2 .\" Sam Leffler <sam@errno.com>. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by Bill Paul.
15 .\" 4. Neither the name of the author nor the names of any co-contributors
16 .\" may be used to endorse or promote products derived from this software
17 .\" without specific prior written permission.
19 .\" THIS SOFTWARE IS PROVIDED BY Sam Leffler AND CONTRIBUTORS ``AS IS'' AND
20 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 .\" ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR THE VOICES IN HIS HEAD
23 .\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
29 .\" THE POSSIBILITY OF SUCH DAMAGE.
31 .\" $FreeBSD: src/share/man/man4/fast_ipsec.4,v 1.1.2.1 2003/01/24 05:12:59 sam Exp $
32 .\" $DragonFly: src/share/man/man4/fast_ipsec.4,v 1.5 2007/05/12 21:22:10 swildner Exp $
39 .Nd Hardware-accelerated IP Security Protocols
41 .Cd "options FAST_IPSEC"
44 .Cd net.inet.esp.enable
45 .Cd net.inet.ah.enable
46 .Cd net.inet.ipcomp.enable
49 is a set of protocols,
51 (for Encapsulating Security Payload)
53 (for Authentication Header),
56 (for IP Payload Compression Protocol)
57 that provide security services for IP datagrams.
59 is an experimental implementation of these protocols that uses the
61 subsystem to carry out cryptographic operations.
62 This means, in particular, that cryptograph hardware devices are
63 employed whenever possible to optimize the performance of these protocols.
67 implementation is intended to be compatible with the
71 This documentation concentrates on differences from that software.
72 The user should refer to
74 for basic information on setting up and using these protocols.
76 System configuration requires the crypto subsystem.
79 protocols are configured for use all protocols are included in the system.
80 To selectively enable/disable protocols use
89 The protocols draw heavily on the
94 The policy management code is derived from the KAME implementation found
100 protocols first appeared in
103 There is presently no support for IPv6.
104 The IPcomp protocol support does not work.
105 Certain legacy authentication algorithms are not supported because of
106 issues with the crypto subsystem.
107 This documentation is incomplete.