iked man page
iked — Internet Key Exchange Daemon
|iked|| [-f |
The iked program communicates using the IKE protocol ( RFC 2409 ) to provide automatic keying for an IPsec capable host. The daemon communicates with the host os via PF_KEY ( RFC 2367 ) to obtain the local policy configuration and to receive key aquisition requests. The daemon is also capable of acting as a client or client gateway and can create appropriate IPsec policy entries on bahalf of the host or peer to faclilitate remote access IPsec VPN connectivity. For more informaiton, please see the ikea(1) and ikec(1) man pages.
The options are as follows:
- Specify an alternate configuration file.
- Specify a log output file.
- Specify debug output level between 0-6.
- Spefify a process id file.
- Run the program as a foreground application.
The command exits with 0 on success, and non-zero on errors.
The default configuration file is
ikea(1), ikec(1), ipsec(4), iked.conf(5), setkey(8)
The iked program was written by Matthew Grooms ( email@example.com ) as part of the Shrew Soft ( http://www.shrew.net ) family of IPsec products.
ikec(1), iked.conf(5), qikea(1), qikec(1), racoon2-pskgen(8), racoon2-spmd(8).