Created
December 22, 2011 12:32
-
-
Save qiusj/1510152 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
if [ $(id -u) != "0" ]; then | |
printf "Error: You must be root to run this tool!\n" | |
exit 1 | |
fi | |
clear | |
printf " | |
#################################################### | |
# # | |
# This is a Shell-Based tool of l2tp installation # | |
# Version: 1.2 # | |
# Author: Zed Lau # | |
# Website: http://zeddicus.com # | |
# # | |
#################################################### | |
" | |
vpsip=`hostname -i` | |
iprange="10.0.99" | |
echo "Please input IP-Range:" | |
read -p "(Default Range: 10.0.99):" iprange | |
if [ "$iprange" = "" ]; then | |
iprange="10.0.99" | |
fi | |
mypsk="vpsyou.com" | |
echo "Please input PSK:" | |
read -p "(Default PSK: vpsyou.com):" mypsk | |
if [ "$mypsk" = "" ]; then | |
mypsk="vpsyou.com" | |
fi | |
clear | |
get_char() | |
{ | |
SAVEDSTTY=`stty -g` | |
stty -echo | |
stty cbreak | |
dd if=/dev/tty bs=1 count=1 2> /dev/null | |
stty -raw | |
stty echo | |
stty $SAVEDSTTY | |
} | |
echo "" | |
echo "ServerIP:" | |
echo "$vpsip" | |
echo "" | |
echo "Server Local IP:" | |
echo "$iprange.1" | |
echo "" | |
echo "Client Remote IP Range:" | |
echo "$iprange.2-$iprange.254" | |
echo "" | |
echo "PSK:" | |
echo "$mypsk" | |
echo "" | |
echo "Press any key to start..." | |
char=`get_char` | |
clear | |
mknod /dev/random c 1 9 | |
yum -y update | |
yum -y upgrade | |
yum install -y ppp iptables make gcc gmp-devel xmlto bison flex xmlto libpcap libpcap-devel lsof vim-enhanced | |
mkdir /ztmp | |
mkdir /ztmp/l2tp | |
cd /ztmp/l2tp | |
wget http://www.openswan.org/download/openswan-2.6.37.tar.gz | |
tar zxvf openswan-2.6.37.tar.gz | |
cd openswan-2.6.37 | |
make programs install | |
rm -rf /etc/ipsec.conf | |
touch /etc/ipsec.conf | |
cat >>/etc/ipsec.conf<<EOF | |
config setup | |
nat_traversal=yes | |
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12 | |
oe=off | |
protostack=netkey | |
conn L2TP-PSK-NAT | |
rightsubnet=vhost:%priv | |
also=L2TP-PSK-noNAT | |
conn L2TP-PSK-noNAT | |
authby=secret | |
pfs=no | |
auto=add | |
keyingtries=3 | |
rekey=no | |
ikelifetime=8h | |
keylife=1h | |
type=transport | |
left=$vpsip | |
leftprotoport=17/1701 | |
right=%any | |
rightprotoport=17/%any | |
EOF | |
cat >>/etc/ipsec.secrets<<EOF | |
$vpsip %any: PSK "$mypsk" | |
EOF | |
sed -i 's/net.ipv4.ip_forward = 0/net.ipv4.ip_forward = 1/g' /etc/sysctl.conf | |
sysctl -p | |
iptables --table nat --append POSTROUTING --jump MASQUERADE | |
for each in /proc/sys/net/ipv4/conf/* | |
do | |
echo 0 > $each/accept_redirects | |
echo 0 > $each/send_redirects | |
done | |
/etc/init.d/ipsec restart | |
ipsec verify | |
cd /ztmp/l2tp | |
wget http://mirror.zeddicus.com/sources/rp-l2tp-0.4.tar.gz | |
tar zxvf rp-l2tp-0.4.tar.gz | |
cd rp-l2tp-0.4 | |
./configure | |
make | |
cp handlers/l2tp-control /usr/local/sbin/ | |
mkdir /var/run/xl2tpd/ | |
ln -s /usr/local/sbin/l2tp-control /var/run/xl2tpd/l2tp-control | |
cd /ztmp/l2tp | |
wget http://www.xelerance.com/wp-content/uploads/software/xl2tpd/xl2tpd-1.3.0.tar.gz | |
tar zxvf xl2tpd-1.3.0.tar.gz | |
cd xl2tpd-1.3.0 | |
make install | |
mkdir /etc/xl2tpd | |
rm -rf /etc/xl2tpd/xl2tpd.conf | |
touch /etc/xl2tpd/xl2tpd.conf | |
cat >>/etc/xl2tpd/xl2tpd.conf<<EOF | |
[global] | |
ipsec saref = yes | |
[lns default] | |
ip range = $iprange.2-$iprange.254 | |
local ip = $iprange.1 | |
refuse chap = yes | |
refuse pap = yes | |
require authentication = yes | |
ppp debug = yes | |
pppoptfile = /etc/ppp/options.xl2tpd | |
length bit = yes | |
EOF | |
rm -rf /etc/ppp/options.xl2tpd | |
touch /etc/ppp/options.xl2tpd | |
cat >>/etc/ppp/options.xl2tpd<<EOF | |
require-mschap-v2 | |
ms-dns 8.8.8.8 | |
ms-dns 8.8.4.4 | |
asyncmap 0 | |
auth | |
crtscts | |
lock | |
hide-password | |
modem | |
debug | |
name l2tpd | |
proxyarp | |
lcp-echo-interval 30 | |
lcp-echo-failure 4 | |
EOF | |
cat >>/etc/ppp/chap-secrets<<EOF | |
test l2tpd test123 * | |
EOF | |
touch /usr/bin/zl2tpset | |
echo "#/bin/bash" >>/usr/bin/zl2tpset | |
echo "for each in /proc/sys/net/ipv4/conf/*" >>/usr/bin/zl2tpset | |
echo "do" >>/usr/bin/zl2tpset | |
echo "echo 0 > \$each/accept_redirects" >>/usr/bin/zl2tpset | |
echo "echo 0 > \$each/send_redirects" >>/usr/bin/zl2tpset | |
echo "done" >>/usr/bin/zl2tpset | |
chmod +x /usr/bin/zl2tpset | |
iptables --table nat --append POSTROUTING --jump MASQUERADE | |
zl2tpset | |
xl2tpd | |
cat >>/etc/rc.local<<EOF | |
iptables --table nat --append POSTROUTING --jump MASQUERADE | |
/etc/init.d/ipsec restart | |
/usr/bin/zl2tpset | |
/usr/local/sbin/xl2tpd | |
EOF | |
clear | |
ipsec verify | |
printf " | |
#################################################### | |
# # | |
# This is a Shell-Based tool of l2tp installation # | |
# Version: 1.2 # | |
# Author: Zed Lau # | |
# Website: http://zeddicus.com # | |
# # | |
#################################################### | |
if there are no [FAILED] above, then you can | |
connect to your L2TP VPN Server with the default | |
user/pass below: | |
ServerIP:$vpsip | |
username:test | |
password:test123 | |
PSK:$mypsk | |
" | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment