/freebsd/sbin/nos-tun/ |
H A D | nos-tun.8 | 14 .Nd implement ``nos'' or ``ka9q'' style IP over IP tunnel 18 .Ar tunnel 32 style tunnel, (also known as 36 tunnel) using a 40 .Ar Tunnel 41 is the name of the tunnel device 48 are the addresses used on the tunnel device. 49 If you configure the tunnel against a cisco router, use a netmask of 52 This is because the tunnel is a point-to-point interface 58 sets tunnel mode. [all …]
|
H A D | nos-tun.c | 47 * - there can be only ONE tunnel between two hosts, 79 /* Tunnel interface configuration stuff */ 85 int tun; /* tunnel descriptor */ 247 struct sockaddr t_laddr; /* Source address of tunnel */ in main() 248 struct sockaddr whereto; /* Destination of tunnel */ in main() 249 struct sockaddr wherefrom; /* Source of tunnel */ in main() 390 "usage: nos-tun -t tunnel -s source -d destination -p protocol_number [source] target\n"); in usage()
|
/freebsd/crypto/openssh/ |
H A D | README.tun | 5 tunnel pseudo-device which is available on most platforms, either for 13 To enable the ssh server to accept tunnel requests from the client, you 22 (2) Server: Restrict client access and assign the tunnel 25 restrict the client to connect to a specified tunnel and to 29 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... reyk@openbsd.org 31 (3) Client: Configure the local network tunnel interface 34 the network tunnel configuration with OpenBSD. For example, use the 36 tunnel on the client: 54 To establish tunnel forwarding for connections to a specified 59 Tunnel yes [all …]
|
/freebsd/share/man/man4/ |
H A D | gre.4 | 58 .Dq tunnel 74 GRE mode is also the default tunnel mode on Cisco routers. 105 A GRE in UDP tunnel offers the possibility of better performance for 110 The GRE in UDP tunnel uses single value 4754 as UDP destination port. 121 Note that a GRE in UDP tunnel is unidirectional; the tunnel traffic is not 126 the tunnel can be configured either to disable use of the UDP source port 131 192.168.1.* --- Router A -------tunnel-------- Router B --- 192.168.2.* 139 192.168.2.1, the following commands will configure the tunnel: 145 ifconfig greN inet tunnel A B 153 ifconfig greN inet tunnel B A [all …]
|
H A D | if_ipsec.4 | 53 It can tunnel IPv4 and IPv6 traffic over either IPv4 or IPv6 and secure 64 .Cm tunnel 78 which are needed for establishing an IPsec tunnel. 101 The example below shows manual configuration of an IPsec tunnel 109 ifconfig ipsec0 inet tunnel 192.168.0.3 192.168.0.5 112 add 192.168.0.3 192.168.0.5 esp 10000 -m tunnel -u 100 -E rijndael-cbc "VerySecureKey!!1"; 113 add 192.168.0.5 192.168.0.3 esp 10001 -m tunnel -u 100 -E rijndael-cbc "VerySecureKey!!2"; 120 ifconfig ipsec0 inet tunnel 192.168.0.5 192.168.0.3 123 add 192.168.0.3 192.168.0.5 esp 10000 -m tunnel -u 200 -E rijndael-cbc "VerySecureKey!!1"; 124 add 192.168.0.5 192.168.0.3 esp 10001 -m tunnel -u 200 -E rijndael-cbc "VerySecureKey!!2";
|
H A D | ng_l2tp.4 | 114 u_char match_id; /* tunnel id must match 'tunnel_id' */ 115 uint16_t tunnel_id; /* local tunnel id */ 116 uint16_t peer_id; /* peer's tunnel id */ 132 field configures the local tunnel ID for the control connection. 135 field determines how incoming L2TP packets with a tunnel ID 142 only if the tunnel ID is non-zero. 145 is set to the local tunnel ID as soon as it is known and 149 The peer's tunnel ID should be set in 264 containing statistics of the L2TP tunnel. 266 This command clears the statistics for the L2TP tunnel.
|
H A D | gif.4 | 35 .Nd generic tunnel interface 42 It can tunnel IPv[46] traffic over IPv[46]. 46 is mainly based on RFC2893 IPv6-over-IPv4 configured tunnel. 50 can also tunnel ISO traffic over IPv[46] using EON encapsulation. 74 .Cm tunnel , 88 (for example, if you need a pure IPv4-over-IPv6 tunnel). 156 Ingress filtering can break tunnel operation in an asymmetrically 206 to talk with IPsec devices that use IPsec tunnel mode.
|
H A D | ipsec.4 | 72 operates in one of two modes: transport mode or tunnel mode. 74 Tunnel mode encapsulates IP packets within other IP packets 89 tunnel with firewalls, you can change the values of the following sysctls 267 This variable configures the kernel behavior on IPv4 IPsec tunnel encapsulation. 274 If set to non-zero, IPv4 IPsec tunnel encapsulation/decapsulation behavior will 410 AH and tunnel mode encapsulation may not work as you might expect. 413 policy with an AH tunnel or any IPsec encapsulating policy with AH 415 .Dq Li esp/tunnel/A-B/use ah/transport/A-B/require ) ,
|
H A D | tun.4 | 9 .Nd tunnel software network interface 136 The tunnel device 222 and allows setting the MTU and the baudrate of the tunnel 267 mode, causing packets read from the tunnel device to be prepended with 270 Will set the pid owning the tunnel device to the current process's pid.
|
/freebsd/sys/dev/qlnx/qlnxe/ |
H A D | eth_common.h | 143 #define ETH_TX_1ST_BD_FLAGS_TUNN_IP_CSUM_MASK 0x1 /* Recalculate Tunnel IP Checksum (if Tunnel … 145 …1ST_BD_FLAGS_TUNN_L4_CSUM_MASK 0x1 /* Recalculate Tunnel UDP/GRE Checksum (Depending on Tunnel… 155 …packet. Should be at least 1 in non-LSO packet and at least 3 in LSO (or Tunnel with IPv6+ext) pac… 171 __le16 tunn_ip_size /* For tunnel with IPv6+ext - Tunnel header IP datagram length (in BYTEs) */; 173 #define ETH_TX_DATA_2ND_BD_TUNN_INNER_L2_HDR_SIZE_W_MASK 0xF /* For Tunnel header with IPv6 ext. -… 175 #define ETH_TX_DATA_2ND_BD_TUNN_INNER_ETH_TYPE_MASK 0x3 /* For Tunnel header with IPv6 ext. -… 181 …_TX_DATA_2ND_BD_TUNN_TYPE_MASK 0x3 /* For Tunnel header with IPv6 ext. - Tunnel Ty… 183 #define ETH_TX_DATA_2ND_BD_TUNN_INNER_IPV6_MASK 0x1 /* For LSO / Tunnel header with IPv6+… 187 … 0x1 /* Set to 1 if Tunnel (outer = encapsulating) header has IPv6 ext. (Note: 3rd BD is required,… 189 … 0x1 /* Set if (inner) L4 protocol is UDP. (Required when IPv6+ext (or tunnel with inner or oute… [all …]
|
H A D | ecore_hsi_common.h | 1633 GFT_PROFILE_TYPE_4_TUPLE /* tunnel type, inner 4 tuple, IP type and L4 type match. */, 1634 …GFT_PROFILE_TYPE_L4_DST_PORT /* tunnel type, inner L4 destination port, IP type and L4 type match.… 1635 GFT_PROFILE_TYPE_IP_DST_ADDR /* tunnel type, inner IP destination address and IP type match. */, 1636 GFT_PROFILE_TYPE_IP_SRC_ADDR /* tunnel type, inner IP source address and IP type match. */, 1637 GFT_PROFILE_TYPE_TUNNEL_TYPE /* tunnel type and outer IP type match. */, 1758 * tunnel configuration 1762 …u8 set_vxlan_udp_port_flg /* Set VXLAN tunnel UDP destination port to vxlan_udp_port. If not set -… 1763 …u8 set_geneve_udp_port_flg /* Set GENEVE tunnel UDP destination port to geneve_udp_port. If not se… 1764 u8 tunnel_clss_vxlan /* Rx classification scheme for VXLAN tunnel. (use enum tunnel_clss) */; 1765 …u8 tunnel_clss_l2geneve /* Rx classification scheme for l2 GENEVE tunnel. (use enum tunnel_clss) *… [all …]
|
/freebsd/sbin/setkey/ |
H A D | sample.cf | 62 # Security protocol is old AH tunnel mode, i.e. RFC1826, with hmac-sha2-256 73 ah/tunnel/172.16.0.1-172.16.0.2/require ; 75 ah/tunnel/172.16.0.2-172.16.0.1/require ; 85 # mode of security protocol. You can use this SAs for both tunnel and 88 # At Gateway-B. Attention to the selector and peer's IP address for tunnel. 90 ah/tunnel/172.16.0.2-172.16.0.1/require ; 92 ah/tunnel/172.16.0.1-172.16.0.2/require ; 94 -m tunnel 97 -m tunnel 100 # AH transport mode followed by ESP tunnel mode is required between [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/i2c/ |
H A D | google,cros-ec-i2c-tunnel.yaml | 5 $id: http://devicetree.org/schemas/i2c/google,cros-ec-i2c-tunnel.yaml# 18 those devices we need to tunnel our i2c commands through the EC. 28 const: google,cros-ec-i2c-tunnel 52 i2c-tunnel { 53 compatible = "google,cros-ec-i2c-tunnel";
|
H A D | i2c-cros-ec-tunnel.txt | 6 to tunnel our i2c commands through the EC. 13 - compatible: google,cros-ec-i2c-tunnel 26 i2c-tunnel { 27 compatible = "google,cros-ec-i2c-tunnel";
|
/freebsd/lib/libipsec/ |
H A D | test-policy.c | 66 { 1, "in ipsec ah/tunnel" }, 68 { 1, "out ipsec ah/tunnel/" }, 70 { 0, "in ipsec esp/tunnel/::1-::2" }, 71 { 1, "in ipsec esp/tunnel/10.0.0.1-::2" }, 72 { 0, "in ipsec esp/tunnel/::1-::2/require" }, 75 { 1, "in ipsec ah/transport esp/tunnel" }, 76 { 0, "in ipsec ah/transport esp/tunnel/::1-::1" }, 79 "esp / tunnel / ::1-::2" }, 81 "ah/transport/::1-::2 esp/tunnel/::3-::4/use ah/transport/::5-::6/require\n" 82 "ah/transport/::1-::2 esp/tunnel/::3-::4/use ah/transport/::5-::6/require\n" [all …]
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-net.c | 125 * This is the portable version of the SSH tunnel forwarding, it 136 * System-specific tunnel open function 153 debug("%s: failed to open tunnel control device \"%s\": %s", in sys_tun_open() 171 debug("%s: invalid tunnel id %x: %s", __func__, in sys_tun_open() 179 debug("%s: failed to configure tunnel (mode %d): %s", __func__, in sys_tun_open() 185 debug("%s: tunnel mode %d fd %d", __func__, mode, fd); in sys_tun_open() 231 /* Open the tunnel device */ in sys_tun_open() 243 debug("%s: invalid tunnel %u\n", __func__, tun); in sys_tun_open() 253 /* Turn on tunnel headers */ in sys_tun_open() 266 /* Set the tunnel device operation mode */ in sys_tun_open() [all …]
|
/freebsd/sys/dev/mlx4/mlx4_ib/ |
H A D | mlx4_ib_mad.c | 516 /* compute P_Key index to put in tunnel header for slave */ in mlx4_ib_send_to_slave() 532 /* get tunnel tx data buf for slave */ in mlx4_ib_send_to_slave() 547 /* allocate tunnel tx buf after pass failure returns */ in mlx4_ib_send_to_slave() 567 /* copy over to tunnel buffer */ in mlx4_ib_send_to_slave() 572 /* adjust tunnel data */ in mlx4_ib_send_to_slave() 688 pr_debug("failed sending to slave %d via tunnel qp (%d)\n", in mlx4_ib_demux_mad() 743 /* Drop unsupported classes for slaves in tunnel mode */ in mlx4_ib_demux_mad() 759 pr_debug("failed sending to slave %d via tunnel qp (%d)\n", in mlx4_ib_demux_mad() 1448 struct mlx4_tunnel_mad *tunnel = tun_qp->ring[wr_ix].addr; in mlx4_ib_multiplex_mad() local 1475 switch (tunnel->mad.mad_hdr.method) { in mlx4_ib_multiplex_mad() [all …]
|
/freebsd/tests/sys/net/if_ovpn/ |
H A D | if_ovpn.sh | 33 atf_set descr 'IPv4 in IPv4 tunnel' 91 # Give the tunnel time to come up 170 # Give the tunnel time to come up 184 atf_set descr 'IPv6 in IPv4 tunnel' 243 # Give the tunnel time to come up 257 atf_set descr 'IPv4 in IPv6 tunnel' 318 # Give the tunnel time to come up 347 atf_set descr 'IPv6 in IPv6 tunnel' 406 # Give the tunnel time to come up 425 atf_set descr 'IPv4 in IPv4 tunnel' [all …]
|
/freebsd/share/doc/IPv6/ |
H A D | IMPLEMENTATION | 26 1.5 Generic tunnel interface 77 4.8 Operations with IPsec tunnel mode 78 4.8.1 RFC2401 IPsec tunnel mode approach 170 * "gif" interface implements IPv[46]-over-IPv[46] tunnel in a generic way, 171 and it covers "configured tunnel" described in the spec. 228 * KAME does not implement RFC1933/2893 automatic tunnel. 350 (NUD) on p2p interfaces, including tunnel interfaces (gif). NUD is 687 Interfaces that has no IEEE802 address (pseudo interfaces like tunnel 786 1.5 Generic tunnel interface 788 GIF (Generic InterFace) is a pseudo interface for configured tunnel. [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | print-rsvp.c | 246 { 256*RSVP_OBJ_FILTERSPEC+RSVP_CTYPE_TUNNEL_IPV4, "Tunnel IPv4" }, 247 { 256*RSVP_OBJ_FILTERSPEC+RSVP_CTYPE_12, "IPv4 P2MP LSP Tunnel" }, 248 { 256*RSVP_OBJ_FILTERSPEC+RSVP_CTYPE_13, "IPv6 P2MP LSP Tunnel" }, 251 { 256*RSVP_OBJ_SESSION+RSVP_CTYPE_TUNNEL_IPV4, "Tunnel IPv4" }, 253 { 256*RSVP_OBJ_SESSION+RSVP_CTYPE_13, "IPv4 P2MP LSP Tunnel" }, 254 { 256*RSVP_OBJ_SESSION+RSVP_CTYPE_14, "IPv6 P2MP LSP Tunnel" }, 257 { 256*RSVP_OBJ_SENDER_TEMPLATE+RSVP_CTYPE_TUNNEL_IPV4, "Tunnel IPv4" }, 258 { 256*RSVP_OBJ_SENDER_TEMPLATE+RSVP_CTYPE_12, "IPv4 P2MP LSP Tunnel" }, 259 { 256*RSVP_OBJ_SENDER_TEMPLATE+RSVP_CTYPE_13, "IPv6 P2MP LSP Tunnel" }, 291 { 256*RSVP_OBJ_SESSION_ATTRIBUTE+RSVP_CTYPE_TUNNEL_IPV4, "Tunnel IPv4" }, [all …]
|
H A D | print-radius.c | 35 * "RADIUS Accounting Modifications for Tunnel Protocol Support" 38 * "RADIUS Attributes for Tunnel Protocol Support" 375 "Tunnel-Start", 377 "Tunnel-Stop", 378 "Tunnel-Reject", 379 "Tunnel-Link-Start", 380 "Tunnel-Link-Stop", 381 "Tunnel-Link-Reject", 424 /* Tunnel-Type Attribute standard values */ 443 /* Tunnel-Medium-Type Attribute standard values */ [all …]
|
/freebsd/sys/netinet/ |
H A D | ip_encap.c | 39 * RFC1933 configured tunnel 40 * RFC1933 automatic tunnel 41 * RFC2401 IPsec tunnel 43 * RFC2529 6over4 tunnel 45 * RFC3056 6to4 tunnel 46 * isatap tunnel 51 * RFC2401 IPsec tunnel
|
/freebsd/tests/sys/netpfil/pf/ |
H A D | if_enc.sh | 44 # | A LAN |----------| tunnel |----------| B LAN | 113 spdadd 1.0.0.0/24 4.0.0.0/24 any -P out ipsec esp/tunnel/2.0.0.22-3.0.0.33/require; 114 spdadd 4.0.0.0/24 1.0.0.0/24 any -P in ipsec esp/tunnel/3.0.0.33-2.0.0.22/require; 121 spdadd 4.0.0.0/24 1.0.0.0/24 any -P out ipsec esp/tunnel/3.0.0.33-2.0.0.22/require; 122 spdadd 1.0.0.0/24 4.0.0.0/24 any -P in ipsec esp/tunnel/2.0.0.22-3.0.0.33/require;
|
/freebsd/sys/contrib/device-tree/Bindings/display/bridge/ |
H A D | google,cros-ec-anx7688.yaml | 17 the EC and therefore its node should be a child of an EC I2C tunnel node 18 (See google,cros-ec-i2c-tunnel.yaml). 54 compatible = "google,cros-ec-i2c-tunnel";
|
/freebsd/libexec/rc/rc.d/ |
H A D | stf | 12 desc="6to4 tunnel interface" 52 echo "Configuring 6to4 tunnel interface: stf0." 69 echo "Removing 6to4 tunnel interface: stf0."
|