NAME
iked - Internet Key Exchange Daemon
SYNOPSIS
iked [-f cfgfile] [-l logfile] [-d level] [-F]
DESCRIPTION
The iked program communicates using the IKE protocol ( RFC 2409 ) to
provide automatic keying for an IPsec capable host. The daemon
communicates with the host os via PF_KEY ( RFC 2367 ) to obtain the local
policy configuration and to receive key aquisition requests. The daemon
is also capable of acting as a client or client gateway and can create
appropriate IPsec policy entries on bahalf of the host or peer to
faclilitate remote access IPsec VPN connectivity. For more informaiton,
please see the ikea(1) and ikec(1) man pages.
The options are as follows:
-f cfgfile Specify an alternate configuration file.
-l logfile Specify a log output file.
-d level Specify debug output level between 0-6.
-F Run the program as a foreground application.
RETURN VALUES
The command exits with 0 on success, and non-zero on errors.
FILES
The default configuration file is /etc/iked.conf
SEE ALSO
ikea(1), ikec(1), ipsec(4), iked.conf(5), setkey(8)
HISTORY
The iked program was written by Matthew Grooms ( mgrooms@shrew.net ) as
part of the Shrew Soft ( http://www.shrew.net ) family of IPsec products.