Advertisement
Guest User

Untitled

a guest
Mar 5th, 2020
118
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.07 KB | None | 0 0
  1. [root@td-gw0 strongswan]# cat /etc/strongswan/ipsec.conf | egrep '^$|^#' -v
  2. config setup
  3.         # strictcrlpolicy=yes
  4.         # uniqueids = no
  5. conn vpnclient
  6.         keyexchange=ikev1
  7.         auto=start
  8.         authby=secret
  9.         type=transport
  10.         left=xxx.xxx.xxx.xxx
  11.         leftprotoport=udp/1701
  12.         rightprotoport=udp/1701
  13.         right=yyy.yyy.yyy.yyy
  14.         pfs=no
  15.         keyingtries=1
  16.         ike=aes128-sha1-modp1024
  17.         esp=aes256-sha1-modp1024
  18.  
  19. # PSK in file ipsec.secret
  20. #format
  21.  : PSK blablablabla
  22.        
  23. [root@td-gw0 strongswan]# cat /etc/xl2tpd/xl2tpd.conf | egrep '^$|^#' -v
  24. [global]
  25. access control = yes
  26. [lac itl]
  27. lns = server.name.org
  28. ppp debug = yes
  29. pppoptfile = /etc/ppp/options.l2tpd.client
  30. autodial = yes
  31. name = username
  32. length bit = yes
  33.  
  34. [root@td-gw0 strongswan]# cat /etc/ppp/options.l2tpd.client | egrep '^$|^#' -v
  35. ipcp-accept-local
  36. ipcp-accept-remote
  37. refuse-eap
  38. require-mschap-v2
  39. noauth
  40. idle 1800
  41. mtu 1450
  42. mru 1450
  43. logfile /var/log/xl2tpd.log
  44. connect-delay 5000
  45. name username
  46. password password123
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement