1 .TH @IPSEC_SCRIPT_UPPER@ 8 "2012-06-19" "@IPSEC_VERSION@" "strongSwan"
3 @IPSEC_SCRIPT@ \- invoke IPsec utilities
6 \fIcommand\fP [ \fIarguments\fP ] [ \fIoptions\fP ]
11 utility invokes any of several utilities involved in controlling and monitoring
12 the IPsec encryption/authentication system, running the specified \fIcommand\fP
13 with the specified \fIarguments\fP and \fIoptions\fP as if it had been invoked
14 directly. This largely eliminates possible name collisions with other software,
15 and also permits some centralized services.
17 All the commands described in this manual page are built-in and are used to
18 control and monitor IPsec connections as well as the IKE daemons.
24 with a suitable PATH environment variable,
25 and also provides IPSEC_DIR,
26 IPSEC_CONFS, and IPSEC_VERSION environment variables,
27 containing respectively
28 the full pathname of the directory where the IPsec utilities are stored,
29 the full pathname of the directory where the configuration files live,
30 and the IPsec version number.
34 .B "start [ starter options ]"
37 which in turn parses \fIipsec.conf\fR and starts the IKEv1/IKEv2 daemon
42 sends a \fIHUP\fR signal to
44 which in turn determines any changes in \fIipsec.conf\fR
45 and updates the configuration on the running IKE daemon \fIcharon\fR.
49 sends a \fIUSR1\fR signal to
51 which in turn reloads the whole configuration on the running IKE daemon
52 \fIcharon\fR based on the actual \fIipsec.conf\fR.
60 after a guard of 2 seconds.
64 terminates all IPsec connections and stops the IKE daemon \fIcharon\fR
65 by sending a \fITERM\fR signal to
70 tells the IKE daemon to start up connection \fIname\fP.
74 tells the IKE daemon to terminate connection \fIname\fP.
77 .B "down \fIname{n}\fP"
78 terminates IKEv1 Quick Mode and IKEv2 CHILD SA instance \fIn\fP of
79 connection \fIname\fP.
82 .B "down \fIname{*}\fP"
83 terminates all IKEv1 Quick Mode and IKEv2 CHILD SA instances of connection
87 .B "down \fIname[n]\fP"
88 terminates IKE SA instance \fIn\fP of connection \fIname\fP.
91 .B "down \fIname[*]\fP"
92 terminates all IKE SA instances of connection \fIname\fP.
96 tells the IKE daemon to insert an IPsec policy in the kernel
97 for connection \fIname\fP. The first payload packet matching the IPsec policy
98 will automatically trigger an IKE connection setup.
101 .B "unroute \fIname\fP"
102 remove the IPsec policy in the kernel for connection \fIname\fP.
105 .B "status [ \fIname\fP ]"
106 returns concise status information either on connection
107 \fIname\fP or if the argument is lacking, on all connections.
110 .B "statusall [ \fIname\fP ]"
111 returns detailed status information either on connection
112 \fIname\fP or if the argument is lacking, on all connections.
117 returns a list supported cryptographic algorithms usable for IKE, and their
118 corresponding plugin.
121 .B "listpubkeys [ --utc ]"
122 returns a list of RSA public keys that were either loaded in raw key format
123 or extracted from X.509 and|or OpenPGP certificates.
126 .B "listcerts [ --utc ]"
127 returns a list of X.509 and|or OpenPGP certificates that were either loaded
128 locally by the IKE daemon or received via the IKE protocol.
131 .B "listcacerts [ --utc ]"
132 returns a list of X.509 Certification Authority (CA) certificates that were
133 loaded locally by the IKE daemon from the \fI/etc/ipsec.d/cacerts/\fP
134 directory or received via the IKE protocol.
137 .B "listaacerts [ --utc ]"
138 returns a list of X.509 Authorization Authority (AA) certificates that were
139 loaded locally by the IKE daemon from the \fI/etc/ipsec.d/aacerts/\fP
143 .B "listocspcerts [ --utc ]"
144 returns a list of X.509 OCSP Signer certificates that were either loaded
145 locally by the IKE daemon from the \fI/etc/ipsec.d/ocspcerts/\fP
146 directory or were sent by an OCSP server.
149 .B "listacerts [ --utc ]"
150 returns a list of X.509 Attribute certificates that were loaded locally by
151 the IKE daemon from the \fI/etc/ipsec.d/acerts/\fP directory.
154 .B "listgroups [ --utc ]"
155 returns a list of groups that are used to define user authorization profiles.
158 .B "listcainfos [ --utc ]"
159 returns certification authority information (CRL distribution points, OCSP URIs,
160 LDAP servers) that were defined by
162 sections in \fIipsec.conf\fP.
165 .B "listcrls [ --utc ]"
166 returns a list of Certificate Revocation Lists (CRLs) that were either loaded
167 by the IKE daemon from the \fI/etc/ipsec.d/crls\fP directory or fetched from
168 an HTTP- or LDAP-based CRL distribution point.
171 .B "listocsp [ --utc ]"
172 returns revocation information fetched from OCSP servers.
175 .B "listall [ --utc ]"
176 returns all information generated by the list commands above. Each list command
177 can be called with the
179 option which displays all dates in UTC instead of local time.
184 flushes and rereads all secrets defined in \fIipsec.secrets\fP.
188 reads all certificate files contained in the \fI/etc/ipsec.d/cacerts\fP
189 directory and adds them to the list of Certification Authority (CA)
194 reads all certificate files contained in the \fI/etc/ipsec.d/aacerts\fP
195 directory and adds them to the list of Authorization Authority (AA)
200 reads all certificate files contained in the \fI/etc/ipsec.d/ocspcerts/\fP
201 directory and adds them to the list of OCSP signer certificates.
205 reads all certificate files contained in the \fI/etc/ipsec.d/acerts/\fP
206 directory and adds them to the list of attribute certificates.
210 reads all Certificate Revocation Lists (CRLs) contained in the
211 \fI/etc/ipsec.d/crls/\fP directory and adds them to the list of CRLs.
215 executes all reread commands listed above.
220 purges IKE SAs that don't have a Quick Mode or CHILD SA.
224 purges all cached OCSP information records.
229 returns the usage information for the
235 returns the version in the form of
236 .B Linux strongSwan U<strongSwan userland version>/K<Linux kernel version>
237 if strongSwan uses the native NETKEY IPsec stack of the Linux kernel it is
242 returns the version number in the form of
243 .B U<strongSwan userland version>/K<Linux kernel version>
244 if strongSwan uses the native NETKEY IPsec stack of the Linux kernel it is
249 returns the copyright information.
253 returns the \fILIBEXECDIR\fP directory as defined by the configure options.
257 returns the \fISYSCONFDIR\fP directory as defined by the configure options.
259 /usr/local/lib/ipsec usual utilities directory
262 The following environment variables control where strongSwan finds its
266 command sets them if they are not already set.
270 IPSEC_DIR directory containing ipsec programs and utilities
271 IPSEC_SBINDIR directory containing \fBipsec\fP command
272 IPSEC_CONFDIR directory containing configuration files
273 IPSEC_PIDDIR directory containing PID files
274 IPSEC_SCRIPT name of the ipsec script
275 IPSEC_NAME name of ipsec distribution
276 IPSEC_VERSION version numer of ipsec userland and kernel
277 IPSEC_STARTER_PID PID file for ipsec starter
278 IPSEC_CHARON_PID PID file for IKE keying daemon
284 ipsec.conf(5), ipsec.secrets(5)
289 Originally written for the FreeS/WAN project by Henry Spencer.
290 Updated and extended for the strongSwan project <http://www.strongswan.org> by
291 Tobias Brunner and Andreas Steffen.