https://github.com/andrey0001/strongswan
IPSec XAUTH ikev1 VPN server (strongswan in docker)
https://github.com/andrey0001/strongswan
docker ikev1 ipsec ipsec-vpn strongswan vpn-server
Last synced: 7 months ago
JSON representation
IPSec XAUTH ikev1 VPN server (strongswan in docker)
- Host: GitHub
- URL: https://github.com/andrey0001/strongswan
- Owner: andrey0001
- Created: 2018-03-15T19:34:44.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-09-30T12:35:22.000Z (about 2 years ago)
- Last Synced: 2025-02-28T12:33:06.725Z (8 months ago)
- Topics: docker, ikev1, ipsec, ipsec-vpn, strongswan, vpn-server
- Language: Shell
- Homepage:
- Size: 25.4 KB
- Stars: 7
- Watchers: 0
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
### StrongSwan as a Docker container
> Latest image based on alpine, please use andrey0001/strongswan:alpine for it.
> On alpine image path of config inside container changed.
## IPSec XAUTH ikev1 VPN server
Just build it or pull it from andrey0001/strongswan and run it something like this:
```
docker run -t -d --privileged \
-e VPN_USER=user \
-e VPN_PASS=password \
-e VPN_PSK=secretkey \
-e VPN_SUBNET=192.168.14.0/24 \
--publish 4500:4500/udp \
--publish 500:500/udp \
--hostname strongswan \
--name strongswan andrey0001/strongswan:alpine
```* VPN_USER = username (default:user1)
* VPN_PASS = password (default:Sup3rS3cr3t)
* VPN_PSK = preshared key (default:s3cr3tk3y)
* VPN_SUBNET = network (default:192.168.95.0/24)
#You could add additional users to the file /etc/ipsec.secrets , then reload secrets by:
```
ipsec rereadsecrets
```
inside the container.