strongSwan User Documentation » History » Version 160

« Previous - Version 160/180 (diff) - Next » - Current version
Tobias Brunner, 16.06.2017 10:17
Move TPM 2.0 article from the important articles next to the smartcard how-to

strongSwan User Documentation

Frequently Asked Questions

Important articles


Configuration Files

General Options

Used by swanctl and the preferred vici plugin

Used by starter and the deprecated stroke plugin

IKE and ESP Cipher Suites



Configuration Examples

Dozens of both simple and advanced VPN scenarios are available. Please make sure to read the ConfigurationExamplesNotes.

Modern vici-based Scenarios

These scenarios use the modern Versatile IKE Control Interface (VICI) as implemented by vici plugin and the swanctl command line tool.

Legacy stroke-based Scenarios

These scenarios use the deprecated stroke interface as implemented by the stroke plugin and the ipsec command line tool.



Management Commands

  • The powerful ipsec command starts, stops and monitors IPsec connections.
  • The alternative swanctl tool provides a new and portable configuration interface.

Auxiliary Tools

  • ipsec attest manages measurement reference values used for TPM-based remote attestation
  • ipsec leases shows the assignment of virtual IP adresses stored in volatile memory
  • ipsec pki generates and analyzes RSA/ECDSA private keys and X.509 certificates
  • ipsec pool manages virtual IP address pools and attributes stored in an SQL database and provided by the attr-sql plugin
  • ipsec scepclient implements the Simple Certificate Enrollment Protocol (SCEP)
  • ipsec starter starts, stops, and configures the IKE daemons
  • ipsec stroke controls the IKE charon daemon
  • ipsec conftest is a tool to test IKEv2 implementations