NAME¶
iked —
Internet Key Exchange
Daemon
SYNOPSIS¶
iked |
[-f
cfgfile]
[-l
logfile]
[-d level]
[-F] |
DESCRIPTION¶
The
iked program communicates using the IKE protocol ( RFC
2409 ) to provide automatic keying for an IPsec capable host. The daemon
communicates with the host os via PF_KEY ( RFC 2367 ) to obtain the local
policy configuration and to receive key aquisition requests. The daemon is
also capable of acting as a client or client gateway and can create
appropriate IPsec policy entries on bahalf of the host or peer to faclilitate
remote access IPsec VPN connectivity. For more informaiton, please see the
ikea(1) and
ikec(1) man pages.
The options are as follows:
- -f
cfgfile
- Specify an alternate configuration file.
- -l
logfile
- Specify a log output file.
- -d
level
- Specify debug output level between 0-6.
- -p
pidfile
- Spefify a process id file.
- -F
- Run the program as a foreground application.
RETURN VALUES¶
The command exits with 0 on success, and non-zero on errors.
FILES¶
The default configuration file is
/etc/iked.conf
SEE ALSO¶
ikea(1),
ikec(1),
ipsec(4),
iked.conf(5),
setkey(8)
HISTORY¶
The
iked program was written by Matthew Grooms (
mgrooms@shrew.net ) as part of the Shrew Soft (
http://www.shrew.net ) family
of IPsec products.