR start - end .
! 102: .
! 103: .TP
! 104: .BI "route " name
! 105: tells the IKE daemon to insert an IPsec policy in the kernel
! 106: for connection \fIname\fP. The first payload packet matching the IPsec policy
! 107: will automatically trigger an IKE connection setup.
! 108: .
! 109: .TP
! 110: .BI "unroute " name
! 111: remove the IPsec policy in the kernel for connection \fIname\fP.
! 112: .
! 113: .TP
! 114: .BI "status [" name ]
! 115: returns concise status information either on connection
! 116: \fIname\fP or if the argument is lacking, on all connections.
! 117: .
! 118: .TP
! 119: .BI "statusall [" name ]
! 120: returns detailed status information either on connection
! 121: \fIname\fP or if the argument is lacking, on all connections.
! 122: .
! 123: .SS LIST COMMANDS
! 124: .
! 125: .TP
! 126: .BI "leases [<" poolname "> [<" address ">]]"
! 127: returns the status of all or the selected IP address pool (or even a single
! 128: virtual IP address).
! 129: .
! 130: .TP
! 131: .B "listalgs"
! 132: returns a list supported cryptographic algorithms usable for IKE, and their
! 133: corresponding plugin.
! 134: .
! 135: .TP
! 136: .BI "listpubkeys [" --utc ]
! 137: returns a list of RSA public keys that were either loaded in raw key format
! 138: or extracted from X.509 and|or OpenPGP certificates.
! 139: .
! 140: .TP
! 141: .BI "listcerts [" --utc ]
! 142: returns a list of X.509 and|or OpenPGP certificates that were either loaded
! 143: locally by the IKE daemon or received via the IKE protocol.
! 144: .
! 145: .TP
! 146: .BI "listcacerts [" --utc ]
! 147: returns a list of X.509 Certification Authority (CA) certificates that were
! 148: loaded locally by the IKE daemon from the \fI/etc/ipsec.d/cacerts/\fP
! 149: directory or received via the IKE protocol.
! 150: .
! 151: .TP
! 152: .BI "listaacerts [" --utc ]
! 153: returns a list of X.509 Authorization Authority (AA) certificates that were
! 154: loaded locally by the IKE daemon from the \fI/etc/ipsec.d/aacerts/\fP
! 155: directory.
! 156: .
! 157: .TP
! 158: .BI "listocspcerts [" --utc ]
! 159: returns a list of X.509 OCSP Signer certificates that were either loaded
! 160: locally by the IKE daemon from the \fI/etc/ipsec.d/ocspcerts/\fP
! 161: directory or were sent by an OCSP server.
! 162: .
! 163: .TP
! 164: .BI "listacerts [" --utc ]
! 165: returns a list of X.509 Attribute certificates that were loaded locally by
! 166: the IKE daemon from the \fI/etc/ipsec.d/acerts/\fP directory.
! 167: .
! 168: .TP
! 169: .BI "listgroups [" --utc ]
! 170: returns a list of groups that are used to define user authorization profiles.
! 171: .
! 172: .TP
! 173: .BI "listcainfos [" --utc ]
! 174: returns certification authority information (CRL distribution points, OCSP URIs,
! 175: LDAP servers) that were defined by
! 176: .BR ca
! 177: sections in \fIipsec.conf\fP.
! 178: .
! 179: .TP
! 180: .BI "listcrls [" --utc ]
! 181: returns a list of Certificate Revocation Lists (CRLs) that were either loaded
! 182: by the IKE daemon from the \fI/etc/ipsec.d/crls\fP directory or fetched from
! 183: an HTTP- or LDAP-based CRL distribution point.
! 184: .
! 185: .TP
! 186: .BI "listocsp [" --utc ]
! 187: returns revocation information fetched from OCSP servers.
! 188: .
! 189: .TP
! 190: .BI "listplugins"
! 191: returns a list of all loaded plugin features.
! 192: .
! 193: .TP
! 194: .BI "listcounters [" name ]
! 195: returns a list of global or connection specific IKE counter values
! 196: collected since daemon startup.
! 197: .
! 198: .TP
! 199: .BI "listall [" --utc ]
! 200: returns all information generated by the list commands above. Each list command
! 201: can be called with the
! 202: \fB\-\-utc\fP
! 203: option which displays all dates in UTC instead of local time.
! 204: .
! 205: .SS REREAD COMMANDS
! 206: .
! 207: .TP
! 208: .B "rereadsecrets"
! 209: flushes and rereads all secrets defined in \fIipsec.secrets\fP.
! 210: .
! 211: .TP
! 212: .B "rereadcacerts"
! 213: removes previously loaded CA certificates, reads all certificate files
! 214: contained in the \fI/etc/ipsec.d/cacerts\fP directory and adds them to the list
! 215: of Certification Authority (CA) certificates. This does not affect certificates
! 216: explicitly defined in a
! 217: .BR ipsec.conf (5)
! 218: ca section, which may be separately updated using the \fBupdate\fP command.
! 219: .
! 220: .TP
! 221: .B "rereadaacerts"
! 222: removes previously loaded AA certificates, reads all certificate files
! 223: contained in the \fI/etc/ipsec.d/aacerts\fP directory and adds them to the list
! 224: of Authorization Authority (AA) certificates.
! 225: .
! 226: .TP
! 227: .B "rereadocspcerts"
! 228: reads all certificate files contained in the \fI/etc/ipsec.d/ocspcerts/\fP
! 229: directory and adds them to the list of OCSP signer certificates.
! 230: .
! 231: .TP
! 232: .B "rereadacerts"
! 233: reads all certificate files contained in the \fI/etc/ipsec.d/acerts/\fP
! 234: directory and adds them to the list of attribute certificates.
! 235: .
! 236: .TP
! 237: .B "rereadcrls"
! 238: reads all Certificate Revocation Lists (CRLs) contained in the
! 239: \fI/etc/ipsec.d/crls/\fP directory and adds them to the list of CRLs.
! 240: .
! 241: .TP
! 242: .B "rereadall"
! 243: executes all reread commands listed above.
! 244: .
! 245: .SS RESET COMMANDS
! 246: .
! 247: .TP
! 248: .BI "resetcounters [" name ]
! 249: resets global or connection specific counters.
! 250: .
! 251: .SS PURGE COMMANDS
! 252: .
! 253: .TP
! 254: .B "purgecerts"
! 255: purges all cached certificates.
! 256: .
! 257: .TP
! 258: .B "purgecrls"
! 259: purges all cached CRLs.
! 260: .
! 261: .TP
! 262: .B "purgeike"
! 263: purges IKE SAs that don't have a Quick Mode or CHILD SA.
! 264: .
! 265: .TP
! 266: .B "purgeocsp"
! 267: purges all cached OCSP information records.
! 268: .
! 269: .SS INFO COMMANDS
! 270: .
! 271: .TP
! 272: .B "\-\-help"
! 273: returns the usage information for the
! 274: .B ipsec
! 275: command.
! 276: .
! 277: .TP
! 278: .B "\-\-version"
! 279: returns the version in the form of
! 280: .B Linux strongSwan U<strongSwan userland version>/K<Linux kernel version>
! 281: if strongSwan uses the native NETKEY IPsec stack of the Linux kernel it is
! 282: running on.
! 283: .
! 284: .TP
! 285: .B "\-\-versioncode"
! 286: returns the version number in the form of
! 287: .B U<strongSwan userland version>/K<Linux kernel version>
! 288: if strongSwan uses the native NETKEY IPsec stack of the Linux kernel it is
! 289: running on.
! 290: .
! 291: .TP
! 292: .B "\-\-copyright"
! 293: returns the copyright information.
! 294: .
! 295: .TP
! 296: .B "\-\-directory"
! 297: returns the \fILIBEXECDIR\fP directory as defined by the configure options.
! 298: .
! 299: .TP
! 300: .B "\-\-confdir"
! 301: returns the \fISYSCONFDIR\fP directory as defined by the configure options.
! 302: .
! 303: .TP
! 304: .B "\-\-piddir"
! 305: returns the \fIPIDDIR\fP directory as defined by the configure options.
! 306: .
! 307: .SH FILES
! 308: .
! 309: /usr/libexec/ipsec utilities directory
! 310: .
! 311: .SH ENVIRONMENT
! 312: .
! 313: When calling other commands the
! 314: .B ipsec
! 315: command supplies the following environment variables.
! 316: .nf
! 317: .na
! 318:
! 319: IPSEC_DIR directory containing ipsec programs and utilities
! 320: IPSEC_BINDIR directory containing \fBpki\fP command
! 321: IPSEC_SBINDIR directory containing \fBipsec\fP command
! 322: IPSEC_CONFDIR directory containing configuration files
! 323: IPSEC_PIDDIR directory containing PID/socket files
! 324: IPSEC_SCRIPT name of the ipsec script
! 325: IPSEC_NAME name of ipsec distribution
! 326: IPSEC_VERSION version number of ipsec userland and kernel
! 327: IPSEC_STARTER_PID PID file for ipsec starter
! 328: IPSEC_CHARON_PID PID file for IKE keying daemon
! 329: .ad
! 330: .fi
! 331: .
! 332: .SH SEE ALSO
! 333: .
! 334: .BR ipsec.conf (5),
! 335: .BR ipsec.secrets (5)
! 336: .
! 337: .SH HISTORY
! 338: Originally written for the FreeS/WAN project by Henry Spencer.
! 339: Updated and extended for the strongSwan project <http://www.strongswan.org> by
! 340: Tobias Brunner and Andreas Steffen.
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>