IPSECCTL(8) - System Manager’s Manual # IPSECCTL(8) - System Manager’s Manual
NAME # ipsecctl - control flows for IPsec
SYNOPSIS # ipsecctl [-cdFkmnv] [-D macro=value] [-f file] [-i fifo] [-s modifier]
DESCRIPTION # The ipsecctl utility controls flows that determine which packets are to be processed by IPsec. It allows ruleset configuration, and retrieval of status information from the kernel’s SPD (Security Policy Database) and SAD (Security Association Database). It also can control isakmpd(8) and establish tunnels using automatic keying with isakmpd(8).
...
ISAKMPD.CONF(5) - File Formats Manual # ISAKMPD.CONF(5) - File Formats Manual
NAME # isakmpd.conf - configuration file for isakmpd
DESCRIPTION # isakmpd.conf is the configuration file for the isakmpd(8) daemon, managing security association and key management for the IPsec layer of the kernel’s networking stack.
The file is of a well-known type of format called .INI style, named after the suffix used by an overrated windowing environment for its configuration files.
...
ISAKMPD.POLICY(5) - File Formats Manual # ISAKMPD.POLICY(5) - File Formats Manual
NAME # isakmpd.policy - policy configuration file for isakmpd
DESCRIPTION # isakmpd.policy is the policy configuration file for the isakmpd(8) daemon, managing security association and key management for the ipsec(4) layer of the kernel’s networking stack. The isakmpd(8) daemon, also known as the IKEv1 key management daemon, implements the Internet Key Exchange version 1 (IKEv1) protocol. It follows then that references to IKE in this document pertain to IKEv1 only, and not IKEv2.
...
Tcpdump,
Getnameinfo,
Iked,
Ssl,
Isakmpd.policy,
Ipsec,
Isakmpd.conf,
Openssl,
Pcap_open_offline,
Ipsec.conf,
Sasyncd,
Isakmpd ISAKMPD(8) - System Manager’s Manual # ISAKMPD(8) - System Manager’s Manual
NAME # isakmpd - ISAKMP/Oakley a.k.a. IKEv1 key management daemon
SYNOPSIS # isakmpd [-46adKLnSTv] [-c config-file] [-D class=level] [-f fifo] [-i pid-file] [-l packetlog-file] [-N udpencap-port] [-p listen-port] [-R report-file]
DESCRIPTION # The isakmpd daemon establishes Security Associations (SAs) for encrypted and/or authenticated network traffic. At this moment, and probably forever, this means ipsec(4) traffic. Traditionally, isakmpd was configured using the isakmpd.
...
OCTCRYPTO(4) - Device Drivers Manual (octeon) # OCTCRYPTO(4) - Device Drivers Manual (octeon)
NAME # octcrypto - OCTEON cryptographic unit
SYNOPSIS # octcrypto0 at mainbus0
DESCRIPTION # The octcrypto driver utilizes the OCTEON cryptographic unit to provide a hardware-accelerated implementation of the following algorithms for ipsec(4):
AES-CBC
AES-CTR
AES-GCM
AES-GMAC
HMAC-MD5
HMAC-SHA1
HMAC-SHA2-256
HMAC-SHA2-384
HMAC-SHA2-512
SEE ALSO # intro(4), ipsec(4), crypto(9)
HISTORY # The octcrypto driver first appeared in OpenBSD 6.
...
SASYNCD(8) - System Manager’s Manual # SASYNCD(8) - System Manager’s Manual
NAME # sasyncd - IPsec SA synchronization daemon for failover gateways
SYNOPSIS # sasyncd [-dnv] [-c config-file]
DESCRIPTION # The sasyncd daemon synchronizes IPsec SA and SPD information between a number of failover IPsec gateways. The most typical scenario is to run sasyncd on hosts also running isakmpd(8) or iked(8) and sharing a common IP address using carp(4).
...
SEC(4) - Device Drivers Manual # SEC(4) - Device Drivers Manual
NAME # sec - route based IPsec VPN tunnel interface pseudo-device
SYNOPSIS # pseudo-device sec
DESCRIPTION # The sec driver provides point-to-point tunnel interfaces for IPv4 and IPv6 protected by the ipsec(4) Encapsulating Security Payload (ESP) protocol.
Traffic is encapsulated in the ESP protocol and forwarded to the remote endpoint by routing over a sec interface rather than matching policy in the IPsec Security Policy Database (SPD).
...
VEB(4) - Device Drivers Manual # VEB(4) - Device Drivers Manual
NAME # veb, vport - Virtual Ethernet Bridge network device
SYNOPSIS # pseudo-device veb
DESCRIPTION # The veb pseudo-device supports the creation of a single layer 2 Ethernet network between multiple ports. Ethernet interfaces are added to the veb bridge to be used as ports. Unlike bridge(4), veb takes over the operation of the interfaces that are added as ports.
...