-.TH STRONGSWAN.CONF 5 "2013-04-01" "@IPSEC_VERSION@" "strongSwan"
+.TH STRONGSWAN.CONF 5 "2013-06-21" "@IPSEC_VERSION@" "strongSwan"
.SH NAME
strongswan.conf \- strongSwan configuration file
.SH DESCRIPTION
.TP
.BR attest.load
Plugins to load in ipsec attest tool
+
.SS charon section
.TP
+.BR Note :
+Many of these options also apply to \fBcharon\-cmd\fR and other
+\fBcharon\fR derivatives. Just use their respective name (e.g.
+\fIcharon\-cmd\fR) instead of \fIcharon\fR.
+.TP
.BR charon.block_threshold " [5]"
Maximum number of half-open IKE_SAs for a single peer IP
.TP
/etc/strongswan.conf
.SH SEE ALSO
-ipsec.conf(5), ipsec.secrets(5), ipsec(8)
+\fBipsec.conf\fR(5), \fBipsec.secrets\fR(5), \fBipsec\fR(8), \fBcharon-cmd\fR(8)
+
.SH HISTORY
Written for the
.UR http://www.strongswan.org
-.TH CHARON\-CMD 8 "2013-06-16" "@IPSEC_VERSION@" "strongSwan"
+.TH CHARON\-CMD 8 "2013-06-21" "@IPSEC_VERSION@" "strongSwan"
.SH "NAME"
charon\-cmd \- Simple IKE client (IPsec VPN client)
.SH SYNOPSIS
.I profile
credentials also have to be provided with their respective options.
.PP
+Many of the
+.BR charon -specific
+configuration options in
+.I strongswan.conf
+also apply to
+.BR charon\-cmd .
+For instance, to configure customized logging to
+.B stdout
+the following snippet can be used:
+.PP
+.EX
+ charon-cmd {
+ filelog {
+ stdout {
+ default = 1
+ ike = 2
+ cfg = 2
+ }
+ }
+ }
+.EE
+.PP
.SH "OPTIONS"
.TP
.BI "\-\-host " hostname
authentication
.PP
.SH "SEE ALSO"
-\fBipsec\fR(8)
+\fBstrongswan.conf\fR(5), \fBipsec\fR(8)