xref: /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/vpnc/vpnc/long-help (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593SmuzhiyunUsage: vpnc [--version] [--print-config] [--help] [--long-help] [options] [config files]
2*4882a593Smuzhiyun
3*4882a593SmuzhiyunOptions:
4*4882a593Smuzhiyun  --gateway <ip/hostname>
5*4882a593Smuzhiyun      IP/name of your IPSec gateway
6*4882a593Smuzhiyun  conf-variable: IPSec gateway <ip/hostname>
7*4882a593Smuzhiyun
8*4882a593Smuzhiyun  --id <ASCII string>
9*4882a593Smuzhiyun      your group name
10*4882a593Smuzhiyun  conf-variable: IPSec ID <ASCII string>
11*4882a593Smuzhiyun
12*4882a593Smuzhiyun  (configfile only option)
13*4882a593Smuzhiyun      your group password (cleartext)
14*4882a593Smuzhiyun  conf-variable: IPSec secret <ASCII string>
15*4882a593Smuzhiyun
16*4882a593Smuzhiyun  (configfile only option)
17*4882a593Smuzhiyun      your group password (obfuscated)
18*4882a593Smuzhiyun  conf-variable: IPSec obfuscated secret <hex string>
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun  --username <ASCII string>
21*4882a593Smuzhiyun      your username
22*4882a593Smuzhiyun  conf-variable: Xauth username <ASCII string>
23*4882a593Smuzhiyun
24*4882a593Smuzhiyun  (configfile only option)
25*4882a593Smuzhiyun      your password (cleartext)
26*4882a593Smuzhiyun  conf-variable: Xauth password <ASCII string>
27*4882a593Smuzhiyun
28*4882a593Smuzhiyun  (configfile only option)
29*4882a593Smuzhiyun      your password (obfuscated)
30*4882a593Smuzhiyun  conf-variable: Xauth obfuscated password <hex string>
31*4882a593Smuzhiyun
32*4882a593Smuzhiyun  --domain <ASCII string>
33*4882a593Smuzhiyun      (NT-) Domain name for authentication
34*4882a593Smuzhiyun  conf-variable: Domain <ASCII string>
35*4882a593Smuzhiyun
36*4882a593Smuzhiyun  --xauth-inter
37*4882a593Smuzhiyun      enable interactive extended authentication (for challenge response auth)
38*4882a593Smuzhiyun  conf-variable: Xauth interactive
39*4882a593Smuzhiyun
40*4882a593Smuzhiyun  --vendor <cisco/netscreen>
41*4882a593Smuzhiyun      vendor of your IPSec gateway
42*4882a593Smuzhiyun    Default: cisco
43*4882a593Smuzhiyun  conf-variable: Vendor <cisco/netscreen>
44*4882a593Smuzhiyun
45*4882a593Smuzhiyun  --natt-mode <natt/none/force-natt/cisco-udp>
46*4882a593Smuzhiyun      Which NAT-Traversal Method to use:
47*4882a593Smuzhiyun       * natt -- NAT-T as defined in RFC3947
48*4882a593Smuzhiyun       * none -- disable use of any NAT-T method
49*4882a593Smuzhiyun       * force-natt -- always use NAT-T encapsulation even
50*4882a593Smuzhiyun                       without presence of a NAT device
51*4882a593Smuzhiyun                       (useful if the OS captures all ESP traffic)
52*4882a593Smuzhiyun       * cisco-udp -- Cisco proprietary UDP encapsulation, commonly over Port 10000
53*4882a593Smuzhiyun      Note: cisco-tcp encapsulation is not yet supported
54*4882a593Smuzhiyun    Default: natt
55*4882a593Smuzhiyun  conf-variable: NAT Traversal Mode <natt/none/force-natt/cisco-udp>
56*4882a593Smuzhiyun
57*4882a593Smuzhiyun  --script <command>
58*4882a593Smuzhiyun      command is executed using system() to configure the interface,
59*4882a593Smuzhiyun      routing and so on. Device name, IP, etc. are passed using enviroment
60*4882a593Smuzhiyun      variables, see README. This script is executed right after ISAKMP is
61*4882a593Smuzhiyun      done, but before tunneling is enabled. It is called when vpnc
62*4882a593Smuzhiyun      terminates, too
63*4882a593Smuzhiyun    Default: /etc/vpnc/vpnc-script
64*4882a593Smuzhiyun  conf-variable: Script <command>
65*4882a593Smuzhiyun
66*4882a593Smuzhiyun  --dh <dh1/dh2/dh5>
67*4882a593Smuzhiyun      name of the IKE DH Group
68*4882a593Smuzhiyun    Default: dh2
69*4882a593Smuzhiyun  conf-variable: IKE DH Group <dh1/dh2/dh5>
70*4882a593Smuzhiyun
71*4882a593Smuzhiyun  --pfs <nopfs/dh1/dh2/dh5/server>
72*4882a593Smuzhiyun      Diffie-Hellman group to use for PFS
73*4882a593Smuzhiyun    Default: server
74*4882a593Smuzhiyun  conf-variable: Perfect Forward Secrecy <nopfs/dh1/dh2/dh5/server>
75*4882a593Smuzhiyun
76*4882a593Smuzhiyun  --enable-1des
77*4882a593Smuzhiyun      enables weak single DES encryption
78*4882a593Smuzhiyun  conf-variable: Enable Single DES
79*4882a593Smuzhiyun
80*4882a593Smuzhiyun  --enable-no-encryption
81*4882a593Smuzhiyun      enables using no encryption for data traffic (key exchanged must be encrypted)
82*4882a593Smuzhiyun  conf-variable: Enable no encryption
83*4882a593Smuzhiyun
84*4882a593Smuzhiyun  --application-version <ASCII string>
85*4882a593Smuzhiyun      Application Version to report. Note: Default string is generated at runtime.
86*4882a593Smuzhiyun    Default: Cisco Systems VPN Client 0.5.3-394:Linux
87*4882a593Smuzhiyun  conf-variable: Application version <ASCII string>
88*4882a593Smuzhiyun
89*4882a593Smuzhiyun  --ifname <ASCII string>
90*4882a593Smuzhiyun      visible name of the TUN/TAP interface
91*4882a593Smuzhiyun  conf-variable: Interface name <ASCII string>
92*4882a593Smuzhiyun
93*4882a593Smuzhiyun  --ifmode <tun/tap>
94*4882a593Smuzhiyun      mode of TUN/TAP interface:
95*4882a593Smuzhiyun       * tun: virtual point to point interface (default)
96*4882a593Smuzhiyun       * tap: virtual ethernet interface
97*4882a593Smuzhiyun    Default: tun
98*4882a593Smuzhiyun  conf-variable: Interface mode <tun/tap>
99*4882a593Smuzhiyun
100*4882a593Smuzhiyun  --debug <0/1/2/3/99>
101*4882a593Smuzhiyun      Show verbose debug messages
102*4882a593Smuzhiyun       *  0: Do not print debug information.
103*4882a593Smuzhiyun       *  1: Print minimal debug information.
104*4882a593Smuzhiyun       *  2: Show statemachine and packet/payload type information.
105*4882a593Smuzhiyun       *  3: Dump everything exluding authentication data.
106*4882a593Smuzhiyun       * 99: Dump everything INCLUDING AUTHENTICATION data (e.g. PASSWORDS).
107*4882a593Smuzhiyun  conf-variable: Debug <0/1/2/3/99>
108*4882a593Smuzhiyun
109*4882a593Smuzhiyun  --no-detach
110*4882a593Smuzhiyun      Don't detach from the console after login
111*4882a593Smuzhiyun  conf-variable: No Detach
112*4882a593Smuzhiyun
113*4882a593Smuzhiyun  --pid-file <filename>
114*4882a593Smuzhiyun      store the pid of background process in <filename>
115*4882a593Smuzhiyun    Default: /var/run/vpnc/pid
116*4882a593Smuzhiyun  conf-variable: Pidfile <filename>
117*4882a593Smuzhiyun
118*4882a593Smuzhiyun  --local-addr <ip/hostname>
119*4882a593Smuzhiyun      local IP to use for ISAKMP / ESP / ... (0.0.0.0 == automatically assign)
120*4882a593Smuzhiyun    Default: 0.0.0.0
121*4882a593Smuzhiyun  conf-variable: Local Addr <ip/hostname>
122*4882a593Smuzhiyun
123*4882a593Smuzhiyun  --local-port <0-65535>
124*4882a593Smuzhiyun      local ISAKMP port number to use (0 == use random port)
125*4882a593Smuzhiyun    Default: 500
126*4882a593Smuzhiyun  conf-variable: Local Port <0-65535>
127*4882a593Smuzhiyun
128*4882a593Smuzhiyun  --udp-port <0-65535>
129*4882a593Smuzhiyun      Local UDP port number to use (0 == use random port).
130*4882a593Smuzhiyun      This is only relevant if cisco-udp nat-traversal is used.
131*4882a593Smuzhiyun      This is the _local_ port, the remote udp port is discovered automatically.
132*4882a593Smuzhiyun      It is especially not the cisco-tcp port.
133*4882a593Smuzhiyun    Default: 10000
134*4882a593Smuzhiyun  conf-variable: Cisco UDP Encapsulation Port <0-65535>
135*4882a593Smuzhiyun
136*4882a593Smuzhiyun  --dpd-idle <0,10-86400>
137*4882a593Smuzhiyun      Send DPD packet after not receiving anything for <idle> seconds.
138*4882a593Smuzhiyun      Use 0 to disable DPD completely (both ways).
139*4882a593Smuzhiyun    Default: 300
140*4882a593Smuzhiyun  conf-variable: DPD idle timeout (our side) <0,10-86400>
141*4882a593Smuzhiyun
142*4882a593Smuzhiyun  --non-inter
143*4882a593Smuzhiyun      Don't ask anything, exit on missing options
144*4882a593Smuzhiyun  conf-variable: Noninteractive
145*4882a593Smuzhiyun
146*4882a593Smuzhiyun  --auth-mode <psk/cert/hybrid>
147*4882a593Smuzhiyun      Authentication mode:
148*4882a593Smuzhiyun       * psk:    pre-shared key (default)
149*4882a593Smuzhiyun       * cert:   server + client certificate (not implemented yet)
150*4882a593Smuzhiyun       * hybrid: server certificate + xauth (if built with openssl support)
151*4882a593Smuzhiyun    Default: psk
152*4882a593Smuzhiyun  conf-variable: IKE Authmode <psk/cert/hybrid>
153*4882a593Smuzhiyun
154*4882a593Smuzhiyun  --ca-file <filename>
155*4882a593Smuzhiyun      filename and path to the CA-PEM-File
156*4882a593Smuzhiyun  conf-variable: CA-File <filename>
157*4882a593Smuzhiyun
158*4882a593Smuzhiyun  --ca-dir <directory>
159*4882a593Smuzhiyun      path of the trusted CA-Directory
160*4882a593Smuzhiyun    Default: /etc/ssl/certs
161*4882a593Smuzhiyun  conf-variable: CA-Dir <directory>
162*4882a593Smuzhiyun
163*4882a593Smuzhiyun  --target-network <target network/netmask>
164*4882a593Smuzhiyun      Target network in dotted decimal or CIDR notation
165*4882a593Smuzhiyun    Default: 0.0.0.0/0.0.0.0
166*4882a593Smuzhiyun  conf-variable: IPSEC target network <target network/netmask>
167*4882a593Smuzhiyun
168*4882a593SmuzhiyunReport bugs to vpnc@unix-ag.uni-kl.de
169