How to Install and Uninstall strongswan Package on openSUSE Leap

Last updated: May 17,2024

1. Install "strongswan" package

This guide covers the steps necessary to install strongswan on openSUSE Leap

$ sudo zypper refresh $ sudo zypper install strongswan

2. Uninstall "strongswan" package

Please follow the guidelines below to uninstall strongswan on openSUSE Leap:

$ sudo zypper remove strongswan

3. Information about the strongswan package on openSUSE Leap

Information for package strongswan:
-----------------------------------
Repository : Update repository with updates from SUSE Linux Enterprise 15
Name : strongswan
Version : 5.9.11-150500.5.6.1
Arch : x86_64
Vendor : SUSE LLC
Installed Size : 2.9 KiB
Installed : No
Status : not installed
Source package : strongswan-5.9.11-150500.5.6.1.src
Upstream URL : https://www.strongswan.org/
Summary : OpenSource IPsec-based VPN Solution
Description :
StrongSwan is an OpenSource IPsec-based VPN Solution for Linux
* runs both on Linux 2.4 (KLIPS IPsec) and Linux 2.6 (NETKEY IPsec) kernels
* implements both the IKEv1 and IKEv2 (RFC 4306) key exchange protocols
* Fully tested support of IPv6 IPsec tunnel and transport connections
* Dynamical IP address and interface update with IKEv2 MOBIKE (RFC 4555)
* Automatic insertion and deletion of IPsec-policy-based firewall rules
* Strong 128/192/256 bit AES or Camellia encryption, 3DES support
* NAT-Traversal via UDP encapsulation and port floating (RFC 3947)
* Dead Peer Detection (DPD, RFC 3706) takes care of dangling tunnels
* Static virtual IPs and IKEv1 ModeConfig pull and push modes
* XAUTH server and client functionality on top of IKEv1 Main Mode authentication
* Virtual IP address pool managed by IKE daemon or SQL database
* Secure IKEv2 EAP user authentication (EAP-SIM, EAP-AKA, EAP-MSCHAPv2, etc.)
* Optional relaying of EAP messages to AAA server via EAP-RADIUS plugin
* Support of IKEv2 Multiple Authentication Exchanges (RFC 4739)
* Authentication based on X.509 certificates or preshared keys
* Generation of a default self-signed certificate during first strongSwan startup
* Retrieval and local caching of Certificate Revocation Lists via HTTP or LDAP
* Full support of the Online Certificate Status Protocol (OCSP, RCF 2560).
* CA management (OCSP and CRL URIs, default LDAP server)
* Powerful IPsec policies based on wildcards or intermediate CAs
* Group policies based on X.509 attribute certificates (RFC 3281)
* Storage of RSA private keys and certificates on a smartcard (PKCS #11 interface)
* Modular plugins for crypto algorithms and relational database interfaces
* Support of elliptic curve DH groups and ECDSA certificates (Suite B, RFC 4869)
* Optional built-in integrity and crypto tests for plugins and libraries
* Smooth Linux desktop integration via the strongSwan NetworkManager applet
This package triggers the installation of both, IKEv1 and IKEv2 daemons.