Skip to content

Vagrant Environment for a IPsec VPN device based on strongSwan

Notifications You must be signed in to change notification settings

rgl/strongswan-site-to-site-vpn-vagrant

Repository files navigation

This is a Vagrant Environment for a IPsec VPN device based on strongSwan.

IPsec Encapsulating Security Payload (ESP) tunnel mode is used between each VPN device.

These are the machines and how they are connected with each other:

Usage

Build and install the Ubuntu Base Box.

Launch the environment:

vagrant up --no-destroy-on-error

Login into the moon machine (a VPN device), and watch the network traffic, IPsec Encapsulating Security Payload (ESP) or TCP port 3000:

vagrant ssh moon # moon (10.1.0.2)
sudo -i
tcpdump -n -i any esp or tcp port 3000

Then, ssh into the moon-ubuntu machine (10.1.0.4), and try accessing the sun-ubuntu machine (10.2.0.4):

vagrant ssh moon-ubuntu # moon-ubuntu (10.1.0.4)
wget -qO- 10.2.0.4:3000 # sun-ubuntu  (10.2.0.4)

Go back to the moon machine shell and stop the VPN device service:

systemctl stop strongswan-swanctl
tcpdump -n -i any esp or tcp port 3000

Go back to the moon-ubuntu machine shell, and try accessing the sun-ubuntu machine (10.2.0.4), this time, it will not work (because the moon VPN device service is stopped):

wget -qO- 10.2.0.4:3000 # sun-ubuntu (10.2.0.4)

To make things work again, go back to the moon machine shell, and start the VPN device:

systemctl start strongswan-swanctl
tcpdump -n -i any esp or tcp port 3000

Go back to the moon-ubuntu machine shell, and try accessing the sun-ubuntu machine (10.2.0.4), this time, it will work again (because the moon VPN device is started):

wget -qO- 10.2.0.4:3000 # sun-ubuntu (10.2.0.4)

Reference

About

Vagrant Environment for a IPsec VPN device based on strongSwan

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages