| @@ -1,14 +1,14 @@ | | | @@ -1,14 +1,14 @@ |
1 | .\" $NetBSD: ipsec.4,v 1.32 2012/01/09 15:16:31 drochner Exp $ | | 1 | .\" $NetBSD: ipsec.4,v 1.33 2012/01/09 16:17:37 drochner Exp $ |
2 | .\" $FreeBSD: fast_ipsec.4,v 1.2 2003/03/03 11:51:30 ru Exp $ | | 2 | .\" $FreeBSD: fast_ipsec.4,v 1.2 2003/03/03 11:51:30 ru Exp $ |
3 | .\" | | 3 | .\" |
4 | .\" Copyright (c) 2004 | | 4 | .\" Copyright (c) 2004 |
5 | .\" Jonathan Stone <jonathan@dsg.stanford.edu>. All rights reserved. | | 5 | .\" Jonathan Stone <jonathan@dsg.stanford.edu>. All rights reserved. |
6 | .\" | | 6 | .\" |
7 | .\" Copyright (c) 2003 | | 7 | .\" Copyright (c) 2003 |
8 | .\" Sam Leffler <sam@errno.com>. All rights reserved. | | 8 | .\" Sam Leffler <sam@errno.com>. All rights reserved. |
9 | .\" | | 9 | .\" |
10 | .\" Redistribution and use in source and binary forms, with or without | | 10 | .\" Redistribution and use in source and binary forms, with or without |
11 | .\" modification, are permitted provided that the following conditions | | 11 | .\" modification, are permitted provided that the following conditions |
12 | .\" are met: | | 12 | .\" are met: |
13 | .\" 1. Redistributions of source code must retain the above copyright | | 13 | .\" 1. Redistributions of source code must retain the above copyright |
14 | .\" notice, this list of conditions and the following disclaimer. | | 14 | .\" notice, this list of conditions and the following disclaimer. |
| @@ -19,27 +19,27 @@ | | | @@ -19,27 +19,27 @@ |
19 | .\" THIS SOFTWARE IS PROVIDED BY Sam Leffler AND CONTRIBUTORS ``AS IS'' AND | | 19 | .\" THIS SOFTWARE IS PROVIDED BY Sam Leffler AND CONTRIBUTORS ``AS IS'' AND |
20 | .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | | 20 | .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
21 | .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | | 21 | .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
22 | .\" ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS HEAD | | 22 | .\" ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS HEAD |
23 | .\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | | 23 | .\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
24 | .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | | 24 | .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
25 | .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS | | 25 | .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
26 | .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN | | 26 | .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
27 | .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | | 27 | .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
28 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF | | 28 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF |
29 | .\" THE POSSIBILITY OF SUCH DAMAGE. | | 29 | .\" THE POSSIBILITY OF SUCH DAMAGE. |
30 | .\" | | 30 | .\" |
31 | .Dd January 9, 2012 | | 31 | .Dd January 9, 2012 |
32 | .Dt FAST_IPSEC 4 | | 32 | .Dt IPSEC 4 |
33 | .Os | | 33 | .Os |
34 | .Sh NAME | | 34 | .Sh NAME |
35 | .Nm fast_ipsec | | 35 | .Nm fast_ipsec |
36 | .Nd Fast IPsec hardware-accelerated IP Security Protocols | | 36 | .Nd Fast IPsec hardware-accelerated IP Security Protocols |
37 | .Sh SYNOPSIS | | 37 | .Sh SYNOPSIS |
38 | .Cd "options IPSEC" | | 38 | .Cd "options IPSEC" |
39 | .Cd "options IPSEC_DEBUG" | | 39 | .Cd "options IPSEC_DEBUG" |
40 | .Cd "options IPSEC_NAT_T" | | 40 | .Cd "options IPSEC_NAT_T" |
41 | .Sh DESCRIPTION | | 41 | .Sh DESCRIPTION |
42 | .Tn IPsec | | 42 | .Tn IPsec |
43 | is a set of protocols, | | 43 | is a set of protocols, |
44 | .Tn ESP | | 44 | .Tn ESP |
45 | (for Encapsulating Security Payload) | | 45 | (for Encapsulating Security Payload) |
| @@ -67,27 +67,27 @@ The user should refer to | | | @@ -67,27 +67,27 @@ The user should refer to |
67 | for basic information on setting up and using these protocols. | | 67 | for basic information on setting up and using these protocols. |
68 | .Pp | | 68 | .Pp |
69 | System configuration requires the | | 69 | System configuration requires the |
70 | .Xr opencrypto 9 | | 70 | .Xr opencrypto 9 |
71 | subsystem. | | 71 | subsystem. |
72 | When the | | 72 | When the |
73 | Fast IPsec | | 73 | Fast IPsec |
74 | protocols are configured for use, all protocols are included in the system. | | 74 | protocols are configured for use, all protocols are included in the system. |
75 | To selectively enable/disable protocols, use | | 75 | To selectively enable/disable protocols, use |
76 | .Xr sysctl 8 . | | 76 | .Xr sysctl 8 . |
77 | .Sh DIAGNOSTICS | | 77 | .Sh DIAGNOSTICS |
78 | To be added. | | 78 | To be added. |
79 | .Sh SEE ALSO | | 79 | .Sh SEE ALSO |
80 | .Xr ipsec 4 , | | 80 | .Xr kame_ipsec 4 , |
81 | .Xr setkey 8 , | | 81 | .Xr setkey 8 , |
82 | .Xr sysctl 8 , | | 82 | .Xr sysctl 8 , |
83 | .Xr opencrypto 9 | | 83 | .Xr opencrypto 9 |
84 | .Sh HISTORY | | 84 | .Sh HISTORY |
85 | The protocols draw heavily on the | | 85 | The protocols draw heavily on the |
86 | .Ox | | 86 | .Ox |
87 | implementation of the | | 87 | implementation of the |
88 | .Tn IPsec | | 88 | .Tn IPsec |
89 | protocols. | | 89 | protocols. |
90 | The policy management code is derived from the | | 90 | The policy management code is derived from the |
91 | .Tn KAME | | 91 | .Tn KAME |
92 | implementation found in their | | 92 | implementation found in their |
93 | .Tn IPsec | | 93 | .Tn IPsec |