|
NAMEenc —
Encapsulating Interface
SYNOPSISTo compile this driver into the kernel, place the following line in your kernel configuration file:device enc Alternatively, to load the driver as a module at boot time, place the following line in loader.conf(5): if_enc_load="YES" DESCRIPTIONTheenc interface is a software loopback mechanism that
allows hosts or firewalls to filter
ipsec(4)
traffic using any firewall package that hooks in via the
pfil(9)
framework.
The The “ What can be seen with tcpdump(1) and what will be passed on to the firewalls via the pfil(9) framework can be independently controlled using the following sysctl(8) variables:
For the incoming path a value of incoming path |------| ---- IPsec processing ---- (before) ---- (after) ----> | | | Host | <--- IPsec processing ---- (after) ----- (before) ---- | | outgoing path |------| Most people will want to run with the suggested defaults for
Note that packets are captured by BPF before firewall processing. The special value 0x4 can be configured in the ipsec_bpf_mask and packets will be also captured after firewall processing. EXAMPLESTo see the packets the processed via ipsec(4), adjust the sysctl(8) variables according to your need and run:tcpdump -i enc0 SEE ALSOtcpdump(1), bpf(4), ipf(4), ipfw(4), ipsec(4), pf(4)
Visit the GSP FreeBSD Man Page Interface. |