charon-cmd.8.in 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179
  1. .TH CHARON\-CMD 8 "2013-06-21" "@PACKAGE_VERSION@" "strongSwan"
  2. .SH "NAME"
  3. charon\-cmd \- Simple IKE client (IPsec VPN client)
  4. .SH SYNOPSIS
  5. .B charon\-cmd
  6. .B \-\-host
  7. .I hostname
  8. .B \-\-identity
  9. .I identity
  10. .B [ options ]
  11. .PP
  12. .SH "DESCRIPTION"
  13. .B charon\-cmd
  14. is a program for setting up IPsec VPN connections using the Internet Key
  15. Exchange protocol (IKE) in version 1 and 2. It supports a number of different
  16. road-warrior scenarios.
  17. .PP
  18. Like the IKE daemon
  19. .BR charon ,
  20. .B charon\-cmd
  21. has to be run as
  22. .B root
  23. (or more specifically as a user with
  24. .B CAP_NET_ADMIN
  25. capability).
  26. .PP
  27. Of the following options at least
  28. .I \-\-host
  29. and
  30. .I \-\-identity
  31. are required. Depending on the selected authentication
  32. .I profile
  33. credentials also have to be provided with their respective options.
  34. .PP
  35. Many of the
  36. .BR charon -specific
  37. configuration options in
  38. .I strongswan.conf
  39. also apply to
  40. .BR charon\-cmd .
  41. For instance, to configure customized logging to
  42. .B stdout
  43. the following snippet can be used:
  44. .PP
  45. .EX
  46. charon-cmd {
  47. filelog {
  48. stdout {
  49. default = 1
  50. ike = 2
  51. cfg = 2
  52. }
  53. }
  54. }
  55. .EE
  56. .PP
  57. .SH "OPTIONS"
  58. .TP
  59. .B "\-\-help"
  60. Prints usage information and a short summary of the available options.
  61. .TP
  62. .B "\-\-version"
  63. Prints the strongSwan version.
  64. .TP
  65. .BI "\-\-debug " level
  66. Sets the default log level (defaults to 1).
  67. .I level
  68. is a number between -1 and 4.
  69. Refer to
  70. .I strongswan.conf
  71. for options that allow a more fine-grained configuration of the logging
  72. output.
  73. .TP
  74. .BI "\-\-host " hostname
  75. DNS name or IP address to connect to.
  76. .TP
  77. .BI "\-\-identity " identity
  78. Identity the client uses for the IKE exchange.
  79. .TP
  80. .BI "\-\-eap\-identity " identity
  81. Identity the client uses for EAP authentication.
  82. .TP
  83. .BI "\-\-xauth\-username " username
  84. Username the client uses for XAuth authentication.
  85. .TP
  86. .BI "\-\-remote\-identity " identity
  87. Server identity to expect, defaults to
  88. .IR hostname .
  89. .TP
  90. .BI "\-\-cert " path
  91. Trusted certificate, either for authentication or trust chain validation.
  92. To provide more than one certificate multiple
  93. .B \-\-cert
  94. options can be used.
  95. .TP
  96. .BI "\-\-rsa " path
  97. RSA private key to use for authentication (if a password is required, it will
  98. be requested on demand).
  99. .TP
  100. .BI "\-\-p12 " path
  101. PKCS#12 file with private key and certificates to use for authentication and
  102. trust chain validation (if a password is required it will be requested on
  103. demand).
  104. .TP
  105. .RI "\fB\-\-agent\fR[=" socket ]
  106. Use SSH agent for authentication. If
  107. .I socket
  108. is not specified it is read from the
  109. .B SSH_AUTH_SOCK
  110. environment variable.
  111. .TP
  112. .BI "\-\-local\-ts " subnet
  113. Additional traffic selector to propose for our side, the requested virtual IP
  114. address will always be proposed.
  115. .TP
  116. .BI "\-\-remote\-ts " subnet
  117. Traffic selector to propose for remote side, defaults to 0.0.0.0/0.
  118. .TP
  119. .BI "\-\-ike\-proposal " proposal
  120. IKE proposal to offer instead of default. For IKEv1, a single proposal consists
  121. of one encryption algorithm, an integrity/PRF algorithm and a DH group. IKEv2
  122. can propose multiple algorithms of the same kind. To specify multiple proposals,
  123. repeat the option.
  124. .TP
  125. .BI "\-\-esp\-proposal " proposal
  126. ESP proposal to offer instead of default. For IKEv1, a single proposal consists
  127. of one encryption algorithm, an integrity algorithm and an optional DH group for
  128. Perfect Forward Secrecy rekeying. IKEv2 can propose multiple algorithms of the
  129. same kind. To specify multiple proposals, repeat the option.
  130. .TP
  131. .BI "\-\-ah\-proposal " proposal
  132. AH proposal to offer instead of ESP. For IKEv1, a single proposal consists
  133. of an integrity algorithm and an optional DH group for Perfect Forward Secrecy
  134. rekeying. IKEv2 can propose multiple algorithms of the same kind. To specify
  135. multiple proposals, repeat the option.
  136. .TP
  137. .BI "\-\-profile " name
  138. Authentication profile to use, the list of supported profiles can be found
  139. in the
  140. .B Authentication Profiles
  141. sections below. Defaults to
  142. .B ikev2\-pub
  143. if a private key was supplied, and to
  144. .B ikev2\-eap
  145. otherwise.
  146. .PP
  147. .SS "IKEv2 Authentication Profiles"
  148. .TP
  149. .B "ikev2\-pub"
  150. IKEv2 with public key client and server authentication
  151. .TP
  152. .B "ikev2\-eap"
  153. IKEv2 with EAP client authentication and public key server authentication
  154. .TP
  155. .B "ikev2\-pub\-eap"
  156. IKEv2 with public key and EAP client authentication (RFC 4739) and public key
  157. server authentication
  158. .PP
  159. .SS "IKEv1 Authentication Profiles"
  160. The following authentication profiles use either Main Mode or Aggressive Mode,
  161. the latter is denoted with a \fB\-am\fR suffix.
  162. .TP
  163. .BR "ikev1\-pub" ", " "ikev1\-pub\-am"
  164. IKEv1 with public key client and server authentication
  165. .TP
  166. .BR "ikev1\-xauth" ", " "ikev1\-xauth\-am"
  167. IKEv1 with public key client and server authentication, followed by client XAuth
  168. authentication
  169. .TP
  170. .BR "ikev1\-xauth\-psk" ", " "ikev1\-xauth\-psk\-am"
  171. IKEv1 with pre-shared key (PSK) client and server authentication, followed by
  172. client XAuth authentication (INSECURE!)
  173. .TP
  174. .BR "ikev1\-hybrid" ", " "ikev1\-hybrid\-am"
  175. IKEv1 with public key server authentication only, followed by client XAuth
  176. authentication
  177. .PP
  178. .SH "SEE ALSO"
  179. \fBstrongswan.conf\fR(5), \fBipsec\fR(8)