Provided by: strongswan-ike_5.1.2-0ubuntu2.11_amd64 bug

NAME

       charon-cmd - Simple IKE client (IPsec VPN client)

SYNOPSIS

       charon-cmd --host hostname --identity identity [ options ]

DESCRIPTION

       charon-cmd  is  a  program  for  setting  up  IPsec VPN connections using the Internet Key
       Exchange protocol (IKE) in version 1 and 2.  It  supports  a  number  of  different  road-
       warrior scenarios.

       Like  the  IKE  daemon charon, charon-cmd has to be run as root (or more specifically as a
       user with CAP_NET_ADMIN capability).

       Of the following options at least --host and --identity are  required.  Depending  on  the
       selected authentication profile credentials also have to be provided with their respective
       options.

       Many of the  charon-specific  configuration  options  in  strongswan.conf  also  apply  to
       charon-cmd.  For instance, to configure customized logging to stdout the following snippet
       can be used:

            charon-cmd {
                 filelog {
                      stdout {
                           default = 1
                           ike = 2
                           cfg = 2
                      }
                 }
            }

OPTIONS

       --help Prints usage information and a short summary of the available options.

       --version
              Prints the strongSwan version.

       --debug level
              Sets the default log level (defaults to 1).  level is a number between  -1  and  4.
              Refer  to  strongswan.conf for options that allow a more fine-grained configuration
              of the logging output.

       --host hostname
              DNS name or IP address to connect to.

       --identity identity
              Identity the client uses for the IKE exchange.

       --eap-identity identity
              Identity the client uses for EAP authentication.

       --xauth-username username
              Username the client uses for XAuth authentication.

       --remote-identity identity
              Server identity to expect, defaults to hostname.

       --cert path
              Trusted certificate, either for  authentication  or  trust  chain  validation.   To
              provide more than one certificate multiple --cert options can be used.

       --rsa path
              RSA  private  key  to use for authentication (if a password is required, it will be
              requested on demand).

       --p12 path
              PKCS#12 file with private key and certificates to use for authentication and  trust
              chain validation (if a password is required it will be requested on demand).

       --agent[=socket]
              Use  SSH  agent  for authentication. If socket is not specified it is read from the
              SSH_AUTH_SOCK environment variable.

       --local-ts subnet
              Additional traffic selector to propose for  our  side,  the  requested  virtual  IP
              address will always be proposed.

       --remote-ts subnet
              Traffic selector to propose for remote side, defaults to 0.0.0.0/0.

       --ike-proposal proposal
              IKE  proposal to offer instead of default. For IKEv1, a single proposal consists of
              one encryption algorithm, an integrity/PRF algorithm and  a  DH  group.  IKEv2  can
              propose multiple algorithms of the same kind. To specify multiple proposals, repeat
              the option.

       --esp-proposal proposal
              ESP proposal to offer instead of default. For IKEv1, a single proposal consists  of
              one  encryption  algorithm,  an  integrity  algorithm  and an optional DH group for
              Perfect Forward Secrecy rekeying. IKEv2 can propose multiple algorithms of the same
              kind. To specify multiple proposals, repeat the option.

       --ah-proposal proposal
              AH  proposal  to  offer instead of ESP. For IKEv1, a single proposal consists of an
              integrity algorithm and an optional DH group for Perfect Forward Secrecy  rekeying.
              IKEv2  can  propose  multiple  algorithms  of  the  same  kind. To specify multiple
              proposals, repeat the option.

       --profile name
              Authentication profile to use, the list of supported profiles can be found  in  the
              Authentication  Profiles sections below. Defaults to ikev2-pub if a private key was
              supplied, and to ikev2-eap otherwise.

   IKEv2 Authentication Profiles
       ikev2-pub
              IKEv2 with public key client and server authentication

       ikev2-eap
              IKEv2 with EAP client authentication and public key server authentication

       ikev2-pub-eap
              IKEv2 with public key and EAP client  authentication  (RFC  4739)  and  public  key
              server authentication

   IKEv1 Authentication Profiles
       The  following authentication profiles use either Main Mode or Aggressive Mode, the latter
       is denoted with a -am suffix.

       ikev1-pub, ikev1-pub-am
              IKEv1 with public key client and server authentication

       ikev1-xauth, ikev1-xauth-am
              IKEv1 with public key client and server authentication, followed  by  client  XAuth
              authentication

       ikev1-xauth-psk, ikev1-xauth-psk-am
              IKEv1  with  pre-shared  key  (PSK)  client  and server authentication, followed by
              client XAuth authentication (INSECURE!)

       ikev1-hybrid, ikev1-hybrid-am
              IKEv1 with  public  key  server  authentication  only,  followed  by  client  XAuth
              authentication

SEE ALSO

       strongswan.conf(5), ipsec(8)