strongSwan User Documentation » History » Version 148

« Previous - Version 148/183 (diff) - Next » - Current version
Noel Kuntze, 25.10.2016 00:12

strongSwan User Documentation

Introduction to strongSwan

Frequently Asked Questions

  • A list of FAQ is maintained here.


Configuration Files

General Options

Used by swanctl and the preferred vici plugin

Used by starter and the deprecated stroke plugin

IKE and ESP Cipher Suites



Configuration Examples

Modern vici-based Scenarios

These scenarios use the modern Versatile IKE Control Interface (VICI) as implemented by vici plugin and the swanctl command line tool.

Legacy stroke-based Scenarios

These scenarios use the deprecated stroke interface as implemented by the stroke plugin and the ipsec command line tool.

Dozens of both simple and advanced VPN scenarios are available. Please make sure to read the ConfigurationExamplesNotes.



Management Commands

  • The powerful ipsec command starts, stops and monitors IPsec connections.
  • The alternative swanctl tool provides a new and portable configuration interface.

Auxiliary Tools

  • ipsec attest manages measurement reference values used for TPM-based remote attestation
  • ipsec leases shows the assignment of virtual IP adresses stored in volatile memory
  • ipsec pki generates and analyzes RSA/ECDSA private keys and X.509 certificates
  • ipsec pool manages virtual IP address pools and attributes stored in an SQL database and provided by the attr-sql plugin
  • ipsec scepclient implements the Simple Certificate Enrollment Protocol (SCEP)
  • ipsec starter starts, stops, and configures the IKE daemons
  • ipsec stroke controls the IKE charon daemon
  • ipsec conftest is a tool to test IKEv2 implementations