{"id":2686,"date":"2022-12-20T15:17:02","date_gmt":"2022-12-20T18:17:02","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/vpnc-man8\/"},"modified":"2022-12-20T15:17:02","modified_gmt":"2022-12-20T18:17:02","slug":"vpnc-man8","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/vpnc-man8\/","title":{"rendered":"VPNC (man8)"},"content":{"rendered":"<h1 align=\"center\">VPNC<\/h1>\n<p> <a href=\"#NAME\">NAME<\/a><br \/> <a href=\"#SYNOPSIS\">SYNOPSIS<\/a><br \/> <a href=\"#DESCRIPTION\">DESCRIPTION<\/a><br \/> <a href=\"#CONFIGURATION\">CONFIGURATION<\/a><br \/> <a href=\"#OPTIONS\">OPTIONS<\/a><br \/> <a href=\"#FILES\">FILES<\/a><br \/> <a href=\"#EXAMPLES\">EXAMPLES<\/a><br \/> <a href=\"#TODO\">TODO<\/a><br \/> <a href=\"#AUTHOR\">AUTHOR<\/a><br \/> <a href=\"#SEE ALSO\">SEE ALSO<\/a> <\/p>\n<hr>\n<h2>NAME <a name=\"NAME\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">vpnc \u2212 client for Cisco VPN3000 Concentrator, IOS and PIX<\/p>\n<h2>SYNOPSIS <a name=\"SYNOPSIS\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>vpnc<\/b> [<i>&#8211;version<\/i>] [<i>&#8211;print-config<\/i>] [<i>&#8211;help<\/i>] [<i>&#8211;long-help<\/i>] [<i>options<\/i>] [<i>config files<\/i>]<\/p>\n<h2>DESCRIPTION <a name=\"DESCRIPTION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">This manual page documents briefly the <b>vpnc<\/b> and <b>vpnc\u2212disconnect<\/b> commands.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>vpnc<\/b> is a VPN client for the Cisco 3000 VPN Concentrator, creating a IPSec-like connection as a tunneling network device for the local system. It uses the TUN\/TAP driver in Linux kernel 2.4 and above and device tun(4) on BSD. The created connection is presented as a tunneling network device to the local system.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">OBLIGATORY WARNING: the most used configuration (XAUTH authentication with pre-shared keys and password authentication) is insecure by design, be aware of this fact when you use vpnc to exchange sensitive data like passwords!<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">The vpnc daemon by itself does not set any routes, but it calls <b>vpnc\u2212script<\/b> to do this job. <b>vpnc\u2212script<\/b> displays a connect banner. If the concentrator supplies a network list for split-tunneling these networks are added to the routing table. Otherwise the default-route will be modified to point to the tunnel. Further a host route to the concentrator is added in the later case. If the client host needs DHCP, care must be taken to add another host route to the DHCP-Server around the tunnel.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">The <b>vpnc\u2212disconnect<\/b> command is used to terminate the connection previously created by <b>vpnc<\/b> and restore the previous routing configuration.<\/p>\n<h2>CONFIGURATION <a name=\"CONFIGURATION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">The daemon reads configuration data from the following places:<\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"10%\"><\/td>\n<td width=\"67%\">\n<p>command line options<\/p>\n<\/td>\n<td width=\"11%\"> <\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"10%\"><\/td>\n<td width=\"67%\">\n<p>config file(s) specified on the command line<\/p>\n<\/td>\n<td width=\"11%\"> <\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"10%\"><\/td>\n<td width=\"67%\">\n<p>\/etc\/vpnc\/default.conf<\/p>\n<\/td>\n<td width=\"11%\"> <\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"10%\"><\/td>\n<td width=\"67%\">\n<p>\/etc\/vpnc.conf<\/p>\n<\/td>\n<td width=\"11%\"> <\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"10%\"><\/td>\n<td width=\"67%\">\n<p>prompting the user if not found above<\/p>\n<\/td>\n<td width=\"11%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:11%; margin-top: 1em\">vpnc can parse options and <b>configuration files<\/b> in any order. However the first place to set an option wins. configuration filenames which do not contain a \/ will be searched at <b>\/etc\/vpnc\/<filename><\/b> and <b>\/etc\/vpnc\/<filename>.conf.<\/b> Otherwise <b><filename><\/b> and <b><filename>.conf<\/b> will be used. If no configuration file is specified on the command-line at all, both <b>\/etc\/vpnc\/default.conf<\/b> and <b>\/etc\/vpnc.conf<\/b> will be loaded.<\/p>\n<h2>OPTIONS <a name=\"OPTIONS\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">The program options can be either given as arguments (but not all of them for security reasons) or be stored in a configuration file. <b><br \/> \u2212\u2212gateway<\/b> <i><ip\/hostname><\/i><\/p>\n<p style=\"margin-left:22%;\">IP\/name of your IPSec gateway<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>IPSec gateway<\/b> <i><ip\/hostname><\/i> <b><br \/> \u2212\u2212id<\/b> <i><ASCII string><\/i><\/p>\n<p style=\"margin-left:22%;\">your group name<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>IPSec ID<\/b> <i><ASCII string><\/i> <b><br \/> (configfile only option)<\/b><\/p>\n<p style=\"margin-left:22%;\">your group password (cleartext)<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>IPSec secret<\/b> <i><ASCII string><\/i> <b><br \/> (configfile only option)<\/b><\/p>\n<p style=\"margin-left:22%;\">your group password (obfuscated)<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>IPSec obfuscated secret<\/b> <i><hex string><\/i> <b><br \/> \u2212\u2212username<\/b> <i><ASCII string><\/i><\/p>\n<p style=\"margin-left:22%;\">your username<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Xauth username<\/b> <i><ASCII string><\/i> <b><br \/> (configfile only option)<\/b><\/p>\n<p style=\"margin-left:22%;\">your password (cleartext)<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Xauth password<\/b> <i><ASCII string><\/i> <b><br \/> (configfile only option)<\/b><\/p>\n<p style=\"margin-left:22%;\">your password (obfuscated)<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Xauth obfuscated password<\/b> <i><hex string><\/i> <b><br \/> \u2212\u2212domain<\/b> <i><ASCII string><\/i><\/p>\n<p style=\"margin-left:22%;\">(NT\u2212) Domain name for authentication<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Domain<\/b> <i><ASCII string><\/i> <b><br \/> \u2212\u2212xauth\u2212inter<\/b><\/p>\n<p style=\"margin-left:22%;\">enable interactive extended authentication (for challenge response auth)<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Xauth interactive <br \/> \u2212\u2212vendor<\/b> <i><cisco\/netscreen><\/i><\/p>\n<p style=\"margin-left:22%;\">vendor of your IPSec gateway <br \/> Default: cisco<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Vendor<\/b> <i><cisco\/netscreen><\/i> <b><br \/> \u2212\u2212natt\u2212mode<\/b> <i><natt\/none\/force\u2212natt\/cisco\u2212udp><\/i><\/p>\n<p style=\"margin-left:22%;\">Which NAT\u2212Traversal Method to use:<\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>natt \u2212\u2212 NAT\u2212T as defined in RFC3947<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>none \u2212\u2212 disable use of any NAT\u2212T method<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>force\u2212natt \u2212\u2212 always use NAT\u2212T encapsulation even without presence of a NAT device (useful if the OS captures all ESP traffic)<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>cisco\u2212udp \u2212\u2212 Cisco proprietary UDP encapsulation, commonly over Port 10000<\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:22%;\">Note: cisco\u2212tcp encapsulation is not yet supported <br \/> Default: natt<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>NAT Traversal Mode<\/b> <i><natt\/none\/force\u2212natt\/cisco\u2212udp><\/i> <b><br \/> \u2212\u2212script<\/b> <i><command><\/i><\/p>\n<p style=\"margin-left:22%;\">command is executed using system() to configure the interface, routing and so on. Device name, IP, etc. are passed using enviroment variables, see README. This script is executed right after ISAKMP is done, but before tunneling is enabled. It is called when vpnc terminates, too <br \/> Default: \/etc\/vpnc\/vpnc\u2212script<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Script<\/b> <i><command><\/i> <b><br \/> \u2212\u2212dh<\/b> <i><dh1\/dh2\/dh5><\/i><\/p>\n<p style=\"margin-left:22%;\">name of the IKE DH Group <br \/> Default: dh2<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>IKE DH Group<\/b> <i><dh1\/dh2\/dh5><\/i> <b><br \/> \u2212\u2212pfs<\/b> <i><nopfs\/dh1\/dh2\/dh5\/server><\/i><\/p>\n<p style=\"margin-left:22%;\">Diffie\u2212Hellman group to use for PFS <br \/> Default: server<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Perfect Forward Secrecy<\/b> <i><nopfs\/dh1\/dh2\/dh5\/server><\/i> <b><br \/> \u2212\u2212enable\u22121des<\/b><\/p>\n<p style=\"margin-left:22%;\">enables weak single DES encryption<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Enable Single DES <br \/> \u2212\u2212enable\u2212no\u2212encryption<\/b><\/p>\n<p style=\"margin-left:22%;\">enables using no encryption for data traffic (key exchanged must be encrypted)<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Enable no encryption <br \/> \u2212\u2212application\u2212version<\/b> <i><ASCII string><\/i><\/p>\n<p style=\"margin-left:22%;\">Application Version to report. Note: Default string is generated at runtime. <br \/> Default: Cisco Systems VPN Client 0.5.3:Linux<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Application version<\/b> <i><ASCII string><\/i> <b><br \/> \u2212\u2212ifname<\/b> <i><ASCII string><\/i><\/p>\n<p style=\"margin-left:22%;\">visible name of the TUN\/TAP interface<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Interface name<\/b> <i><ASCII string><\/i> <b><br \/> \u2212\u2212ifmode<\/b> <i><tun\/tap><\/i><\/p>\n<p style=\"margin-left:22%;\">mode of TUN\/TAP interface:<\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>tun: virtual point to point interface (default)<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>tap: virtual ethernet interface<\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:22%;\">Default: tun<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Interface mode<\/b> <i><tun\/tap><\/i> <b><br \/> \u2212\u2212debug<\/b> <i><0\/1\/2\/3\/99><\/i><\/p>\n<p style=\"margin-left:22%;\">Show verbose debug messages<\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>0: Do not print debug information.<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>1: Print minimal debug information.<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>2: Show statemachine and packet\/payload type information.<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>3: Dump everything exluding authentication data.<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>99: Dump everything INCLUDING AUTHENTICATION data (e.g. PASSWORDS).<\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Debug<\/b> <i><0\/1\/2\/3\/99><\/i> <b><br \/> \u2212\u2212no\u2212detach<\/b><\/p>\n<p style=\"margin-left:22%;\">Don\u2019t detach from the console after login<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>No Detach <br \/> \u2212\u2212pid\u2212file<\/b> <i><filename><\/i><\/p>\n<p style=\"margin-left:22%;\">store the pid of background process in <filename> <br \/> Default: \/var\/run\/vpnc.pid<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Pidfile<\/b> <i><filename><\/i> <b><br \/> \u2212\u2212local\u2212addr<\/b> <i><ip\/hostname><\/i><\/p>\n<p style=\"margin-left:22%;\">local IP to use for ISAKMP \/ ESP \/ &#8230; (0.0.0.0 == automatically assign) <br \/> Default: 0.0.0.0<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Local Addr<\/b> <i><ip\/hostname><\/i> <b><br \/> \u2212\u2212local\u2212port<\/b> <i><0\u221265535><\/i><\/p>\n<p style=\"margin-left:22%;\">local ISAKMP port number to use (0 == use random port) <br \/> Default: 500<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Local Port<\/b> <i><0\u221265535><\/i> <b><br \/> \u2212\u2212udp\u2212port<\/b> <i><0\u221265535><\/i><\/p>\n<p style=\"margin-left:22%;\">Local UDP port number to use (0 == use random port). This is only relevant if cisco\u2212udp nat\u2212traversal is used. This is the _local_ port, the remote udp port is discovered automatically. It is especially not the cisco\u2212tcp port. <br \/> Default: 10000<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Cisco UDP Encapsulation Port<\/b> <i><0\u221265535><\/i> <b><br \/> \u2212\u2212dpd\u2212idle<\/b> <i><0,10\u221286400><\/i><\/p>\n<p style=\"margin-left:22%;\">Send DPD packet after not receiving anything for <idle> seconds. Use 0 to disable DPD completely (both ways). <br \/> Default: 300<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>DPD idle timeout (our side)<\/b> <i><0,10\u221286400><\/i> <b><br \/> \u2212\u2212non\u2212inter<\/b><\/p>\n<p style=\"margin-left:22%;\">Don\u2019t ask anything, exit on missing options<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>Noninteractive <br \/> \u2212\u2212auth\u2212mode<\/b> <i><psk\/cert\/hybrid><\/i><\/p>\n<p style=\"margin-left:22%;\">Authentication mode:<\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>psk: pre\u2212shared key (default)<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>cert: server + client certificate (not implemented yet)<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"1%\">\n<p>\u2022<\/p>\n<\/td>\n<td width=\"9%\"><\/td>\n<td width=\"68%\">\n<p>hybrid: server certificate + xauth (if built with openssl support)<\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:22%;\">Default: psk<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>IKE Authmode<\/b> <i><psk\/cert\/hybrid><\/i> <b><br \/> \u2212\u2212ca\u2212file<\/b> <i><filename><\/i><\/p>\n<p style=\"margin-left:22%;\">filename and path to the CA\u2212PEM\u2212File<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>CA\u2212File<\/b> <i><filename><\/i> <b><br \/> \u2212\u2212ca\u2212dir<\/b> <i><directory><\/i><\/p>\n<p style=\"margin-left:22%;\">path of the trusted CA\u2212Directory <br \/> Default: \/etc\/ssl\/certs<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>CA\u2212Dir<\/b> <i><directory><\/i> <b><br \/> \u2212\u2212target\u2212network<\/b> <i><target network\/netmask><\/i><\/p>\n<p style=\"margin-left:22%;\">Target network in dotted decimal or CIDR notation <br \/> Default: 0.0.0.0\/0.0.0.0<\/p>\n<p style=\"margin-left:11%;\">conf\u2212variable: <b>IPSEC target network<\/b> <i><target network\/netmask><\/i><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"21%\">\n<p style=\"margin-top: 1em\"><b>\u2212\u2212print\u2212config<\/b><\/p>\n<\/td>\n<td width=\"68%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:22%;\">Prints your configuration; output can be used as vpnc.conf<\/p>\n<h2>FILES <a name=\"FILES\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>\/etc\/vpnc.conf \/etc\/vpnc\/default.conf<\/i><\/p>\n<p style=\"margin-left:22%;\">The default configuration file. You can specify the same config directives as with command line options and additionaly <b>IPSec secret<\/b> and <b>Xauth password<\/b> both supplying a cleartext password. Scrambled passwords from the Cisco configuration profiles can be used with <b>IPSec obfuscated secret<\/b> and <b>Xauth obfuscated password.<\/b><\/p>\n<p style=\"margin-left:22%; margin-top: 1em\">See <b>EXAMPLES<\/b> for further details.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>\/etc\/vpnc\/*.conf<\/i><\/p>\n<p style=\"margin-left:22%;\">vpnc will read configuration files in this directory when the config filename (with or without .conf) is specified on the command line.<\/p>\n<h2>EXAMPLES <a name=\"EXAMPLES\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">This is an example vpnc.conf with pre-shared keys:<\/p>\n<p style=\"margin-left:22%; margin-top: 1em\">IPSec gateway vpn.example.com <br \/> IPSec ID ExampleVpnPSK <br \/> IKE Authmode psk <br \/> IPSec secret PskS3cret! <br \/> Xauth username user@example.com <br \/> Xauth password USecr3t<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">And another one with hybrid authentication (requires that vpnc was built with openssl support):<\/p>\n<p style=\"margin-left:22%; margin-top: 1em\">IPSec gateway vpn.example.com <br \/> IPSec ID ExampleVpnHybrid <br \/> IKE Authmode hybrid <br \/> CA-Dir \/etc\/vpnc <b><br \/> or<\/b> <br \/> CA-File \/etc\/vpnc\/vpn-example-com.pem <br \/> IPSec secret HybS3cret? <br \/> Xauth username user@example.com <br \/> Xauth password 123456<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">The lines begin with a keyword (no leading spaces!). The values start exactly one space after the keywords, and run to the end of line. This lets you put any kind of weird character (except CR, LF and NUL) in your strings, but it does mean you can\u2019t add comments after a string, or spaces before them.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">In case the the <b>CA-Dir<\/b> option is used, your certificate needs to be named something like 722d15bd.X, where X is a manually assigned number to make sure that files with colliding hashes have different names. The number can be derived from the certificate file itself:<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">openssl x509 -subject_hash -noout -in \/etc\/vpnc\/vpn-example-com.pem<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">See also the <b>\u2212\u2212print\u2212config<\/b> option to generate a config file, and the example file in the package documentation directory where more advanced usage is demonstrated.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">Advanced features like manual setting of multiple target routes and disabling \/etc\/resolv.conf rewriting is documented in the README of the vpnc package.<\/p>\n<h2>TODO <a name=\"TODO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">Certificate support (Pre-Shared-Key + XAUTH is known to be insecure). <br \/> Further points can be found in the TODO file.<\/p>\n<h2>AUTHOR <a name=\"AUTHOR\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">This man-page has been written by Eduard Bloch <blade(at)debian.org> and Christian Lackas <delta(at)lackas.net>, based on vpnc README by Maurice Massar <vpnc(at)unix\u2212ag.uni\u2212kl.de>. Permission is granted to copy, distribute and\/or modify this document under the terms of the GNU General Public License, Version 2 any later version published by the Free Software Foundation.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">On Debian systems, the complete text of the GNU General Public License can be found in \/usr\/share\/common\u2212licenses\/GPL.<\/p>\n<h2>SEE ALSO <a name=\"SEE ALSO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>pcf2vpnc<\/b>(1), <b>cisco-decrypt<\/b>(1), <b>ip<\/b>(8), <b>ifconfig<\/b>(8), <b>route<\/b>(1), <b>http:\/\/www.unix\u2212ag.uni\u2212kl.de\/~massar\/vpnc\/<\/b><\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>  vpnc \u2212 client for Cisco VPN3000 Concentrator, IOS and PIX <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[5,52,4,38],"class_list":["post-2686","post","type-post","status-publish","format-standard","hentry","category-8-administracion-del-sistema","tag-5","tag-administracion","tag-man8","tag-vpnc"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/2686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=2686"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/2686\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=2686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=2686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=2686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}