Home | History | Annotate | Download | only in racoon

Lines Matching full:peer

439 Defines the IP address of the peer.
505 Specifies the peer's identifier to be received.
508 will not verify the peer's identifier in ID payload transmitted from the peer.
527 Alternative acceptable peer identifiers may be specified by repeating the
532 If you want to verify the peer's identifier,
536 is not the same as the peer's identifier in the ID payload,
586 will ignore the CERT payload from the peer,
587 and try to get the peer's certificate from DNS instead.
592 will ignore the CERT payload from the peer,
593 and will use this certificate as the peer's certificate.
600 to be the peer's public key that was generated by
692 If you do not want to verify the identifier using the peer's certificate,
699 the peer if you do not specify it (them).
711 used if the peer advertises itself as IKE fragmentation capable.
714 peer has advertised itself as IKE fragmentation capable.
831 attempt to negotiate the use of NAT-T with the remote peer.
870 (without reply) before considering the peer is dead.
1023 keyword can be used to match a remote id that is equal to either the peer
1060 the peer if you do not specify it(them).
1156 Means to constrain the peer to set the number of pad bytes.
1308 a peer should query a modecfg assigned dns server.