File: secvpn.1

package info (click to toggle)
secvpn 2.22
  • links: PTS
  • area: main
  • in suites: squeeze
  • size: 544 kB
  • ctags: 11
  • sloc: sh: 504; makefile: 54
file content (80 lines) | stat: -rw-r--r-- 2,582 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
.TH SECVPN "1" "August 2000" "secvpn" 
.SH NAME
secvpn - Control the Secure Virtual Private Network
.SH SYNOPSIS
.B secvpn
[\fI-v\fR][\fI-n\fR][\fI-s\fR][\fI-r\fR] \fIstart|stop|routedel|routeadd|test|status \fR[\fIHost\fR]
.br
.SH DESCRIPTION
.PP
Secvpn builds a virtual private network (vpn) as defined
in /etc/network/secvpn.conf. The vpn uses encryption based on ssh security.
.PP
Before svpn can be used you have to enable automatic ssh access for user 
"secvpn" from the initiator secvpn pc to the target secvpn pc. Use authorized_
keys or RhostsRSAAuthentication with the .shosts file. Have a look to the ssh - 
manpages for more informations.
.PP
The following subcommands may be used with secvpn:
.TP
.B \fBstart\fR
is used to start the vpn. Secvpn will add new ppp interfaces
necessary to make the vpn work, but will not automatically add routes (see
the routeadd option below). If the recursive option is set, secvpn will
log into the passive hosts and run "secvpn \-r start" on them too.
.TP
.B \fBstop\fR
is used to stop the vpn.
.TP
.B \fBrouteadd\fR
is used to setup new routing entries based on secvpn.conf. Secvpn will
first add the route active->passive, then tell the passive host to add the route back.
The route in the passive host will be added according to the configuration file there
(in the passive host), so if the configuration files differ, things will not work.
.TP
.B \fBroutedel\fR
will delete the routing entries built with routeadd.
.TP
.B \fBtest\fR
checks whether the ppp interface is used to reach O_CRYPT_IP.
.TP
.B \fBstatus\fR
same as test, but checks all vpns if no host is named (instead of only active vpns as 'test' does).

.SH OPTIONS
.TP
.B \-v 
verbose output
.TP
.B \-n  
do nothing
.TP
.B \-s
be silent
.TP
.B \-r
work recursive


.SH EXAMPLES
There are 3 examples in /usr/share/doc/secvpn/examples:

Example1: secvpn acts as router connection 2 subnets

Example2: secvpn having one lan-card and connect 2 subnets

Example3: secvpn having one lan-card and connect 11 subnets in a tree structure
.SH OTHER
To have real security it is necessary to secure each secvpn host and to have
firewalls on each secvpn host allowing only selected IP-Adresses and Ports to
pass through the VPN. 

.SH AUTHOR
Bernd Schumacher, HP Consulting, HEWLETT-PACKARD GmbH, Bad Homburg, 2000-2005
.SH COPYRIGHT
Copyright: Most recent version of the GPL.

On Debian GNU/Linux systems, the complete text of the GNU General
Public License can be found in "/usr/share/common-licenses/GPL".
.SH "SEE ALSO"
secvpn(1) secvpnmon(1) ssh(1) timeout(1) secvpn.conf(4)