From: Tobias Brunner Date: Tue, 19 Oct 2010 15:17:15 +0000 (+0200) Subject: Changed some minor stuff in ipsec.conf(5) man page. X-Git-Tag: 4.5.0~16 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=a5477a6fa3564722c325603209b9fe58e7a8e2e6;p=thirdparty%2Fstrongswan.git Changed some minor stuff in ipsec.conf(5) man page. Also added some "links" to strongswan.conf(5). --- diff --git a/man/ipsec.conf.5.in b/man/ipsec.conf.5.in index 6ca8cf27a0..187f369574 100644 --- a/man/ipsec.conf.5.in +++ b/man/ipsec.conf.5.in @@ -233,6 +233,9 @@ defines the identity of the AAA backend used during IKEv2 EAP authentication. This is required if the EAP client uses a method that verifies the server identity (such as EAP-TLS), but it does not match the IKEv2 gateway identity. .TP +.BR also " = " +includes conn section +.BR . .TP .BR auth " = " esp " | ah" whether authentication should be done as part of @@ -247,9 +250,9 @@ The IKEv2 daemon currently supports ESP only. .BR authby " = " pubkey " | rsasig | ecdsasig | psk | eap | never | xauth..." how the two security gateways should authenticate each other; acceptable values are -.B secret -or .B psk +or +.B secret for pre-shared secrets, .B pubkey (the default) for public key signatures as well as the synonyms @@ -360,6 +363,9 @@ dead peers. defines the timeout interval, after which all connections to a peer are deleted in case of inactivity. This only applies to IKEv1, in IKEv2 the default retransmission timeout applies, as every exchange is used to detect dead peers. +See +.IR strongswan.conf (5) +for a description of the IKEv2 retransmission timeout. .TP .BR inactivity " =