Skip to content

Instantly share code, notes, and snippets.

@konosukef
Created May 21, 2016 06:28
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save konosukef/54dfeb84f55409a88cb972bf0f2b2d20 to your computer and use it in GitHub Desktop.
Save konosukef/54dfeb84f55409a88cb972bf0f2b2d20 to your computer and use it in GitHub Desktop.
IKEv2 EAP+IKEv1 XAuth
# ipsec.conf - strongSwan IPsec configuration file
config setup
conn %default
left=%any
leftsubnet=0.0.0.0/0,::/0
leftid=vpn.example.com
leftcert=vpn.example.com.crt
right=%any
rightsourceip=10.10.0.0/24,fd7f:14b7:2382::/64
rightdns=8.8.8.8,8.8.4.4,2001:4860:4860::8888,2001:4860:4860::8844
conn ikev2
keyexchange=ikev2
mobike=yes
auto=add
conn ikev2-eap
also="ikev2"
rightauth=eap-mschapv2
rightsendcert=never
eap_identity=%any
conn ipsec-xauth
keyexchange=ikev1
rightauth2=xauth
auto=add
# This file holds shared secrets or RSA private keys for authentication.
# RSA private key for this host, authenticating it to any other host
# which knows the public part.
: RSA vpn.example.com.key
username : EAP "password"
username : XAUTH "password"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment