Skip to content

Add strongSwan configuration example for IKEv2 certificate authentication#128091

Open
hisriram1996 wants to merge 1 commit intoMicrosoftDocs:mainfrom
hisriram1996:patch-5
Open

Add strongSwan configuration example for IKEv2 certificate authentication#128091
hisriram1996 wants to merge 1 commit intoMicrosoftDocs:mainfrom
hisriram1996:patch-5

Conversation

@hisriram1996
Copy link
Contributor

Added example configuration for strongSwan in Linux (Ubuntu) for IKEv2 certificate authentication, including installation steps, configuration files, and verification commands.

Added example configuration for strongSwan in Linux (Ubuntu) for IKEv2 certificate authentication, including installation steps, configuration files, and verification commands.
@hisriram1996
Copy link
Contributor Author

@microsoft-github-policy-service agree company="Microsoft"

@prmerger-automator
Copy link
Contributor

@hisriram1996 : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

@learn-build-service-prod
Copy link
Contributor

Learn Build status updates of commit 06a437a:

✅ Validation status: passed

File Status Preview URL Details
articles/vpn-gateway/site-to-site-certificate-authentication-gateway-portal.md ✅Succeeded

For more details, please refer to the build report.

@ttorble ttorble requested a review from Copilot January 12, 2026 15:30
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds comprehensive documentation for configuring strongSwan on Ubuntu Linux as a VPN device for IKEv2 certificate authentication with Azure VPN Gateway. The addition provides practical implementation guidance for users deploying site-to-site VPN connections.

Changes:

  • Added installation instructions for strongSwan and required dependencies
  • Documented certificate and key file placement in standard IPsec directories
  • Provided complete IPsec configuration examples with IKEv2 settings

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.


> The private key data of the Inbound-certificate can be exported by following these steps [Outbound certificate - export private key data](/site-to-site-certificate-authentication-gateway-portal.md#outbound-certificate---export-private-key-data)

3. Edit the `/etc/ipsec.conf` file with following contents for IPsec donfiguration with IKEv2 certificate authentication.
Copy link

Copilot AI Jan 12, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Corrected spelling of 'donfiguration' to 'configuration'.

Suggested change
3. Edit the `/etc/ipsec.conf` file with following contents for IPsec donfiguration with IKEv2 certificate authentication.
3. Edit the `/etc/ipsec.conf` file with following contents for IPsec configuration with IKEv2 certificate authentication.

Copilot uses AI. Check for mistakes.
lifebytes=102400000
```

4. Edit the `/etc/ipsec.secrets` with following contents for configuring the private key of the Inboound-certificate certificate.
Copy link

Copilot AI Jan 12, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Corrected spelling of 'Inboound-certificate' to 'Inbound-certificate'.

Suggested change
4. Edit the `/etc/ipsec.secrets` with following contents for configuring the private key of the Inboound-certificate certificate.
4. Edit the `/etc/ipsec.secrets` with following contents for configuring the private key of the Inbound-certificate certificate.

Copilot uses AI. Check for mistakes.
rightsendcert=always
keyexchange=ikev2
keyingtries=%forever
authby=psk
Copy link

Copilot AI Jan 12, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The authentication method is set to 'psk' (pre-shared key), but this configuration example is for certificate authentication. This should be changed to 'authby=rsasig' or 'authby=pubkey' to use certificate-based authentication.

Suggested change
authby=psk
authby=rsasig

Copilot uses AI. Check for mistakes.
authby=psk
ike=aes256-sha256-modp1024!
esp=aes256-sha256!
keyingtries=%forever
Copy link

Copilot AI Jan 12, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The 'keyingtries=%forever' parameter is duplicated on line 304 and line 308. Remove the duplicate entry on line 308.

Suggested change
keyingtries=%forever

Copilot uses AI. Check for mistakes.
@ttorble
Copy link
Contributor

ttorble commented Jan 12, 2026

@cherylmc

Can you review the proposed changes?

IMPORTANT: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

@prmerger-automator prmerger-automator bot added the aq-pr-triaged tracking label for the PR review team label Jan 12, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants