aboutsummaryrefslogtreecommitdiffstats
path: root/man
diff options
context:
space:
mode:
authorTobias Brunner <tobias@strongswan.org>2013-10-29 11:45:25 +0100
committerTobias Brunner <tobias@strongswan.org>2013-10-29 11:45:25 +0100
commitbb49dfb02e23aaf80894711b54203f98870f9733 (patch)
tree49da1000e136096e98a94e7eded016557a06ca38 /man
parent1dd58b0e2138cec7b3152f6110592b1eff1e86d2 (diff)
downloadstrongswan-bb49dfb02e23aaf80894711b54203f98870f9733.tar.bz2
strongswan-bb49dfb02e23aaf80894711b54203f98870f9733.tar.xz
man: strongswan.conf(5) updated
Diffstat (limited to 'man')
-rw-r--r--man/strongswan.conf.5.in40
1 files changed, 35 insertions, 5 deletions
diff --git a/man/strongswan.conf.5.in b/man/strongswan.conf.5.in
index 0fb239adc..db63d36f4 100644
--- a/man/strongswan.conf.5.in
+++ b/man/strongswan.conf.5.in
@@ -1,4 +1,4 @@
-.TH STRONGSWAN.CONF 5 "2013-07-22" "@PACKAGE_VERSION@" "strongSwan"
+.TH STRONGSWAN.CONF 5 "2013-10-29" "@PACKAGE_VERSION@" "strongSwan"
.SH NAME
strongswan.conf \- strongSwan configuration file
.SH DESCRIPTION
@@ -383,6 +383,9 @@ Derive user-defined MAC address from hash of IKEv2 identity
.BR charon.plugins.dhcp.server " [255.255.255.255]"
DHCP server unicast or broadcast IP address
.TP
+.BR charon.plugins.dnscert.enable " [no]"
+Enable fetching of CERT RRs via DNS
+.TP
.BR charon.plugins.duplicheck.enable " [yes]"
Enable duplicheck plugin (if loaded)
.TP
@@ -526,6 +529,27 @@ option.
.BR charon.plugins.eap-radius.sockets " [1]"
Number of sockets (ports) to use, increase for high load
.TP
+.BR charon.plugins.eap-radius.xauth
+Section to configure multiple XAuth authentication rounds via RADIUS. The subsections define so called
+authentication profiles with arbitrary names. In each profile section one or more XAuth types can be
+configured, with an assigned message. For each type a separate XAuth exchange will be initiated and all
+replies get concatenated into the User-Password attribute, which then gets verified over RADIUS.
+
+Available XAuth types are \fBpassword\fR, \fBpasscode\fR, \fBnextpin\fR, and \fBanswer\fR. This type is
+not relevant to strongSwan or the AAA server, but the client may show a different dialog (along with the
+configured message).
+
+To use the configured profiles, they have to be configured in the respective connection in
+.IR ipsec.conf (5)
+by appending the profile name, separated by a colon, to the
+.B xauth-radius
+XAauth backend configuration in
+.I rightauth
+or
+.IR rightauth2 ,
+for instance,
+.IR rightauth2=xauth-radius:profile .
+.TP
.BR charon.plugins.eap-sim.request_identity " [yes]"
.TP
@@ -609,7 +633,7 @@ Set to 0 to disable.
.TP
.BR charon.plugins.ipseckey.enable " [no]"
-Enable the fetching of IPSECKEY RRs via DNS
+Enable fetching of IPSECKEY RRs via DNS
.TP
.BR charon.plugins.led.activity_led
@@ -628,7 +652,6 @@ Allow that the remote traffic selector equals the IKE peer. The route installed
for such traffic (via TUN device) usually prevents further IKE traffic. The
fwmark options for the \fIkernel-netlink\fR and \fIsocket-default\fR plugins can
be used to circumvent that problem.
-to
.TP
.BR charon.plugins.kernel-netlink.fwmark
Firewall mark to set on the routing rule that directs traffic to our own routing
@@ -639,8 +662,8 @@ the meaning (i.e. the rule only applies to packets that don't match the mark).
Whether to trigger roam events when interfaces, addresses or routes change
.TP
.BR charon.plugins.kernel-netlink.xfrm_acq_expires " [165]"
-Lifetime of XFRM acquire state in kernel, value gets written to
-/proc/sys/net/core/xfrm_acq_expires. Indirecly controls the delay of XFRM
+Lifetime of XFRM acquire state in kernel. The value gets written to
+/proc/sys/net/core/xfrm_acq_expires. Indirectly controls the delay of XFRM
acquire messages sent.
.TP
.BR charon.plugins.kernel-pfroute.vip_wait " [1000]"
@@ -1098,6 +1121,10 @@ Plugins to load in ipsec pki tool
.TP
.BR pool.load
Plugins to load in ipsec pool tool
+.SS pt-tls-client section
+.TP
+.BR pt-tls-client.load
+Plugins to load in ipsec pt-tls-client tool
.SS scepclient section
.TP
.BR scepclient.load
@@ -1513,6 +1540,9 @@ Path to the issuer certificate (if not configured a hard-coded value is used)
Path to private key that is used to issue certificates (if not configured a
hard-coded value is used)
.TP
+.BR charon.plugins.load-tester.mode " [tunnel]"
+IPsec mode to use, one of \fBtunnel\fR, \fBtransport\fR, or \fBbeet\fR.
+.TP
.BR charon.plugins.load-tester.pool
Provide INTERNAL_IPV4_ADDRs from a named pool
.TP