… | |
… | |
127 | .\} |
127 | .\} |
128 | .rm #[ #] #H #V #F C |
128 | .rm #[ #] #H #V #F C |
129 | .\" ======================================================================== |
129 | .\" ======================================================================== |
130 | .\" |
130 | .\" |
131 | .IX Title "GVPE 8" |
131 | .IX Title "GVPE 8" |
132 | .TH GVPE 8 "2004-07-25" "1.7" "GNU Virtual Private Ethernet" |
132 | .TH GVPE 8 "2005-03-28" "1.9" "GNU Virtual Private Ethernet" |
133 | .SH "NAME" |
133 | .SH "NAME" |
134 | \&\f(CW\*(C`gvpe\*(C'\fR \- GNU Virtual Private Ethernet Daemon |
134 | \&\f(CW\*(C`gvpe\*(C'\fR \- GNU Virtual Private Ethernet Daemon |
135 | =head1 SYNOPSIS |
135 | .SH "SYNOPSIS" |
136 | .PP |
136 | .IX Header "SYNOPSIS" |
137 | \&\f(CW\*(C`gvpe\*(C'\fR [\fB\-cDlL\fR] [\fB\-\-config=\fR\fIDIR\fR] [\fB\-\-no\-detach\fR] [\fB\-l=\fR\fILEVEL]\fR] |
137 | \&\f(CW\*(C`gvpe\*(C'\fR [\fB\-cDlL\fR] [\fB\-\-config=\fR\fI\s-1DIR\s0\fR] [\fB\-\-no\-detach\fR] [\fB\-l=\fR\fI\s-1LEVEL\s0]\fR] |
138 | [\fB\-\-kill\fR[\fB=\fR\fISIGNAL\fR]] [\fB\-\-mlock\fR] [\fB\-\-help\fR] [\fB\-\-version\fR] |
138 | [\fB\-\-kill\fR[\fB=\fR\fI\s-1SIGNAL\s0\fR]] [\fB\-\-mlock\fR] [\fB\-\-help\fR] [\fB\-\-version\fR] |
139 | \&\fINODENAME\fR |
139 | \&\fI\s-1NODENAME\s0\fR [\fIoption...\fR] |
140 | .SH "DESCRIPTION" |
140 | .SH "DESCRIPTION" |
141 | .IX Header "DESCRIPTION" |
141 | .IX Header "DESCRIPTION" |
142 | See the \fIgvpe\fR\|(5) manpage for an introduction to the gvpe suite. |
142 | See the \fIgvpe\fR\|(5) manpage for an introduction to the gvpe suite. |
143 | .PP |
143 | .PP |
144 | This is the manual page for gvpe, the virtual private ethernet daemon. |
144 | This is the manual page for gvpe, the virtual private ethernet daemon. |
… | |
… | |
148 | up a socket for incoming connections. Then a script will be executed to |
148 | up a socket for incoming connections. Then a script will be executed to |
149 | further configure the virtual device. If that succeeds, it will detach |
149 | further configure the virtual device. If that succeeds, it will detach |
150 | from the controlling terminal and continue in the background, accepting |
150 | from the controlling terminal and continue in the background, accepting |
151 | and setting up connections to other gvpe daemons that are part of the |
151 | and setting up connections to other gvpe daemons that are part of the |
152 | virtual private ethernet. |
152 | virtual private ethernet. |
|
|
153 | .PP |
|
|
154 | The optional arguments after the node name have to be of the form: |
|
|
155 | .PP |
|
|
156 | .Vb 1 |
|
|
157 | \& [I<nodename>.]var=value |
|
|
158 | .Ve |
|
|
159 | .PP |
|
|
160 | If the argument has a prefix of \f(CW\*(C`nodename.\*(C'\fR |
|
|
161 | (i.e. \f(CW\*(C`laptop.enable\-dns=yes\*(C'\fR) then it will be parsed after all the |
|
|
162 | config directives for that node, if not, it is parsed befroe the first |
|
|
163 | node directive in the config file, and can be used to set global options |
|
|
164 | or default variables. |
|
|
165 | .PP |
|
|
166 | For example, to start \f(CW\*(C`gvpe\*(C'\fR in the foreground, with log-level \f(CW\*(C`info\*(C'\fR on |
|
|
167 | the node \f(CW\*(C`laptop\*(C'\fR, with \s-1TCP\s0 enabled and HTTP-Proxy host and Port set, use |
|
|
168 | this: |
|
|
169 | .PP |
|
|
170 | .Vb 3 |
|
|
171 | \& gvpe -D -l info laptop \e |
|
|
172 | \& http-proxy-host=10.0.0.18 http-proxy-port=3128 \e |
|
|
173 | \& laptop.enable-tcp=yes |
|
|
174 | .Ve |
153 | .SH "OPTIONS" |
175 | .SH "OPTIONS" |
154 | .IX Header "OPTIONS" |
176 | .IX Header "OPTIONS" |
155 | .IP "\fB\-c\fR, \fB\-\-config=\fR\fI\s-1DIR\s0\fR" 4 |
177 | .IP "\fB\-c\fR, \fB\-\-config=\fR\fI\s-1DIR\s0\fR" 4 |
156 | .IX Item "-c, --config=DIR" |
178 | .IX Item "-c, --config=DIR" |
157 | Read configuration options from \fI\s-1DIR\s0\fR |
179 | Read configuration options from \fI\s-1DIR\s0\fR |
… | |
… | |
220 | .SH "BUGS" |
242 | .SH "BUGS" |
221 | .IX Header "BUGS" |
243 | .IX Header "BUGS" |
222 | The cryptography in gvpe has not been thoroughly checked by many people |
244 | The cryptography in gvpe has not been thoroughly checked by many people |
223 | yet. Use it at your own risk! |
245 | yet. Use it at your own risk! |
224 | .PP |
246 | .PP |
225 | If you find any bugs, report them to \f(CW\*(C`vpe@plan9.de\*(C'\fR. |
247 | If you find any bugs, report them to \f(CW\*(C`gvpe@plan9.de\*(C'\fR. |
226 | .SH "TODO" |
|
|
227 | .IX Header "TODO" |
|
|
228 | A lot. |
|
|
229 | .SH "SEE ALSO" |
248 | .SH "SEE ALSO" |
230 | .IX Header "SEE ALSO" |
249 | .IX Header "SEE ALSO" |
231 | \&\fIgvpe\fR\|(5) for an introduction, \fIgvpe.conf\fR\|(5), \fIgvpectrl\fR\|(8). |
250 | \&\fIgvpe\fR\|(5) for an introduction, \fIgvpe.conf\fR\|(5), \fIgvpectrl\fR\|(8). |
232 | .PP |
251 | .PP |
|
|
252 | The \s-1GVPE\s0 mailing list, at <http://lists.schmorp.de/> or |
|
|
253 | \&\f(CW\*(C`gvpe@lists.schmorp.de\*(C'\fR. |
|
|
254 | .PP |
233 | gvpe comes with \s-1ABSOLUTELY\s0 \s-1NO\s0 \s-1WARRANTY\s0. This is free software, and you are |
255 | gvpe comes with \s-1ABSOLUTELY\s0 \s-1NO\s0 \s-1WARRANTY\s0. This is free software, and you are |
234 | welcome to redistribute it under certain conditions; see the file \s-1COPYING\s0 |
256 | welcome to redistribute it under certain conditions; see the file \s-1COPYING\s0 |
235 | for details. |
257 | for details. |
236 | .SH "AUTHORS" |
258 | .SH "AUTHOR" |
237 | .IX Header "AUTHORS" |
259 | .IX Header "AUTHOR" |
238 | Marc Lehmann \f(CW\*(C`<gvpe@plan9.de>\*(C'\fR. |
260 | Marc Lehmann \f(CW\*(C`<gvpe@plan9.de>\*(C'\fR. |
239 | .PP |
261 | .PP |
240 | And thanks to many others for their contributions to gvpe, especially the |
262 | And thanks to many others for their contributions to gvpe, especially the |
241 | tincd authors, who inspired me to write this program (after scavenging |
263 | tincd authors, who inspired me to write this program (after scavenging |
242 | their sourcecode ;). |
264 | their sourcecode ;). |