ipsecd man page on OSF1

Man page or keyword search:  
man Server   12896 pages
apropos Keyword Search (all sections)
Output format
OSF1 logo
[printable version]

ipsecd(8)							     ipsecd(8)

NAME
       ipsecd - The IP Security (IPsec) daemon

SYNOPSIS
       /usr/sbin/ ipsecd [-b] [-d] [-h] [-l] [-f file] [-m level] [-o file]

OPTIONS
       Reads  the default backup SPD file (/etc/ipsec.spd.bak). This overrides
       the normal default SPD file (/etc/ipsec.spd)  and  any  file  specified
       with  the  -f option. If the daemon is subsequently signaled to reload,
       it will use the normal default SPD file or the  policy  file  specified
       with  -f.  Use  this  option when restarting the daemon after a failure
       that might be due to an invalid policy file.  Runs as a daemon process,
       detached from the controlling terminal. You should typically run ipsecd
       with this option.  Reserved.  Specifies the IPsec Security Policy Data‐
       base  (SPD)  file  that	the  daemon  should read.  The default file is
       /etc/ipsec.spd.	Displays a summary of command line options and	exits.
       Logs  packets  that  do	not  match  any selectors to the /var/adm/sys‐
       log.dated/current/auth.log file. You can also enable this  option  from
       within  the SysMan Menu IPsec application.  Specifies the message level
       for messages reported by the ipsecd daemon. Valid values for  the  mes‐
       sage  level  are as follows: Very quiet mode. The ipsecd daemon reports
       only warnings and errors.  Default mode. In addition  to	 warnings  and
       errors, the ipsecd daemon reports limited messages for each IKE negoti‐
       ation.  Verbose mode. In addition to warnings and  errors,  the	ipsecd
       daemon reports detailed messages about each IKE negotiation.  Redirects
       debugging output to the specified file.	Parses the contents of the SPD
       file, reporting any syntax errors, and then exits.  There may be policy
       errors which are not detectable until the policy takes effect and  will
       not be detected by this option.

DESCRIPTION
       The  ipsecd  daemon controls the operation of the IP security protocols
       in the system. It combines the function of an IPsec policy manager  and
       Internet Key Exchange (IKE) daemon.

       When  started,  ipsecd  reads  and parses the specified Security Policy
       Database (SPD) file. The daemon transfers the  information  needed  for
       enforcing the policy into the IPsec kernel packet processing engine.

       The  daemon  manages all requests to create security associations (SAs)
       needed to communicate securely with other IPsec systems.	  It  receives
       Internet Key Exchange (IKE) requests from other systems, validates that
       they match local policy, and generates the  cryptographic  keys	needed
       for the the SAs.	 The daemon initiates IKE exchanges with other systems
       in response to requests from the kernel packet processing  engine.  The
       kernel and the daemon communicate through the /dev/ipsec_engine pseudo-
       device.	By default, the daemon listens on UDP port 500 for IKE traffic
       with other systems.

       When  IPsec is enabled on the system, the default action is to drop all
       IP packets into and out of the system. The ipsecd daemon must  be  run‐
       ning to instantiate a policy that allows packets to flow. If the daemon
       is not started or is killed, all network traffic will be	 blocked.  The
       daemon  is  started  automatically  at  system  boot  time  if IPsec is
       enabled.

       If ipsecd receives a HUP signal, it rereads its SPD file and  instanti‐
       ates  a new security policy. If an existing connection rule is modified
       by the new policy, the SAs associated  with  that  connection  will  be
       deleted.	 Other existing SAs will remain in effect until they reach the
       end of their configured lifetimes.

       You typically manage IPsec by using the SysMan IPsec application.  How‐
       ever,  you  can manage the daemon directly using the /sbin/init.d/ipsec
       script. The following list shows the script options and	their  action:
       Starts  ipsecd if IPsec has been enabled through SysMan.	 After you run
       this script, the system is in "IP secure" mode. The ipsecd daemon  must
       be  running in order for IP traffic to flow into and out of the system.
       Stops ipsecd. If the system is in "IP secure" mode, no IP traffic  will
       flow  into  or out of the system. If IPsec processing has been disabled
       through SysMan, the system is taken out of "IP  secure"	mode.	Forces
       ipsecd  to reread its SPD file and enforce a new security policy. If an
       existing connection rule is modified by the new policy, the SAs associ‐
       ated  with  that	 connection  will  be deleted. Other existing SAs will
       remain in effect until they reach the end  of  their  configured	 life‐
       times.	Places the system into "IP secure" mode. If ipsecd is not run‐
       ning, no IP traffic will flow into or out of  the  system.   Takes  the
       system  out  of	"IP secure" mode. If ipsecd is not running, IP packets
       will flow with no security processing. If ipsecd is running, IP packets
       will flow with existing IPsec policy.

       When  running in a cluster, the default IPsec SPD file, /etc/ipsec.spd,
       applies to all cluster members because the cluster is a single security
       domain. A copy of ipsecd runs on each member of the cluster.

FILES
       Specifies  the  default	SPD file for the system. The file will contain
       keys when manual keying or pre-shared keys are in use.  Therefore,  the
       file  must have root-only access. In a cluster configuration, this is a
       cluster common file and contains the (common) IP	 security  policy  for
       the   cluster.	 The  SysMan  IPsec  application  saves	 the  previous
       /etc/ipsec.spd file with this name whenever the policy is changed  (for
       example,	 after	a reload signal). If an invalid SPD file is found when
       the daemon  is  started	or  reloaded,  the  /sbin/init.d/ipsec	script
       attempts	 to  start  the daemon with this SPD file.  This file contains
       template IPsec and IKE proposals as well	 as  configuration  parameters
       that are not changed during normal operation.

SEE ALSO
       Commands:   ipsec_certmake(8),	ipsec_certview(8),   ipsec_convert(8),
       ipsec_keypaircheck(8), ipsec_keytool(8), ipsec_mgr(8)

       Information: ipsec(7)

								     ipsecd(8)
[top]
                             _         _         _ 
                            | |       | |       | |     
                            | |       | |       | |     
                         __ | | __ __ | | __ __ | | __  
                         \ \| |/ / \ \| |/ / \ \| |/ /  
                          \ \ / /   \ \ / /   \ \ / /   
                           \   /     \   /     \   /    
                            \_/       \_/       \_/ 
More information is available in HTML format for server OSF1

List of man pages available for OSF1

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net