blob: 4f2458eecbeadf4111d8f0f8d641556182aadd7b [file] [log] [blame]
Hyunsun Moona5c3f642020-11-11 02:53:03 -08001---
2# strongswan defaults/main.yml
3#
4# SPDX-FileCopyrightText: © 2020 Open Networking Foundation <support@opennetworking.org>
5# SPDX-License-Identifier: Apache-2.0
6
7# Default values set here work with Google Cloud VPN
8#
9# Upstream docs:
10# https://wiki.strongswan.org/projects/strongswan/wiki/ConfigurationFiles
11# https://wiki.strongswan.org/projects/strongswan/wiki/IpsecConf
12# https://wiki.strongswan.org/projects/strongswan/wiki/ConnSection
13
14# How long the keying channel of a connection (ISAKMP or IKE SA) should last
15strongswan_conf_phase1_lifetime: "600m"
16
17# How long a particular instance of a connection should last
18strongswan_conf_phase2_lifetime: "180m"
19
20# Which protocol should be used to initialize the connection
21# Acceptable values are ike, ikev1, or ikev2
22strongswan_conf_key_exchange: "ikev2"
23
24# IKE/ISAKMP SA encryption/authentication algorithms
25strongswan_conf_ike_cipher: "aes256gcm16-sha512-modp4096"
26
27# ESP encryption/authentication algorithms
28strongswan_conf_esp_cipher: "aes256gcm16-sha512-modp8192"
29
30# How the two security gateways should authenticate each other
31# NOTE: only psk is supported
32strongswan_conf_auth_type: "psk"
33
Hyunsun Moon6a19e042021-01-19 21:30:56 -080034# What operation should be done automatically at IPsec startup
35# Acceptable values are add, start, or route
Hyunsun Moone797c952021-09-27 11:43:21 -070036strongswan_conf_auto: "route"
37strongswan_conf_dpdaction: "clear"
Hyunsun Moon6a19e042021-01-19 21:30:56 -080038
39# Whether rekeying of an IKE_SA should also reauthenticate the peer
40strongswan_conf_reauth: "no"
41
Hyunsun Moona5c3f642020-11-11 02:53:03 -080042# Handle routes in strongSwan or not
43# Set no if VPNs are route based
44strongswan_conf_install_routes: false
45
46# List of connections to configure
47# See README.md for the examples
48strongswan_conf_connections: []