From a4c84f968e4d6d690e42f97d77f5e312fe599f94 Mon Sep 17 00:00:00 2001 From: Lin Song Date: Sun, 14 Feb 2016 19:57:36 -0600 Subject: [PATCH] Update README.md --- README.md | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/README.md b/README.md index 150a06e..e34904b 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # IPsec/L2TP VPN Server Auto Setup Scripts -Scripts for automatic configuration of IPsec/L2TP VPN server on Ubuntu 14.04 & 12.04, Debian 8 and CentOS/RHEL 6 & 7. All you need to do is providing your own values for `IPSEC_PSK`, `VPN_USER` and `VPN_PASSWORD`, and they will handle the rest. These scripts can also be directly used as the Amazon EC2 "user-data" when creating a new instance. +Scripts for automatic configuration of IPsec/L2TP VPN server on Ubuntu 14.04 & 12.04, Debian 8 and CentOS/RHEL 6 & 7. All you need to do is providing your own values for `IPSEC_PSK`, `VPN_USER` and `VPN_PASSWORD`, and let them handle the rest. We will use Libreswan as the IPsec server, and xl2tpd as the L2TP provider. @@ -13,12 +13,11 @@ We will use Libreswan as th - Can be directly used as "user-data" for a new Amazon EC2 instance - Automatically determines public IP and private IP of server - Includes basic IPTables rules and `sysctl.conf` settings -- Tested with Ubuntu 14.04 & 12.04, Debian 8 and CentOS/RHEL 6 & 7 - +- Tested with Ubuntu 14.04 & 12.04, Debian 8 and CentOS 6 & 7 ## Requirements -A newly created Amazon EC2 instance, using these AMIs: (Follow the link above for instructions) +A newly created Amazon EC2 instance, using these AMIs: (Follow this link for instructions) - Ubuntu 14.04 (Trusty) or 12.04 (Precise) - Debian 8 (Jessie) EC2 Images - CentOS 7 (x86_64) with Updates HVM @@ -26,8 +25,8 @@ A newly created Amazon EC2 **-OR-** -A dedicated server or any KVM- or Xen-based Virtual Private Server (VPS), with these Linux OS: - (Using the VPN scripts on a **freshly installed** system is recommended) +A dedicated server or KVM/Xen-based Virtual Private Server (VPS), running one of these OS: + (Note: Using the VPN scripts on a freshly installed system is recommended) - Ubuntu 14.04 (Trusty) or 12.04 (Precise) - Debian 8 (Jessie) - Debian 7 (Wheezy) - Not recommended. Requires this workaround to work. @@ -35,9 +34,9 @@ A dedicated server or any KVM- or Xen-based Virtual Private Server (VPS), with t OpenVZ VPS users should instead try Nyr's OpenVPN script. -##### » I want to run my own VPN but don't have a server for that +**» I want to run my own VPN but don't have a server for that** -##### :warning: DO NOT run these scripts on your PC or Mac! They are meant to be run on a dedicated server or VPS! +:warning: **DO NOT run these scripts on your PC or Mac! They are meant to be run on a dedicated server or VPS!** ## Installation @@ -74,7 +73,7 @@ Enjoy your very own VPN! :sparkles::tada::rocket::sparkles: ## Important Notes -For **Windows users**, a one-time registry change is required if the VPN server and/or client is behind NAT (e.g. home router). Also, make sure that `CHAP` is selected under "Allow these protocols" in the "Security" tab of VPN adapter properties. (Ref) +For **Windows users**, a one-time registry change is required if the VPN server and/or client is behind NAT (e.g. home router). Also, make sure that `CHAP` is enabled under "Allow these protocols" in the "Security" tab of VPN connection properties. (Ref) **Android 6 (Marshmallow) users**: After install, edit `/etc/ipsec.conf` and append `,aes256-sha2_256` to both `ike=` and `phase2alg=`. Also add a new line `sha2-truncbug=yes`. Start lines with two spaces. Finally, run `service ipsec restart`.