.\" $OpenBSD: enc.4,v 1.11 2001/03/25 22:32:45 angelos Exp $ .\" .Dd October 7, 1999 .Dt ENC 4 .Os .Sh NAME .Nm enc .Nd Encapsulating Interface .Sh SYNOPSIS .Cd "pseudo-device enc 4" .Sh DESCRIPTION The .Nm interface is a software loopback mechanism that allows hosts or firewalls to filter .Xr ipsec 4 traffic using .Xr ipf 5 . The .Xr vpn 8 manpage shows an example of such a setup. .Pp The other use of the .Nm interface is to allow an administrator to see outgoing packets before they have been processed by .Xr ipsec 4 , or incoming packets after they have been similarly processed, via .Xr tcpdump 8 . .Pp The .Dq enc0 interface inherits all IPsec traffic. Thus all IPsec traffic can be filtered based on .Dq enc0 , and all IPsec traffic could be seen by invoking .Xr tcpdump 8 on the .Dq enc0 interface. .Sh EXAMPLES To see all outgoing packets before they have been processed via .Xr ipsec 4 , or all incoming packets after they have been similarly processed: .Bd -literal #> ifconfig enc0 up #> tcpdump -i enc0 .Ed .Sh SEE ALSO .Xr tcpdump 8 , .Xr bpf 4 , .Xr inet 4 , .Xr ipsec 4 , .Xr netintro 4 , .Xr ipf 5 , .Xr vpn 8