1
0
mirror of synced 2024-11-25 06:16:07 +03:00
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
Go to file
2016-05-18 02:53:30 -04:00
docs Minor corrections to docs 2016-05-17 22:40:58 -05:00
extras Reduce output verbosity and clean up 2016-05-17 00:13:16 -05:00
.travis.yml Improve tests 2016-05-14 20:47:53 -05:00
LICENSE.md Update copyright year 2016-01-25 10:38:07 -06:00
README-zh.md Minor corrections to docs 2016-05-17 22:40:58 -05:00
README.md Minor corrections to docs 2016-05-17 22:40:58 -05:00
vpnsetup_centos.sh Reduce output verbosity and clean up 2016-05-17 00:13:16 -05:00
vpnsetup.sh Removed quotes due to restrictions. 2016-05-18 02:53:30 -04:00

IPsec/L2TP VPN Server Auto Setup Scripts Build status

Read this in other languages: English, 简体中文.

These scripts will let you set up your own IPsec/L2TP VPN server in no more than a minute on Ubuntu, Debian and CentOS. All you need to do is provide your own VPN credentials, or auto-generate them. The scripts will handle the rest.

We will use Libreswan as the IPsec server, and xl2tpd as the L2TP provider.

Table of Contents

Features

  • 🎉 NEW: The faster IPsec/XAUTH (a.k.a. Cisco IPsec) mode is now supported
  • Fully automated IPsec/L2TP VPN server setup, no user input needed
  • Encapsulates all VPN traffic in UDP - does not need ESP protocol
  • Can be directly used as "user-data" for a new Amazon EC2 instance
  • Automatically determines public IP and private IP of server
  • Includes basic IPTables rules and sysctl.conf settings
  • Tested with Ubuntu 16.04/14.04/12.04, Debian 8 and CentOS 6 & 7

Requirements

A newly created Amazon EC2 instance, using these AMIs: (See instructions)

-OR-

A dedicated server or KVM/Xen-based Virtual Private Server (VPS), freshly installed with one of the above OS. In addition, Debian 7 (Wheezy) can also be used after applying this workaround. OpenVZ VPS users should instead try OpenVPN.

» I want to run my own VPN but don't have a server for that

⚠️ DO NOT run these scripts on your PC or Mac! They should only be used on a server!

Installation

Ubuntu & Debian

First, update your system with apt-get update && apt-get dist-upgrade and reboot. This is optional, but recommended.

Option 1: Have the script generate random VPN credentials for you (will be displayed when done):

wget https://git.io/vpnsetup -O vpnsetup.sh && sudo sh vpnsetup.sh

Option 2: Alternatively, enter your own VPN credentials in the script:

wget https://git.io/vpnsetup -O vpnsetup.sh
nano -w vpnsetup.sh
[Replace with your own values: IPSEC_PSK, VPN_USER and VPN_PASSWORD]
sudo sh vpnsetup.sh

CentOS & RHEL

First, update your system with yum update and reboot. This is optional, but recommended.

Option 1: Have the script generate random VPN credentials for you (will be displayed when done):

wget https://git.io/vpnsetup-centos -O vpnsetup_centos.sh && sudo sh vpnsetup_centos.sh

Option 2: Alternatively, enter your own VPN credentials in the script:

wget https://git.io/vpnsetup-centos -O vpnsetup_centos.sh
nano -w vpnsetup_centos.sh
[Replace with your own values: IPSEC_PSK, VPN_USER and VPN_PASSWORD]
sudo sh vpnsetup_centos.sh

If unable to download via wget, you may alternatively open vpnsetup.sh (or vpnsetup_centos.sh) and click the Raw button. Press Ctrl-A to select all, Ctrl-C to copy, then paste into your favorite editor.

Next Steps

Get your computer or device to use the VPN. Please see: Configure IPsec/L2TP VPN Clients.

NEW: The faster IPsec/XAUTH (a.k.a. Cisco IPsec) mode is now supported. See: Configure IPsec/XAUTH VPN Clients.

Enjoy your very own VPN! 🎉🚀

Important Notes

For Windows users, a one-time registry change is required if the VPN server and/or client is behind NAT (e.g. home router). In case you see Error 628, go to the "Security" tab of VPN connection properties, enable CHAP and disable MS-CHAP v2.

Android 6 (Marshmallow) users Please see notes in Configure IPsec/L2TP VPN Clients.

To create multiple VPN users with different credentials, just edit a few lines in the scripts.

Clients are set to use Google Public DNS when the VPN is active. To change, edit options.xl2tpd and ipsec.conf.

For servers with a custom SSH port (not 22) or other services, edit the IPTables rules before using.

The scripts will backup existing config files before making changes, with .old-date-time suffix.

Upgrading Libreswan

The additional scripts vpnupgrade_Libreswan.sh and vpnupgrade_Libreswan_centos.sh can be used to periodically upgrade Libreswan to the latest version. Check the official website and update the SWAN_VER variable as necessary.

Bugs & Questions

Author

Lin Song
  • Final year U.S. PhD candidate, majoring in Electrical and Computer Engineering (ECE)
  • Actively seeking opportunities in areas such as Software or Systems Engineering
  • Contact me on LinkedIn: https://www.linkedin.com/in/linsongui

License

Copyright (C) 2014-2016 Lin Song   View my profile on LinkedIn
Based on the work of Thomas Sarlandie (Copyright 2012)

This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License
Attribution required: please include my name in any derivative and let me know how you have improved it!