# ipsec.conf - strongSwan IPsec configuration file
# basic configuration
config setup
# strictcrlpolicy=yes
# uniqueids = no
# Add connections here.
# Sample VPN connections
#conn sample-self-signed
# leftsubnet=10.1.0.0/16
# leftcert=selfCert.der
# leftsendcert=never
# right=192.168.0.2
# rightsubnet=10.2.0.0/16
# rightcert=peerCert.der
# auto=start
#conn sample-with-ca-cert
# leftsubnet=10.1.0.0/16
# leftcert=myCert.pem
# right=192.168.0.2
# rightsubnet=10.2.0.0/16
# rightid="C=CH, O=Linux strongSwan CN=peer name"
# auto=start
conn %default
ikelifetime=24h
leftsourceip=178.XXX.XXX.249
authby=key
# keyexchange=ike
# phase=esp
ike=aes256-sha1;modp1024!
phase2=esp
phase2alg=aes256-sha1;modp1024!
keylife=60m
keyname=t-ipsec
keyexchange=ikev2
# rekeymargin=3m
# keyingtries=1
# keyexchange=ikev2
# mobike=no
#
conn net-net
left=2a03:XXXX:1:XXXX::d3:7001
# leftsubnet=fec2::0/16
# leftcert=sunCert.pem
# leftid=@sun.strongswan.org
leftfirewall=yes
right=2a03:XXXX:XXXX:XXXX::d7:1001
# rightsubnet=fec1::0/16
# rightid=@moon.strongswan.org
auto=add
Źródło: