old-www/LDP/solrhe/Securing-Optimizing-Linux-R.../chap25sec208.html

1073 lines
14 KiB
HTML

<HTML
><HEAD
><TITLE
>Further documentation</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.60"><LINK
REL="HOME"
TITLE="Securing and Optimizing Linux"
HREF="index.html"><LINK
REL="UP"
TITLE="Linux FreeS/WAN VPN"
HREF="fSWAn.html"><LINK
REL="PREVIOUS"
TITLE="Testing the installation"
HREF="chap25sec207.html"><LINK
REL="NEXT"
TITLE="Installed files"
HREF="chap25sec209.html"></HEAD
><BODY
CLASS="section"
BGCOLOR="#FFFFFF"
TEXT="#000000"
LINK="#0000FF"
VLINK="#840084"
ALINK="#0000FF"
><DIV
CLASS="NAVHEADER"
><TABLE
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TH
COLSPAN="3"
ALIGN="center"
>Securing and Optimizing Linux: RedHat Edition -A Hands on Guide</TH
></TR
><TR
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="bottom"
><A
HREF="chap25sec207.html"
>Prev</A
></TD
><TD
WIDTH="80%"
ALIGN="center"
VALIGN="bottom"
>Chapter 25. Linux FreeS/WAN VPN</TD
><TD
WIDTH="10%"
ALIGN="right"
VALIGN="bottom"
><A
HREF="chap25sec209.html"
>Next</A
></TD
></TR
></TABLE
><HR
ALIGN="LEFT"
WIDTH="100%"></DIV
><DIV
CLASS="section"
><H1
CLASS="section"
><A
NAME="AEN15416"
>25.11. Further documentation</A
></H1
><P
>&#13;For more details, there are several man pages you can read:
</P
><P
></P
><DIV
CLASS="variablelist"
><DL
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec</SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- invoke <SPAN
CLASS="acronym"
>IPSEC</SPAN
> utilities
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atoasr</SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert <SPAN
CLASS="acronym"
>ASCII</SPAN
> to Internet address, subnet, or range
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atobytes, bytestoa</SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert binary data bytes from and to <SPAN
CLASS="acronym"
>ASCII</SPAN
> formats
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atodata, datatoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert binary data from and to <SPAN
CLASS="acronym"
>ASCII</SPAN
> formats
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atosa, satoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert <SPAN
CLASS="acronym"
>IPSEC</SPAN
> Security Association IDs to and from <SPAN
CLASS="acronym"
>ASCII</SPAN
>
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atosubnet, subnettoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert subnet/mask <SPAN
CLASS="acronym"
>ASCII</SPAN
> form to and from addresses
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atoul, ultoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert unsigned-long numbers to and from <SPAN
CLASS="acronym"
>ASCII</SPAN
>
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec auto </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- control automatically-keyed <SPAN
CLASS="acronym"
>IPSEC</SPAN
> connections
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec barf </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- spew out collected <SPAN
CLASS="acronym"
>IPSEC</SPAN
> debugging information
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec bitstomask </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert bit count to Internet subnet mask
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec eroute </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- manipulate <SPAN
CLASS="acronym"
>IPSEC</SPAN
> extended routing tables
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec goodmask </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- is this Internet subnet mask a valid one?
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec hostof </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- given Internet address and subnet mask, return host part
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec klipsdebug </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- set Klips -kernel <SPAN
CLASS="acronym"
>IPSEC</SPAN
> support, debug features and level
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec look </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- show minimal debugging information
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec manual </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- take manually-keyed <SPAN
CLASS="acronym"
>IPSEC</SPAN
> connections up and down
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec masktobits </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert Internet subnet mask to bit count
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec optionsfrom </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- read additional <TT
CLASS="literal"
>command-line</TT
> options from file
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec pluto </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- IPsec IKE keying daemon
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec ranbits </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- generate random bits in <SPAN
CLASS="acronym"
>ASCII</SPAN
> form
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec rangetoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert Internet address range to <SPAN
CLASS="acronym"
>ASCII</SPAN
>
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec rsasigkey </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- generate RSA signature key
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec setup </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- control <SPAN
CLASS="acronym"
>IPSEC</SPAN
> subsystem
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec spi </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- manage <SPAN
CLASS="acronym"
>IPSEC</SPAN
> Security Associations
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec spigrp </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- group/ungroup <SPAN
CLASS="acronym"
>IPSEC</SPAN
> Security Associations
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec subnetof </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- given Internet address and subnet mask, return subnet number
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec tncfg </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- associate <SPAN
CLASS="acronym"
>IPSEC</SPAN
> virtual interface with real interface
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec whack </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- control interface for <SPAN
CLASS="acronym"
>IPSEC</SPAN
> keying daemon
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec.conf </SPAN
>(5)</SPAN
></DT
><DD
><P
>&#13;- <SPAN
CLASS="acronym"
>IPSEC</SPAN
> configuration and connections
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec.secrets </SPAN
>(5)</SPAN
></DT
><DD
><P
>&#13;- secrets for IKE/IPsec authentication
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- invoke <SPAN
CLASS="acronym"
>IPSEC</SPAN
> utilities
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atoaddr, addrtoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert Internet addresses to and from <SPAN
CLASS="acronym"
>ASCII</SPAN
>
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atoasr </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert <SPAN
CLASS="acronym"
>ASCII</SPAN
> to Internet address, subnet, or range
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atobytes, bytestoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert binary data bytes from and to <SPAN
CLASS="acronym"
>ASCII</SPAN
> formats
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atodata, datatoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert binary data from and to <SPAN
CLASS="acronym"
>ASCII</SPAN
> formats
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atosa, satoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert <SPAN
CLASS="acronym"
>IPSEC</SPAN
> Security Association IDs to and from <SPAN
CLASS="acronym"
>ASCII</SPAN
>
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atosubnet, subnettoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert subnet/mask <SPAN
CLASS="acronym"
>ASCII</SPAN
> form to and from addresses
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec atoul, ultoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert unsigned-long numbers to and from <SPAN
CLASS="acronym"
>ASCII</SPAN
>
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec auto </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- control automatically-keyed <SPAN
CLASS="acronym"
>IPSEC</SPAN
> connections
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec barf </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- spew out collected <SPAN
CLASS="acronym"
>IPSEC</SPAN
> debugging information
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec bitstomask </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert bit count to Internet subnet mask
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec eroute </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- manipulate <SPAN
CLASS="acronym"
>IPSEC</SPAN
> extended routing tables
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec goodmask </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- is this Internet subnet mask a valid one?
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec hostof </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- given Internet address and subnet mask, return host part
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec klipsdebug </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- set Klips (kernel <SPAN
CLASS="acronym"
>IPSEC</SPAN
> support) debug features and level
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec look </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- show minimal debugging information
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec manual </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- take manually-keyed <SPAN
CLASS="acronym"
>IPSEC</SPAN
> connections up and down
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec masktobits </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert Internet subnet mask to bit count
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec optionsfrom </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- read additional <TT
CLASS="literal"
>command-line</TT
> options from file
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec pluto </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- IPsec IKE keying daemon
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec ranbits </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- generate random bits in <SPAN
CLASS="acronym"
>ASCII</SPAN
> form
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec rangetoa </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- convert Internet address range to <SPAN
CLASS="acronym"
>ASCII</SPAN
>
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec rsasigkey </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- generate RSA signature key
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec setup </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- control <SPAN
CLASS="acronym"
>IPSEC</SPAN
> subsystem
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec spi </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- manage <SPAN
CLASS="acronym"
>IPSEC</SPAN
> Security Associations
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec spigrp </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- group/ungroup <SPAN
CLASS="acronym"
>IPSEC</SPAN
> Security Associations
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec subnetof </SPAN
>(3)</SPAN
></DT
><DD
><P
>&#13;- given Internet address and subnet mask, return subnet number
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec tncfg </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- associate <SPAN
CLASS="acronym"
>IPSEC</SPAN
> virtual interface with real interface
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec whack </SPAN
>(8)</SPAN
></DT
><DD
><P
>&#13;- control interface for <SPAN
CLASS="acronym"
>IPSEC</SPAN
> keying daemon
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec.conf </SPAN
>(5)</SPAN
></DT
><DD
><P
>&#13;- <SPAN
CLASS="acronym"
>IPSEC</SPAN
> configuration and connections
</P
></DD
><DT
><SPAN
CLASS="citerefentry"
><SPAN
CLASS="refentrytitle"
>ipsec.secrets </SPAN
>(5)</SPAN
></DT
><DD
><P
>&#13;- secrets for IKE/IPsec authentication
</P
></DD
></DL
></DIV
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
><A
HREF="chap25sec207.html"
>Prev</A
></TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="index.html"
>Home</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="chap25sec209.html"
>Next</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>Testing the installation</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="fSWAn.html"
>Up</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>Installed files</TD
></TR
></TABLE
></DIV
></BODY
></HTML
>