{"id":3746,"date":"2022-12-20T17:19:56","date_gmt":"2022-12-20T20:19:56","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/ipsec-man8\/"},"modified":"2022-12-20T17:19:56","modified_gmt":"2022-12-20T20:19:56","slug":"ipsec-man8","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/ipsec-man8\/","title":{"rendered":"IPSEC (man8)"},"content":{"rendered":"<h1 align=\"center\">IPSEC<\/h1>\n<p> <a href=\"#NAME\">NAME<\/a><br \/> <a href=\"#SYNOPSIS\">SYNOPSIS<\/a><br \/> <a href=\"#DESCRIPTION\">DESCRIPTION<\/a><br \/> <a href=\"#COMMANDS\">COMMANDS<\/a><br \/> <a href=\"#RETURN CODE\">RETURN CODE<\/a><br \/> <a href=\"#FILES\">FILES<\/a><br \/> <a href=\"#SEE ALSO\">SEE ALSO<\/a><br \/> <a href=\"#AUTHOR\">AUTHOR<\/a> <\/p>\n<hr>\n<h2>NAME <a name=\"NAME\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">ipsec \u2212 invoke IPsec utilities<\/p>\n<h2>SYNOPSIS <a name=\"SYNOPSIS\"><\/a> <\/h2>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"61%\">\n<p style=\"margin-top: 1em\"><b>ipsec<\/b> <i>command<\/i> [<i>argument<\/i>&#8230;] <i>ipsec<\/i> \u2212\u2212help<\/p>\n<\/td>\n<td width=\"28%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:20%;\"><i>ipsec<\/i> \u2212\u2212version <i><br \/> ipsec<\/i> \u2212\u2212directory<\/p>\n<h2>DESCRIPTION <a name=\"DESCRIPTION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>ipsec<\/i> invokes any of several utilities involved in controlling the IPsec encryption\/authentication system, running the specified <i>command<\/i> with the specified <i>argument<\/i>s as if it had been invoked directly. This largely eliminates possible name collisions with other software, and also permits some centralized services.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec \u2212\u2212help<\/b> lists the available commands. Most have their own manual pages, e.g. <b>ipsec_auto<\/b>(8) for <i>auto<\/i>.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec \u2212\u2212version<\/b> outputs the software version. A version code of the form \u2018\u2018U<i>xxx<\/i>\/K<i>yyy<\/i>&#8221; indicates that the user\u2212level utilities are version <i>xxx<\/i> but the kernel portion appears to be version <i>yyy<\/i> (this form is used only if the two disagree). For the NETKEY\/XFRM stack, the kernel version is used, always displaying the U\/K split.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec \u2212\u2212directory<\/b> reports where <b>ipsec<\/b> thinks the IPsec commands are stored.<\/p>\n<h2>COMMANDS <a name=\"COMMANDS\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">To get a list of supported commands, use ipsec \u2212\u2212help. A few of the commonly used commands are described below<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec setup start|stop|restart<\/b> maps to the host init system. Supported init systems are sysv, systemd, upstart and openrc.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec barf<\/b> dumps the internal system status to stdout for debugging<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec auto<\/b> is used to manually add, remove, up or down connections. For more information see &#8216;man ipsec_auto<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec whack<\/b> is used to communicate direct commands to the pluto daemon using the whack interface. For more information see &#8216;man ipsec_pluto&#8217;<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec initnss<\/b> initialises the NSS database that contains all the X.509 certificate information and private RSA keys<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec checknss [\u2212\u2212settrusts]<\/b> is used to check the NSS database and initialize it when it is not present and optionally set trust bits for CA certificates.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec import<\/b> is used to import PKCS#12 X.509 files into the NSS database<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec checknflog<\/b> is used to initialise iptables rules for the nflog devices when specified via the nflog= or nflog\u2212all= configuration options.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec stopnflog<\/b> is used to delete iptables rules for the nflog devices.<\/p>\n<h2>RETURN CODE <a name=\"RETURN CODE\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">The ipsec command passes the return code of the sub\u2212command back to the caller. The only exception is when <b>ipsec pluto<\/b> is used without \u2212\u2212nofork, as it will fork into the background and the ipsec command returns success while the pluto daemon may in fact exit with an error code after the fork.<\/p>\n<h2>FILES <a name=\"FILES\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">\/usr\/libexec\/ipsec usual utilities directory<\/p>\n<h2>SEE ALSO <a name=\"SEE ALSO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ipsec.conf<\/b>(5), <b>ipsec.secrets<\/b>(5), <b>ipsec_auto<\/b>(8), <b>ipsec_checknss<\/b>(8), <b>ipsec_initnss<\/b>(8), <b>ipsec_setup<\/b>(8), <b>ipsec_showhostkey<\/b>(8)<\/p>\n<h2>AUTHOR <a name=\"AUTHOR\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>Henry Spencer<\/b><\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>  ipsec \u2212 invoke IPsec utilities <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[5,52,851,4],"class_list":["post-3746","post","type-post","status-publish","format-standard","hentry","category-8-administracion-del-sistema","tag-5","tag-administracion","tag-ipsec","tag-man8"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/3746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=3746"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/3746\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=3746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=3746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=3746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}