How to IKEv2 VPN with Linux Mint using Pre-Shared Key
Based off
Linux Mint 21.3
Setup VPN Gateway on USG
IKEv2
Pre-Shared Key 4342v952hf24c43tvb65n554b3fg < make your own
In advance Local ID type DNS
dnsip11.ddns.net < use your own
Phase 1
Encryption AES256
Authentication SHA256
key group DH2
Setup VPN connection on USG
Remote Access (Server Role)
VPN gateway you made
Local policy 0.0.0.0
Enable Configuration Payload
IP address pool 192.168.140.0/24
Phase 2
Encryption AES256
Authentication SHA256
PFS DH2
Note I was never able to have the VPN use a given DNS IP and so when VPN is up any DNS on other interfaces are uses down the VPN tunnel.
In Linux Mint
open a terminal
run su
apt-get install strongswan -y
In Linux Mint
open as root
file system > etc >
open ipsec.secrets
add
: PSK 4342v952hf24c43tvb65n554b3fg < use your own vpnclient : XAUTH "1qaz2wsx"
save
open ipsec.conf
add
conn vpn1
rightsubnet=0.0.0.0/0
leftid=vpnclient
leftauth=psk
leftauth2=xauth
leftsourceip=%config
leftfirewall=yes
right=dnsip11.ddns.net < use your own
rightauth=psk
auto=add
ike=aes256-sha2_256-modp1024!
esp=aes256-sha2_256!
save
In Linux Mint
open a terminal
run su
ipsec restart
ipsec up vpn1
All Replies
-
It looks awesome😎. Thanks for sharing.
0
Categories
- All Categories
- 442 Beta Program
- 2.9K Nebula
- 219 Nebula Ideas
- 128 Nebula Status and Incidents
- 6.5K Security
- 603 USG FLEX H Series
- 344 Security Ideas
- 1.7K Switch
- 84 Switch Ideas
- 1.4K Wireless
- 52 Wireless Ideas
- 7K Consumer Product
- 298 Service & License
- 481 News and Release
- 92 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.8K FAQ
- 34 Documents
- 87 About Community
- 105 Security Highlight
Guru Member
Freshman Member