charon-cmd
Description
charon-cmd
is a command-line program for setting up IPsec VPN connections
using the Internet Key Exchange protocol (IKE) in version 1 and 2. It supports a
number of different road-warrior scenarios. Like the IKE
charon
daemon, charon-cmd
has to be run as
root
(or more specifically as a user with CAP_NET_ADMIN
capability).
Of the options below at least --host
and --identity
are required.
Depending on the selected authentication profile, credentials also have to be
provided with their respective options.
Many of the charon
-specific configuration options
in strongswan.conf
also apply to charon-cmd
.
For instance, to configure customized logging to stdout
the following snippet
can be used:
charon-cmd { filelog { stdout { default = 1 ike = 2 cfg = 2 } } }
Options
Option | Description |
---|---|
|
Prints usage information and a short summary of the available options |
|
Prints the strongSwan version |
|
Sets the default log level (defaults to |
|
DNS name of IP address to connect to |
|
Identity the client uses for the IKE exchange |
|
Server identity to expect, defaults to hostname |
|
Trusted certificate, either for authentication or trust chain validation. To
provide more than one certificate multiple |
|
RSA private key to use for authentication (if a password is required, it will
be requested on demand). For other key types use |
|
Private key to use for authentication (if a password is required, it will be requested on demand) |
|
PKCS#12 file with private key and certificates to use for authentication and trust chain validation (if a password is required it will be requested on demand) |
|
Use SSH agent for authentication. If socket is not specified it is read from the
|
|
Additional traffic selector to propose for our side, the requested virtual IP address will always be proposed |
|
Traffic selector to propose for the remote side, defaults to |
|
Authentication profile to use. The list of supported profiles can be found in
the Authentication Profiles sections juat below.
Defaults to |
Authentication Profiles
IKEv2 Profiles
Name | Description |
---|---|
|
IKEv2 with public key client and server authentication |
|
IKEv2 with EAP client authentication and public key server authentication |
|
IKEv2 with public key and EAP client authentication (RFC 4739) and public key server authentication |
IKEv1 Main Mode Profiles
Name | Description |
---|---|
|
IKEv1 with public key client and server authentication |
|
IKEv1 with public key client and server authentication, followed by client XAuth authentication |
|
IKEv1 with pre-shared key (PSK) client and server authentication, followed by client XAuth authentication |
|
IKEv1 with public key server authentication only, followed by client XAuth authentication |
IKEv1 Aggressive Mode Profiles
Name | Description |
---|---|
|
IKEv1 with public key client and server authentication |
|
IKEv1 with public key client and server authentication, followed by client XAuth authentication |
|
IKEv1 with pre-shared key (PSK) client and server authentication, followed by client XAuth authentication. INSECURE!!! |
|
IKEv1 with public key server authentication only, followed by client XAuth authentication |