summaryrefslogtreecommitdiff
path: root/static/netbsd/man4/ipsecif.4 3.html
diff options
context:
space:
mode:
authorJacob McDonnell <jacob@jacobmcdonnell.com>2026-04-25 19:59:05 -0400
committerJacob McDonnell <jacob@jacobmcdonnell.com>2026-04-25 19:59:05 -0400
commit1f19f33e45791ea59aed048796fc68672c6723a5 (patch)
tree54625fba89e91d1c2177801ec635e8528bba937f /static/netbsd/man4/ipsecif.4 3.html
parentac5e55f5f2af5b92794c2aded46c6bae85b5f5ed (diff)
docs: Removed Precompiled HTML
Diffstat (limited to 'static/netbsd/man4/ipsecif.4 3.html')
-rw-r--r--static/netbsd/man4/ipsecif.4 3.html142
1 files changed, 0 insertions, 142 deletions
diff --git a/static/netbsd/man4/ipsecif.4 3.html b/static/netbsd/man4/ipsecif.4 3.html
deleted file mode 100644
index 1282ca44..00000000
--- a/static/netbsd/man4/ipsecif.4 3.html
+++ /dev/null
@@ -1,142 +0,0 @@
-<table class="head">
- <tr>
- <td class="head-ltitle">IPSECIF(4)</td>
- <td class="head-vol">Device Drivers Manual</td>
- <td class="head-rtitle">IPSECIF(4)</td>
- </tr>
-</table>
-<div class="manual-text">
-<section class="Sh">
-<h1 class="Sh" id="NAME"><a class="permalink" href="#NAME">NAME</a></h1>
-<p class="Pp"><code class="Nm">ipsecif</code> &#x2014; <span class="Nd">IPsec
- interface</span></p>
-</section>
-<section class="Sh">
-<h1 class="Sh" id="SYNOPSIS"><a class="permalink" href="#SYNOPSIS">SYNOPSIS</a></h1>
-<p class="Pp"><code class="Cd">pseudo-device ipsecif</code></p>
-</section>
-<section class="Sh">
-<h1 class="Sh" id="DESCRIPTION"><a class="permalink" href="#DESCRIPTION">DESCRIPTION</a></h1>
-<p class="Pp">The <code class="Nm">ipsecif</code> interface is targeted for
- route-based VPNs. It can tunnel IPv4 and IPv6 traffic over either IPv4 or
- IPv6 and secure it with ESP.</p>
-<p class="Pp"><code class="Nm">ipsecif</code> interfaces are dynamically created
- and destroyed with the <a class="Xr">ifconfig(8)</a>
- <code class="Cm">create</code> and <code class="Cm">destroy</code>
- subcommands. The administrator must configure
- <code class="Nm">ipsecif</code> tunnel endpoint addresses. These addresses
- will be used for the outer IP header of ESP packets. The administrator also
- configures the protocol and addresses for the inner IP header with the
- <a class="Xr">ifconfig(8)</a> <code class="Cm">inet</code> or
- <code class="Cm">inet6</code> subcommands, and modify the routing table to
- route the packets through the <code class="Nm">ipsecif</code> interface.</p>
-<p class="Pp">The packet processing is similar to <a class="Xr">gif(4)</a> over
- <a class="Xr">ipsec(4)</a> transport mode, however the security policy
- management is different. <a class="Xr">gif(4)</a> over
- <a class="Xr">ipsec(4)</a> transport mode expects userland programs to
- manage their security policies. In contrast, <code class="Nm">ipsecif</code>
- manages its security policies by itself: when the administrator sets up an
- <code class="Nm">ipsecif</code> tunnel source and destination address pair,
- the related security policies are created automatically in the kernel. They
- are automatically deleted when the tunnel is destroyed.</p>
-<p class="Pp">It also means that <code class="Nm">ipsecif</code> ensures that
- both the in and out security policy pairs exist, that is,
- <code class="Nm">ipsecif</code> avoids the trouble caused when only one of
- the in and out security policy pair exists.</p>
-<p class="Pp">There are four security policies generated by
- <code class="Nm">ipsecif</code>: one in and out pair for IPv4 and IPv6 each.
- These security policies are equivalent to the following
- <a class="Xr">ipsec.conf(5)</a> configuration where src and dst are IP
- addresses specified to the tunnel:</p>
-<div class="Bd Pp Bd-indent Li">
-<pre>spdadd &quot;src&quot; &quot;dst&quot; ipv4 -P out ipsec esp/transport//unique;
-spdadd &quot;dst&quot; &quot;src&quot; ipv4 -P in ipsec esp/transport//unique;
-spdadd &quot;src&quot; &quot;dst&quot; ipv6 -P out ipsec esp/transport//unique;
-spdadd &quot;dst&quot; &quot;src&quot; ipv6 -P in ipsec esp/transport//unique;</pre>
-</div>
-<p class="Pp">The <code class="Nm">ipsecif</code> configuration will fail if
- such security policies already exist, and vice versa.</p>
-<p class="Pp">The related security associations can be established by an IKE
- daemon such as <a class="Xr">racoon(8)</a>. They can also be manipulated
- manually by <a class="Xr">setkey(8)</a> with the <code class="Fl">-u</code>
- option which sets a security policy's unique id.</p>
-<p class="Pp">Some <a class="Xr">ifconfig(8)</a> parameters change the behaviour
- of <code class="Nm">ipsecif</code>. link0 can enable NAT-Traversal, link1
- can enable ECN friendly mode like <a class="Xr">gif(4)</a>, and link2 can
- enable forwarding inner IPv6 packets. Only link2 is set by default. If you
- use only IPv4 packets as inner packets, you would want to do</p>
-<div class="Bd Pp Bd-indent Li">
-<pre>ifconfig ipsec0 -link2</pre>
-</div>
-<p class="Pp">to reduce security associations for IPv6 packets.</p>
-</section>
-<section class="Sh">
-<h1 class="Sh" id="EXAMPLES"><a class="permalink" href="#EXAMPLES">EXAMPLES</a></h1>
-<p class="Pp">Configuration example:</p>
-<div class="Bd Pp Li">
-<pre>Out IP addr = 172.16.100.1 Out IP addr = 172.16.200.1
-wm0 = 192.168.0.1/24 wm0 = 192.168.0.2/24
-wm1 = 10.100.0.1/24 wm1 = 10.200.0.1/24
-
-+------------+ +------------+
-| NetBSD_A | | NetBSD_B |
-|------------| |------------|
-| [ipsec0] - - - - - - - - (tunnel) - - - - - - - - [ipsec0] |
-| [wm0]------------- ... --------------[wm0] |
-| | | |
-+---[wm1]----+ +----[wm1]---+
- | |
- | |
-+------------+ +------------+
-| Host_X | | Host_Y |
-+------------+ +------------+</pre>
-</div>
-<p class="Pp">Host_X and Host_Y will be able to communicate via an IPv4 IPsec
- tunnel.</p>
-<p class="Pp">On NetBSD_A:</p>
-<div class="Bd Pp Li">
-<pre># ifconfig wm0 inet 192.168.0.1/24
-# ifconfig ipsec0 create
-# ifconfig ipsec0 tunnel 192.168.0.1 192.168.0.2
-# ifconfig ipsec0 inet 172.16.100.1/32 172.16.200.1
-start IKE daemon or set security associations manually.
-# ifconfig wm1 inet 10.100.0.1/24
-# route add 10.200.0.1 172.16.100.1</pre>
-</div>
-<p class="Pp">On NetBSD_B:</p>
-<div class="Bd Pp Li">
-<pre># ifconfig wm0 inet 192.168.0.2/24
-# ifconfig ipsec0 create
-# ifconfig ipsec0 tunnel 192.168.0.2 192.168.0.1
-# ifconfig ipsec0 inet 172.16.200.1/32 172.16.100.1
-start IKE daemon or set security associations manually.
-# ifconfig wm1 inet 10.200.0.1/24
-# route add 10.100.0.1 172.16.200.1</pre>
-</div>
-</section>
-<section class="Sh">
-<h1 class="Sh" id="SEE_ALSO"><a class="permalink" href="#SEE_ALSO">SEE
- ALSO</a></h1>
-<p class="Pp"><a class="Xr">gif(4)</a>, <a class="Xr">inet(4)</a>,
- <a class="Xr">inet6(4)</a>, <a class="Xr">ipsec(4)</a>,
- <a class="Xr">ifconfig(8)</a>, <a class="Xr">racoon(8)</a>,
- <a class="Xr">setkey(8)</a></p>
-</section>
-<section class="Sh">
-<h1 class="Sh" id="HISTORY"><a class="permalink" href="#HISTORY">HISTORY</a></h1>
-<p class="Pp">The <code class="Nm">ipsecif</code> device first appeared in
- <span class="Ux">NetBSD 8.0</span>.</p>
-</section>
-<section class="Sh">
-<h1 class="Sh" id="LIMITATIONS"><a class="permalink" href="#LIMITATIONS">LIMITATIONS</a></h1>
-<p class="Pp">Currently, the <code class="Nm">ipsecif</code> interface supports
- the ESP protocol only. <code class="Nm">ipsecif</code> supports default port
- number (4500) only for NAT-Traversal.</p>
-</section>
-</div>
-<table class="foot">
- <tr>
- <td class="foot-date">January 25, 2018</td>
- <td class="foot-os">NetBSD 10.1</td>
- </tr>
-</table>