summaryrefslogtreecommitdiff
path: root/man/ipsec.conf.5
diff options
context:
space:
mode:
Diffstat (limited to 'man/ipsec.conf.5')
-rw-r--r--man/ipsec.conf.540
1 files changed, 16 insertions, 24 deletions
diff --git a/man/ipsec.conf.5 b/man/ipsec.conf.5
index c422b50ec..b36a7ece7 100644
--- a/man/ipsec.conf.5
+++ b/man/ipsec.conf.5
@@ -1,8 +1,4 @@
-<<<<<<< HEAD
-.TH IPSEC.CONF 5 "2010-10-19" "4.5.0rc2" "strongSwan"
-=======
-.TH IPSEC.CONF 5 "2010-10-19" "4.5.1" "strongSwan"
->>>>>>> upstream/4.5.1
+.TH IPSEC.CONF 5 "2010-10-19" "4.5.2" "strongSwan"
.SH NAME
ipsec.conf \- IPsec configuration and connections
.SH DESCRIPTION
@@ -413,12 +409,20 @@ comma-separated list of ESP encryption/authentication algorithms to be used
for the connection, e.g.
.BR aes128-sha256 .
The notation is
-.BR encryption-integrity-[dh-group] .
+.BR encryption-integrity[-dhgroup][-esnmodes] .
.br
If
.B dh-group
is specified, CHILD_SA setup and rekeying include a separate diffe hellman
-exchange (IKEv2 only).
+exchange (IKEv2 only). Valid
+.B esnmodes
+(IKEv2 only) are
+.B esn
+and
+.B noesn.
+Specifying both negotiates Extended Sequence number support with the peer,
+the defaut is
+.B noesn.
.TP
.BR forceencaps " = yes | " no
force UDP encapsulation for ESP packets even if no NAT situation is detected.
@@ -548,10 +552,6 @@ for public key authentication (RSA/ECDSA),
.B psk
for pre-shared key authentication and
.B eap
-<<<<<<< HEAD
-to (require the) use of the Extensible Authentication Protocol. In the case
-of
-=======
to (require the) use of the Extensible Authentication Protocol.
To require a trustchain public key strength for the remote side, specify the
key type followed by the strength in bits (for example
@@ -559,7 +559,6 @@ key type followed by the strength in bits (for example
or
.BR ecdsa-256 ).
For
->>>>>>> upstream/4.5.1
.B eap,
an optional EAP method can be appended. Currently defined methods are
.BR eap-aka ,
@@ -603,11 +602,7 @@ sets
to the distinguished name of the certificate's subject and
.B leftca
to the distinguished name of the certificate's issuer.
-<<<<<<< HEAD
-The left participant's ID can be overriden by specifying a
-=======
The left participant's ID can be overridden by specifying a
->>>>>>> upstream/4.5.1
.B leftid
value which must be certified by the certificate, though.
.TP
@@ -616,13 +611,10 @@ Same as
.B leftcert,
but for the second authentication round (IKEv2 only).
.TP
-<<<<<<< HEAD
-=======
.BR leftcertpolicy " = <OIDs>"
Comma separated list of certificate policy OIDs the peers certificate must have.
OIDs are specified using the numerical dotted representation (IKEv2 only).
.TP
->>>>>>> upstream/4.5.1
.BR leftfirewall " = yes | " no
whether the left participant is doing forwarding-firewalling
(including masquerading) using iptables for traffic from \fIleftsubnet\fR,
@@ -978,8 +970,6 @@ synonym for
.BR reqid " = <number>"
sets the reqid for a given connection to a pre-configured fixed value.
.TP
-<<<<<<< HEAD
-=======
.BR tfc " = <value>"
number of bytes to pad ESP payload data to. Traffic Flow Confidentiality
is currently supported in IKEv2 and applies to outgoing packets only. The
@@ -987,7 +977,6 @@ special value
.BR %mtu
fills up ESP packets with padding to have the size of the MTU.
.TP
->>>>>>> upstream/4.5.1
.BR type " = " tunnel " | transport | transport_proxy | passthrough | drop"
the type of the connection; currently the accepted values
are
@@ -1054,8 +1043,11 @@ is not given, the
of this connection will be used as peer ID.
.SH "CA SECTIONS"
-This are optional sections that can be used to assign special
-parameters to a Certification Authority (CA).
+These are optional sections that can be used to assign special
+parameters to a Certification Authority (CA). Because the daemons
+automatically import CA certificates from \fI/etc/ipsec.d/cacerts\fP,
+there is no need to explicitly add them with a CA section, unless you
+want to assign special parameters (like a CRL) to a CA.
.TP
.BR also " = <name>"
includes ca section