mirror of
https://github.com/Haxxnet/Compose-Examples
synced 2024-11-24 04:21:14 +00:00
add openvpn-as
This commit is contained in:
parent
2bfc4764a8
commit
ccb8d86d35
|
@ -141,6 +141,7 @@ A [VPN](https://en.wikipedia.org/wiki/Virtual_private_network) is a mechanism fo
|
||||||
- [wg-easy](examples/wg-easy) - The easiest way to install & manage WireGuard on any Linux host. All-in-one deployment of a WireGuard VPN network service + web management UI.
|
- [wg-easy](examples/wg-easy) - The easiest way to install & manage WireGuard on any Linux host. All-in-one deployment of a WireGuard VPN network service + web management UI.
|
||||||
- [WireGuard](examples/wireguard) - WireGuard by Linuxserver.io is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography.
|
- [WireGuard](examples/wireguard) - WireGuard by Linuxserver.io is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography.
|
||||||
- [IPSec VPN Server](examples/ipsec-vpn-server) - Docker image to run an IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2.
|
- [IPSec VPN Server](examples/ipsec-vpn-server) - Docker image to run an IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2.
|
||||||
|
- [OpenVPN-AS](examples/openvpn) - OpenVPN Access Server delivers an enterprise VPN solution for businesses of all sizes, providing a securely encrypted connection to private networks over unsecured public internet.
|
||||||
- [Firezone](examples/firezone) - Self-hosted secure remote access gateway that supports the WireGuard protocol. It offers a Web GUI, 1-line install script, multi-factor auth (MFA), and SSO.
|
- [Firezone](examples/firezone) - Self-hosted secure remote access gateway that supports the WireGuard protocol. It offers a Web GUI, 1-line install script, multi-factor auth (MFA), and SSO.
|
||||||
- ~~[Netbird](https://github.com/netbirdio/netbird)~~ - Quickly connect your computers, servers, cloud instances, and IoT devices into a secure private network. No configuration required.
|
- ~~[Netbird](https://github.com/netbirdio/netbird)~~ - Quickly connect your computers, servers, cloud instances, and IoT devices into a secure private network. No configuration required.
|
||||||
- [Headscale](examples/headscale) - An open source, self-hosted implementation of the Tailscale control server.
|
- [Headscale](examples/headscale) - An open source, self-hosted implementation of the Tailscale control server.
|
||||||
|
|
11
examples/openvpn/README.md
Normal file
11
examples/openvpn/README.md
Normal file
|
@ -0,0 +1,11 @@
|
||||||
|
# References
|
||||||
|
|
||||||
|
- https://openvpn.net/as-docs/docker.html
|
||||||
|
|
||||||
|
# Notes
|
||||||
|
|
||||||
|
Default username is `openvpn`.
|
||||||
|
|
||||||
|
The password is auto-generated and displayed in container logs.
|
||||||
|
|
||||||
|
Admin web UI is accessible at `https://<IP>:943`
|
36
examples/openvpn/docker-compose.yml
Normal file
36
examples/openvpn/docker-compose.yml
Normal file
|
@ -0,0 +1,36 @@
|
||||||
|
version: '3.3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
openvpn-as:
|
||||||
|
image: openvpn/openvpn-as
|
||||||
|
container_name: openvpn-as
|
||||||
|
hostname: openvpn-as
|
||||||
|
restart: always
|
||||||
|
cap_add:
|
||||||
|
- NET_ADMIN
|
||||||
|
ports:
|
||||||
|
- 443:443/tcp # openvpn over tcp
|
||||||
|
- 1194:1194/udp # openvpn over udp
|
||||||
|
- 943:943/tcp # openvpn admin ui
|
||||||
|
expose:
|
||||||
|
- 443 # openvpn over tcp
|
||||||
|
- 1194 # openvpn over udp
|
||||||
|
- 943 # openvpn as admin ui
|
||||||
|
volumes:
|
||||||
|
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/openvpn:/openvpn
|
||||||
|
#networks:
|
||||||
|
# - proxy
|
||||||
|
#labels:
|
||||||
|
# - traefik.enable=true
|
||||||
|
# - traefik.docker.network=proxy
|
||||||
|
# - traefik.http.routers.openvpn.rule=Host(`openvpn.example.com`)
|
||||||
|
# - traefik.http.services.openvpn.loadbalancer.server.port=943
|
||||||
|
# # Optional part when proxying to services that already provide ssl/tls
|
||||||
|
# - traefik.http.services.openvpn.loadbalancer.server.scheme=https
|
||||||
|
# - traefik.http.services.openvpn.loadbalancer.serverstransport=insecureTransport@file
|
||||||
|
# # Optional part for traefik middlewares
|
||||||
|
# - traefik.http.routers.openvpn.middlewares=local-ipwhitelist@file
|
||||||
|
|
||||||
|
#networks:
|
||||||
|
# proxy:
|
||||||
|
# external: true
|
Loading…
Reference in New Issue
Block a user