From 72970b458d3804b3cbeefca48c209ce6f162c2c3 Mon Sep 17 00:00:00 2001 From: Tobias Brunner Date: Wed, 12 Sep 2012 15:44:00 +0200 Subject: [PATCH] Some updates to ipsec.conf(5) man page --- man/ipsec.conf.5.in | 119 ++++++++++++++++++++++++++------------------ 1 file changed, 70 insertions(+), 49 deletions(-) diff --git a/man/ipsec.conf.5.in b/man/ipsec.conf.5.in index 73db23511e..3c9f264092 100644 --- a/man/ipsec.conf.5.in +++ b/man/ipsec.conf.5.in @@ -233,6 +233,9 @@ defines the identity of the AAA backend used during IKEv2 EAP authentication. This is required if the EAP client uses a method that verifies the server identity (such as EAP-TLS), but it does not match the IKEv2 gateway identity. .TP +.BR aggressive " = yes | " no +whether to use IKEv1 Aggressive or Main Mode (the default). +.TP .BR also " = " includes conn section .BR . @@ -280,12 +283,12 @@ loads a connection without starting it. loads a connection and installs kernel traps. If traffic is detected between .B leftsubnet and -.B rightsubnet -, a connection is established. +.BR rightsubnet , +a connection is established. .B start loads a connection and brings it up immediately. .B ignore -ignores the connection. This is equal to delete a connection from the config +ignores the connection. This is equal to deleting a connection from the config file. Relevant only locally, other end need not agree on it. .TP @@ -353,7 +356,7 @@ defines the timeout interval, after which a CHILD_SA is closed if it did not send or receive any traffic. .TP .BR eap_identity " = " -defines the identity the client uses to reply to a EAP Identity request. +defines the identity the client uses to reply to an EAP Identity request. If defined on the EAP server, the defined identity will be used as peer identity during EAP authentication. The special value .B %identity @@ -410,7 +413,7 @@ In IKEv2, multiple algorithms and proposals may be included, such as aes128-aes256-sha1-modp1536-modp2048,3des-sha1-md5-modp1024. .br Defaults to -.B aes128-sha1-modp2048,3des-sha1-modp1536 . +.BR aes128-sha1-modp2048,3des-sha1-modp1536 . The daemon adds its extensive default proposal to this default or the configured value. To restrict it to the configured proposal an exclamation mark @@ -421,7 +424,7 @@ can be added at the end. As a responder the daemon accepts the first supported proposal received from the peer. In order to restrict a responder to only accept specific cipher suites, the strict flag -.BR ( ! , +.RB ( ! , exclamation mark) can be used, e.g: aes256-sha512-modp4096! .TP .BR ikelifetime " = " 3h " |