.\" $OpenBSD: enc.4,v 1.13 2001/06/22 12:15:44 mpech Exp $ .\" .Dd October 7, 1999 .Dt ENC 4 .Os .Sh NAME .Nm enc .Nd Encapsulating Interface .Sh SYNOPSIS .Cd "pseudo-device enc 4" .Sh DESCRIPTION .\"XXX - replace with ipfw when it is in-tree .\"The .\".Nm .\"interface is a software loopback mechanism that allows hosts or .\"firewalls to filter .\".Xr ipsec 4 .\"traffic using .\".Xr ipf 5 . .\"The .\".Xr vpn 8 .\"manpage shows an example of such a setup. .\".Pp .\"The other use of the .\"XXX The .Nm interface is a software loopback mechanism that allows an administrator to see outgoing packets before they have been processed by .Xr ipsec 4 , or incoming packets after they have been similarly processed, via .Xr tcpdump 8 . .Pp The .Dq enc0 interface inherits all IPsec traffic. Thus all IPsec traffic can be filtered based on .Dq enc0 , and all IPsec traffic could be seen by invoking .Xr tcpdump 8 on the .Dq enc0 interface. .Sh EXAMPLES To see all outgoing packets before they have been processed via .Xr ipsec 4 , or all incoming packets after they have been similarly processed: .Bd -literal #> ifconfig enc0 up #> tcpdump -i enc0 .Ed .Sh SEE ALSO .Xr bpf 4 , .Xr inet 4 , .Xr ipsec 4 , .Xr netintro 4 , .\".Xr ipf 5 , .Xr tcpdump 8 , .Xr vpn 8