Setup a simple IPSec/L2TP VPN server for Ubuntu, Arch Linux and Debian
- Digital Ocean: Ubuntu 14.04 x64 (Trusty)
- Online.net: Arch Linux
- Amazon Web Services EC2: Arch Linux
- Amazon Web Services EC2: Ubuntu 14.04 x64 HVM (Trusty)
This script is very fragmented. The other scripts for Arch Linux, CentOS and Fedora are not up to date. They are insecure and don't feature a init.d startup and helper script. Furthermore it uses libreswan, which is not as well maintained and documented as strongswan.
For these and other reasons I updated the strongswan script. It supports both IPSec over L2TP and "pure" IPSec with the same installation. It is also based on my work on a strongswan docker container, which will be much more regularly maintained as well.
For Ubuntu and Debian
wget https://raw.github.com/philpl/setup-simple-ipsec-l2tp-vpn/master/setup.sh sudo sh setup.sh
NOTE: Debian 7 (Wheezy) does not have the newer libnss3 version (>=3.15) that Libreswan requires. The following workaround is required BEFORE running vpnsetup.sh. Thanks to @hwdsl2
wget https://gist.githubusercontent.com/hwdsl2/5a769b2c4436cdf02a90/raw/e08a04d76240af8acbfe5d6f4e0057c1bf5c660e/vpnsetup-debian-7-workaround.sh sudo sh vpnsetup-debian-7-workaround.sh
This will install a new service called
ipsec-assist. With it you can safely start, stop and restart the VPN server:
sudo service ipsec-assist stop sudo service ipsec-assist start sudo service ipsec-assist restart
For Arch Linux
wget https://raw.github.com/philpl/setup-simple-ipsec-l2tp-vpn/master/setup_archlinux.sh sudo sh setup_archlinux.sh
wget https://raw.github.com/philpl/setup-simple-ipsec-l2tp-vpn/master/setup_fedora.sh sudo sh setup_fedora.sh
The script will lead you through the installation process.
During installation you have to enter an IPSec PSK Key, a custom username if you wish, and a password.
4500 must be opened for the VPN to work!
Enjoy your very own (secure) VPN!
Clients are configured to use Google's Public DNS servers, when the VPN connection is active: https://developers.google.com/speed/public-dns/
Only one VPN account is generated!
To add more accounts, see the file
In the future I might add the ability to generate more accounts.
Before connecting with a Windows client please see: http://support.microsoft.com/kb/926179
If you plan to keep the VPN server generated with this script on the internet for a long time (a day or more), consider securing it to possible attacks!
If you run this script on EC2, the IP used in the config files will be different to the instance's public-facing IP. This is because Amazon performs one-to-one NAT on EC2 instances.
Copyright notices and license notes are at the head of the script.