NAME¶
iked
—
Internet Key Exchange Daemon
SYNOPSIS¶
iked |
[ -f
cfgfile ]
[-l
logfile ]
[-d
level ]
[-F ] |
DESCRIPTION¶
The
iked
program communicates using the IKE
protocol ( RFC 2409 ) to provide automatic keying for an IPsec capable host.
The daemon communicates with the host os via PF_KEY ( RFC 2367 ) to obtain the
local policy configuration and to receive key aquisition requests. The daemon
is also capable of acting as a client or client gateway and can create
appropriate IPsec policy entries on bahalf of the host or peer to faclilitate
remote access IPsec VPN connectivity. For more informaiton, please see the
ikea(1) and
ikec(1)
man pages.
The options are as follows:
-f
cfgfile
- Specify an alternate configuration file.
-l
logfile
- Specify a log output file.
-d
level
- Specify debug output level between 0-6.
-p
pidfile
- Spefify a process id file.
-F
- Run the program as a foreground application.
RETURN VALUES¶
The command exits with 0 on success, and non-zero on errors.
FILES¶
The default configuration file is
/etc/iked.conf
SEE ALSO¶
ikea(1),
ikec(1),
ipsec(4),
iked.conf(5),
setkey(8)
HISTORY¶
The
iked
program was written by Matthew
Grooms ( mgrooms@shrew.net ) as part of the Shrew Soft (
http://www.shrew.net
) family of IPsec products.