Update docs
This commit is contained in:
parent
d153a90fc3
commit
0679c66071
@ -133,7 +133,7 @@ sh vpnsetup.sh
|
|||||||
|
|
||||||
<a href="docs/clients-xauth-zh.md" target="_blank">**配置 IPsec/XAuth ("Cisco IPsec") VPN 客户端**</a>
|
<a href="docs/clients-xauth-zh.md" target="_blank">**配置 IPsec/XAuth ("Cisco IPsec") VPN 客户端**</a>
|
||||||
|
|
||||||
<a href="docs/ikev2-howto-zh.md" target="_blank">**如何配置 IKEv2 VPN: Windows, macOS, Android 和 iOS**</a>
|
<a href="docs/ikev2-howto-zh.md" target="_blank">**分步指南:如何配置 IKEv2 VPN**</a>
|
||||||
|
|
||||||
如果在连接过程中遇到错误,请参见 <a href="docs/clients-zh.md#故障排除" target="_blank">故障排除</a>。
|
如果在连接过程中遇到错误,请参见 <a href="docs/clients-zh.md#故障排除" target="_blank">故障排除</a>。
|
||||||
|
|
||||||
|
@ -133,7 +133,7 @@ Get your computer or device to use the VPN. Please refer to:
|
|||||||
|
|
||||||
<a href="docs/clients-xauth.md" target="_blank">**Configure IPsec/XAuth ("Cisco IPsec") VPN Clients**</a>
|
<a href="docs/clients-xauth.md" target="_blank">**Configure IPsec/XAuth ("Cisco IPsec") VPN Clients**</a>
|
||||||
|
|
||||||
<a href="docs/ikev2-howto.md" target="_blank">**How-To: IKEv2 VPN for Windows, macOS, Android and iOS**</a>
|
<a href="docs/ikev2-howto.md" target="_blank">**Step-by-Step Guide: How to Set Up IKEv2 VPN**</a>
|
||||||
|
|
||||||
If you get an error when trying to connect, see <a href="docs/clients.md#troubleshooting" target="_blank">Troubleshooting</a>.
|
If you get an error when trying to connect, see <a href="docs/clients.md#troubleshooting" target="_blank">Troubleshooting</a>.
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
|
|
||||||
**注: 你也可以使用 [IPsec/L2TP 模式](clients-zh.md) 连接,或者配置 [IKEv2](ikev2-howto-zh.md)。**
|
**注: 你也可以使用 [IPsec/L2TP 模式](clients-zh.md) 连接,或者配置 [IKEv2](ikev2-howto-zh.md)。**
|
||||||
|
|
||||||
在成功 <a href="https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/README-zh.md" target="_blank">搭建自己的 VPN 服务器</a> 之后,按照下面的步骤来配置你的设备。IPsec/XAuth ("Cisco IPsec") 在 Android, iOS 和 OS X 上均受支持,无需安装额外的软件。Windows 用户可以使用免费的 <a href="https://www.shrew.net/download/vpn" target="_blank">Shrew Soft 客户端</a>。如果无法连接,请首先检查是否输入了正确的 VPN 登录凭证。
|
在成功 <a href="../README-zh.md" target="_blank">搭建自己的 VPN 服务器</a> 之后,按照下面的步骤来配置你的设备。IPsec/XAuth ("Cisco IPsec") 在 Android, iOS 和 OS X 上均受支持,无需安装额外的软件。Windows 用户可以使用免费的 <a href="https://www.shrew.net/download/vpn" target="_blank">Shrew Soft 客户端</a>。如果无法连接,请首先检查是否输入了正确的 VPN 登录凭证。
|
||||||
|
|
||||||
IPsec/XAuth 模式也称为 "Cisco IPsec"。该模式通常能够比 IPsec/L2TP **更高效**地传输数据(较低的额外开销)。
|
IPsec/XAuth 模式也称为 "Cisco IPsec"。该模式通常能够比 IPsec/L2TP **更高效**地传输数据(较低的额外开销)。
|
||||||
|
|
||||||
@ -127,7 +127,7 @@ VPN 连接成功后,你可以到 <a href="https://www.ipchicken.com" target="_
|
|||||||
|
|
||||||
### 其它 Linux
|
### 其它 Linux
|
||||||
|
|
||||||
其它 Linux 版本用户可以使用 [IPsec/L2TP 模式](clients-zh.md#linux) 连接。
|
其它 Linux 版本用户可以使用 [IPsec/L2TP](clients-zh.md#linux) 模式连接。
|
||||||
|
|
||||||
## 致谢
|
## 致谢
|
||||||
|
|
||||||
|
@ -127,7 +127,7 @@ Once connected, you can verify that your traffic is being routed properly by <a
|
|||||||
|
|
||||||
### Other Linux
|
### Other Linux
|
||||||
|
|
||||||
Other Linux users can connect using [IPsec/L2TP mode](clients.md#linux).
|
Other Linux users can connect using [IPsec/L2TP](clients.md#linux) mode.
|
||||||
|
|
||||||
## Credits
|
## Credits
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
|
|
||||||
**注: 你也可以使用更高效的 [IPsec/XAuth 模式](clients-xauth-zh.md) 连接,或者配置 [IKEv2](ikev2-howto-zh.md)。**
|
**注: 你也可以使用更高效的 [IPsec/XAuth 模式](clients-xauth-zh.md) 连接,或者配置 [IKEv2](ikev2-howto-zh.md)。**
|
||||||
|
|
||||||
在成功 <a href="https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/README-zh.md" target="_blank">搭建自己的 VPN 服务器</a> 之后,按照下面的步骤来配置你的设备。IPsec/L2TP 在 Android, iOS, OS X 和 Windows 上均受支持,无需安装额外的软件。设置过程通常只需要几分钟。如果无法连接,请首先检查是否输入了正确的 VPN 登录凭证。
|
在成功 <a href="../README-zh.md" target="_blank">搭建自己的 VPN 服务器</a> 之后,按照下面的步骤来配置你的设备。IPsec/L2TP 在 Android, iOS, OS X 和 Windows 上均受支持,无需安装额外的软件。设置过程通常只需要几分钟。如果无法连接,请首先检查是否输入了正确的 VPN 登录凭证。
|
||||||
|
|
||||||
---
|
---
|
||||||
* 平台名称
|
* 平台名称
|
||||||
@ -189,7 +189,7 @@ VPN 连接成功后,你可以到 <a href="https://www.ipchicken.com" target="_
|
|||||||
|
|
||||||
### Fedora 和 CentOS
|
### Fedora 和 CentOS
|
||||||
|
|
||||||
Fedora 28 (和更新版本)和 CentOS 7 用户可以使用更高效的 [IPsec/XAuth 模式](clients-xauth-zh.md#fedora-和-centos) 连接。
|
Fedora 28 (和更新版本)和 CentOS 7 用户可以使用更高效的 [IPsec/XAuth](clients-xauth-zh.md#linux) 模式连接。
|
||||||
|
|
||||||
### 其它 Linux
|
### 其它 Linux
|
||||||
|
|
||||||
|
@ -189,7 +189,7 @@ Once connected, you can verify that your traffic is being routed properly by <a
|
|||||||
|
|
||||||
### Fedora and CentOS
|
### Fedora and CentOS
|
||||||
|
|
||||||
Fedora 28 (and newer) and CentOS 7 users can connect using the faster [IPsec/XAuth mode](clients-xauth.md#fedora-and-centos).
|
Fedora 28 (and newer) and CentOS 7 users can connect using the faster [IPsec/XAuth](clients-xauth.md#linux) mode.
|
||||||
|
|
||||||
### Other Linux
|
### Other Linux
|
||||||
|
|
||||||
|
@ -1,14 +1,19 @@
|
|||||||
# 如何配置 IKEv2 VPN: Windows, macOS, Android 和 iOS
|
# 分步指南:如何配置 IKEv2 VPN
|
||||||
|
|
||||||
*其他语言版本: [English](ikev2-howto.md), [简体中文](ikev2-howto-zh.md).*
|
*其他语言版本: [English](ikev2-howto.md), [简体中文](ikev2-howto-zh.md).*
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
**重要提示:** 本指南仅适用于**高级用户**。其他用户请使用 [IPsec/L2TP](clients-zh.md) 或者 [IPsec/XAuth](clients-xauth-zh.md) 模式。
|
**重要提示:** 本指南仅适用于**高级用户**。其他用户请使用 [IPsec/L2TP](clients-zh.md) 或者 [IPsec/XAuth](clients-xauth-zh.md) 模式。
|
||||||
|
|
||||||
---
|
---
|
||||||
|
* [导言](#导言)
|
||||||
|
* [在 VPN 服务器上配置 IKEv2](#在-vpn-服务器上配置-ikev2)
|
||||||
|
* [配置 IKEv2 VPN 客户端](#配置-ikev2-vpn-客户端)
|
||||||
|
* [已知问题](#已知问题)
|
||||||
|
* [参考链接](#参考链接)
|
||||||
|
|
||||||
Windows 7 和更新版本支持 IKEv2 协议标准,通过 Microsoft 的 Agile VPN 功能来实现。因特网密钥交换 (英语:Internet Key Exchange,简称 IKE 或 IKEv2)是一种网络协议,归属于 IPsec 协议族之下,用以创建安全关联 (Security Association, SA)。与 IKE 版本 1 相比较,IKEv2 的<a href="https://en.wikipedia.org/wiki/Internet_Key_Exchange#Improvements_with_IKEv2" target="_blank">功能改进</a>包括比如通过 MOBIKE 实现 Standard Mobility 支持,以及更高的可靠性。
|
## 导言
|
||||||
|
|
||||||
|
现代操作系统(比如 Windows 7 和更新版本)支持 IKEv2 协议标准。因特网密钥交换 (英语:Internet Key Exchange,简称 IKE 或 IKEv2)是一种网络协议,归属于 IPsec 协议族之下,用以创建安全关联 (Security Association, SA)。与 IKE 版本 1 相比较,IKEv2 的 <a href="https://en.wikipedia.org/wiki/Internet_Key_Exchange#Improvements_with_IKEv2" target="_blank">功能改进</a> 包括比如通过 MOBIKE 实现 Standard Mobility 支持,以及更高的可靠性。
|
||||||
|
|
||||||
Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来对 IKEv2 客户端进行身份验证。该方法无需 IPsec PSK, 用户名或密码。它可以用于以下系统:
|
Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来对 IKEv2 客户端进行身份验证。该方法无需 IPsec PSK, 用户名或密码。它可以用于以下系统:
|
||||||
|
|
||||||
@ -17,9 +22,11 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
- Android 4.x 和更新版本(使用 strongSwan VPN 客户端)
|
- Android 4.x 和更新版本(使用 strongSwan VPN 客户端)
|
||||||
- iOS (iPhone/iPad)
|
- iOS (iPhone/iPad)
|
||||||
|
|
||||||
下面举例说明如何在 Libreswan 上配置 IKEv2。以下命令必须用 `root` 账户运行。
|
## 在 VPN 服务器上配置 IKEv2
|
||||||
|
|
||||||
在继续之前,请确保你已经成功地 <a href="https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/README-zh.md" target="_blank">搭建自己的 VPN 服务器</a>,并且将 Libreswan <a href="https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/README-zh.md#%E5%8D%87%E7%BA%A7libreswan" target="_blank">升级到最新版本</a>。
|
**重要:** 作为使用本指南的先决条件,在继续之前,你必须确保你已经成功地 <a href="../README-zh.md" target="_blank">搭建自己的 VPN 服务器</a>,并且(可选但推荐)将 Libreswan <a href="../README-zh.md#升级libreswan" target="_blank">升级</a> 到最新版本。
|
||||||
|
|
||||||
|
下面举例说明如何在 Libreswan 上配置 IKEv2。以下命令必须用 `root` 账户运行。
|
||||||
|
|
||||||
1. 获取 VPN 服务器的公共 IP 地址,将它保存到变量并检查。
|
1. 获取 VPN 服务器的公共 IP 地址,将它保存到变量并检查。
|
||||||
|
|
||||||
@ -200,80 +207,82 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
service ipsec restart
|
service ipsec restart
|
||||||
```
|
```
|
||||||
|
|
||||||
1. 按照下面你的操作系统对应的步骤操作。
|
VPN 服务器上的 IKEv2 配置到此已完成。按照下面的步骤配置你的 VPN 客户端。
|
||||||
|
|
||||||
**注:** 如果你在上面的第一步指定了服务器的域名(而不是 IP 地址),则必须在 **服务器地址** 和 **远程 ID** 字段中输入该域名。
|
## 配置 IKEv2 VPN 客户端
|
||||||
|
|
||||||
#### Windows 7, 8.x 和 10
|
**注:** 如果你在上面的第一步指定了服务器的域名(而不是 IP 地址),则必须在 **服务器地址** 和 **远程 ID** 字段中输入该域名。
|
||||||
|
|
||||||
1. 将文件 `vpnclient.p12` 安全地传送到你的计算机,然后导入到 "计算机账户" 证书存储。在导入证书后,你必须确保将客户端证书放在 "个人 -> 证书" 目录中,并且将 CA 证书放在 "受信任的根证书颁发机构 -> 证书" 目录中。
|
### Windows 7, 8.x 和 10
|
||||||
|
|
||||||
|
1. 将文件 `vpnclient.p12` 安全地传送到你的计算机,然后导入到 "计算机账户" 证书存储。在导入证书后,你必须确保将客户端证书放在 "个人 -> 证书" 目录中,并且将 CA 证书放在 "受信任的根证书颁发机构 -> 证书" 目录中。
|
||||||
|
|
||||||
详细的操作步骤:
|
详细的操作步骤:
|
||||||
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Certs
|
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Certs
|
||||||
|
|
||||||
1. 在 Windows 计算机上添加一个新的 IKEv2 VPN 连接:
|
1. 在 Windows 计算机上添加一个新的 IKEv2 VPN 连接:
|
||||||
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Config
|
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Config
|
||||||
|
|
||||||
1. 启用新的 VPN 连接,并且开始使用 IKEv2 VPN!
|
1. 启用新的 VPN 连接,并且开始使用 IKEv2 VPN!
|
||||||
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Connect
|
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Connect
|
||||||
|
|
||||||
1. (可选步骤) 如需启用更强的加密算法,你可以添加注册表键 `NegotiateDH2048_AES256` 并重启。更多信息请看<a href="https://wiki.strongswan.org/projects/strongswan/wiki/WindowsClients#AES-256-CBC-and-MODP2048" target="_blank">这里</a>。
|
1. (可选步骤) 如需启用更强的加密算法,你可以添加注册表键 `NegotiateDH2048_AES256` 并重启。更多信息请看 <a href="https://wiki.strongswan.org/projects/strongswan/wiki/WindowsClients#AES-256-CBC-and-MODP2048" target="_blank">这里</a>。
|
||||||
|
|
||||||
#### OS X (macOS)
|
### OS X (macOS)
|
||||||
|
|
||||||
首先,将文件 `vpnca.cer` 和 `vpnclient.p12` 安全地传送到你的 Mac,然后双击它们并逐个导入到 **钥匙串访问** 中的 **登录** 钥匙串。下一步,双击刚才导入的 `IKEv2 VPN CA` 证书,展开 **信任** 并从 **IP 安全 (IPsec)** 下拉菜单中选择 **始终信任**。在完成之后,检查并确保 `vpnclient` 和 `IKEv2 VPN CA` 都显示在 **登录** 钥匙串 的 **证书** 类别中。
|
首先,将文件 `vpnca.cer` 和 `vpnclient.p12` 安全地传送到你的 Mac,然后双击它们并逐个导入到 **钥匙串访问** 中的 **登录** 钥匙串。下一步,双击刚才导入的 `IKEv2 VPN CA` 证书,展开 **信任** 并从 **IP 安全 (IPsec)** 下拉菜单中选择 **始终信任**。在完成之后,检查并确保 `vpnclient` 和 `IKEv2 VPN CA` 都显示在 **登录** 钥匙串 的 **证书** 类别中。
|
||||||
|
|
||||||
1. 打开系统偏好设置并转到网络部分。
|
1. 打开系统偏好设置并转到网络部分。
|
||||||
1. 在窗口左下角单击 **+** 按钮。
|
1. 在窗口左下角单击 **+** 按钮。
|
||||||
1. 从 **接口** 下拉菜单选择 **VPN**。
|
1. 从 **接口** 下拉菜单选择 **VPN**。
|
||||||
1. 从 **VPN 类型** 下拉菜单选择 **IKEv2**。
|
1. 从 **VPN 类型** 下拉菜单选择 **IKEv2**。
|
||||||
1. 在 **服务名称** 字段中输入任意内容。
|
1. 在 **服务名称** 字段中输入任意内容。
|
||||||
1. 单击 **创建**。
|
1. 单击 **创建**。
|
||||||
1. 在 **服务器地址** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
1. 在 **服务器地址** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
||||||
1. 在 **远程 ID** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
1. 在 **远程 ID** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
||||||
1. 保持 **本地 ID** 字段空白。
|
1. 保持 **本地 ID** 字段空白。
|
||||||
1. 单击 **鉴定设置...** 按钮。
|
1. 单击 **鉴定设置...** 按钮。
|
||||||
1. 从 **鉴定设置** 下拉菜单中选择 **无**。
|
1. 从 **鉴定设置** 下拉菜单中选择 **无**。
|
||||||
1. 选择 **证书** 单选按钮,然后选择 **vpnclient** 证书。
|
1. 选择 **证书** 单选按钮,然后选择 **vpnclient** 证书。
|
||||||
1. 单击 **好**。
|
1. 单击 **好**。
|
||||||
1. 选中 **在菜单栏中显示 VPN 状态** 复选框。
|
1. 选中 **在菜单栏中显示 VPN 状态** 复选框。
|
||||||
1. 单击 **应用** 保存VPN连接信息。
|
1. 单击 **应用** 保存VPN连接信息。
|
||||||
1. 单击 **连接**。
|
1. 单击 **连接**。
|
||||||
|
|
||||||
#### Android 4.x 和更新版本
|
### Android 4.x 和更新版本
|
||||||
|
|
||||||
1. 将文件 `vpnclient.p12` 安全地传送到你的 Android 设备。
|
1. 将文件 `vpnclient.p12` 安全地传送到你的 Android 设备。
|
||||||
1. 从 **Google Play** 安装 <a href="https://play.google.com/store/apps/details?id=org.strongswan.android" target="_blank">strongSwan VPN 客户端</a>。
|
1. 从 **Google Play** 安装 <a href="https://play.google.com/store/apps/details?id=org.strongswan.android" target="_blank">strongSwan VPN 客户端</a>。
|
||||||
1. 打开 VPN 客户端,然后单击 **Add VPN Profile**。
|
1. 打开 VPN 客户端,然后单击 **Add VPN Profile**。
|
||||||
1. 在 **Server** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
1. 在 **Server** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
||||||
1. 在 **VPN Type** 下拉菜单选择 **IKEv2 Certificate**。
|
1. 在 **VPN Type** 下拉菜单选择 **IKEv2 Certificate**。
|
||||||
1. 单击 **Select user certificate**,然后单击 **Install certificate**。
|
1. 单击 **Select user certificate**,然后单击 **Install certificate**。
|
||||||
1. 选择你从服务器复制过来的 `.p12` 文件,并按提示操作。
|
1. 选择你从服务器复制过来的 `.p12` 文件,并按提示操作。
|
||||||
1. 保存新的 VPN 连接,然后单击它以开始连接。
|
1. 保存新的 VPN 连接,然后单击它以开始连接。
|
||||||
|
|
||||||
#### iOS (iPhone/iPad)
|
### iOS (iPhone/iPad)
|
||||||
|
|
||||||
首先,将文件 `vpnca.cer` 和 `vpnclient.p12` 安全地传送到你的 iOS 设备,并且逐个导入为 iOS 配置描述文件。你可以使用 AirDrop (隔空投送)来传输文件。或者,你也可以将文件放在一个你的安全的托管网站上,然后在 Mobile Safari 中下载并导入。在完成之后,检查并确保 `vpnclient` 和 `IKEv2 VPN CA` 都显示在设置 -> 通用 -> 描述文件中。
|
首先,将文件 `vpnca.cer` 和 `vpnclient.p12` 安全地传送到你的 iOS 设备,并且逐个导入为 iOS 配置描述文件。你可以使用 AirDrop (隔空投送)来传输文件。或者,你也可以将文件放在一个你的安全的托管网站上,然后在 Mobile Safari 中下载并导入它们。在完成之后,检查并确保 `vpnclient` 和 `IKEv2 VPN CA` 都显示在设置 -> 通用 -> 描述文件中。
|
||||||
|
|
||||||
1. 进入设置 -> 通用 -> VPN。
|
1. 进入设置 -> 通用 -> VPN。
|
||||||
1. 单击 **添加VPN配置...**。
|
1. 单击 **添加VPN配置...**。
|
||||||
1. 单击 **类型** 。选择 **IKEv2** 并返回。
|
1. 单击 **类型** 。选择 **IKEv2** 并返回。
|
||||||
1. 在 **描述** 字段中输入任意内容。
|
1. 在 **描述** 字段中输入任意内容。
|
||||||
1. 在 **服务器** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
1. 在 **服务器** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
||||||
1. 在 **远程 ID** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
1. 在 **远程 ID** 字段中输入 `你的 VPN 服务器 IP` (或者域名)。
|
||||||
1. 保持 **本地 ID** 字段空白。
|
1. 保持 **本地 ID** 字段空白。
|
||||||
1. 单击 **用户鉴定** 。选择 **无** 并返回。
|
1. 单击 **用户鉴定** 。选择 **无** 并返回。
|
||||||
1. 启用 **使用证书** 选项。
|
1. 启用 **使用证书** 选项。
|
||||||
1. 单击 **证书** 。选择 **vpnclient** 并返回。
|
1. 单击 **证书** 。选择 **vpnclient** 并返回。
|
||||||
1. 单击右上角的 **完成**。
|
1. 单击右上角的 **完成**。
|
||||||
1. 启用 **VPN** 连接。
|
1. 启用 **VPN** 连接。
|
||||||
|
|
||||||
1. 连接成功后,你可以到 <a href="https://www.ipchicken.com" target="_blank">这里</a> 检测你的 IP 地址,应该显示为`你的 VPN 服务器 IP`。
|
连接成功后,你可以到 <a href="https://www.ipchicken.com" target="_blank">这里</a> 检测你的 IP 地址,应该显示为`你的 VPN 服务器 IP`。
|
||||||
|
|
||||||
## 已知问题
|
## 已知问题
|
||||||
|
|
||||||
1. Windows 自带的 VPN 客户端可能不支持 IKEv2 fragmentation。在有些网络上,这可能会导致连接错误或其它连接问题。你可以尝试换用 <a href="clients-zh.md" target="_blank">IPsec/L2TP</a> 或 <a href="clients-xauth-zh.md" target="_blank">IPsec/XAuth</a> 模式连接。
|
1. Windows 自带的 VPN 客户端可能不支持 IKEv2 fragmentation。在有些网络上,这可能会导致连接错误或其它连接问题。你可以尝试换用 <a href="clients-zh.md" target="_blank">IPsec/L2TP</a> 或 <a href="clients-xauth-zh.md" target="_blank">IPsec/XAuth</a> 模式。
|
||||||
1. 如果你使用 strongSwan Android VPN 客户端,则必须将服务器上的 Libreswan <a href="https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/README-zh.md#%E5%8D%87%E7%BA%A7libreswan" target="_blank">升级</a>到版本 3.26 或以上。
|
1. 如果你使用 strongSwan Android VPN 客户端,则必须将服务器上的 Libreswan <a href="../README-zh.md#升级libreswan" target="_blank">升级</a> 到版本 3.26 或以上。
|
||||||
1. Ubuntu 18.04 和 CentOS 用户在尝试将生成的 `.p12` 文件导入到 Windows 时可能会遇到错误 "输入的密码不正确"。这是由 `NSS` 中的一个问题导致的。更多信息请看 <a href="https://github.com/hwdsl2/setup-ipsec-vpn/issues/414#issuecomment-460430354" target="_blank">这里</a>。
|
1. Ubuntu 18.04 和 CentOS 用户在尝试将生成的 `.p12` 文件导入到 Windows 时可能会遇到错误 "输入的密码不正确"。这是由 `NSS` 中的一个问题导致的。更多信息请看 <a href="https://github.com/hwdsl2/setup-ipsec-vpn/issues/414#issuecomment-460430354" target="_blank">这里</a>。
|
||||||
1. 目前还不支持同时连接在同一个 NAT (比如家用路由器)后面的多个 IKEv2 客户端。对于这个用例,请换用 <a href="clients-xauth-zh.md" target="_blank">IPsec/XAuth</a> 模式。
|
1. 目前还不支持同时连接在同一个 NAT (比如家用路由器)后面的多个 IKEv2 客户端。对于这个用例,请换用 <a href="clients-xauth-zh.md" target="_blank">IPsec/XAuth</a> 模式。
|
||||||
|
|
||||||
|
@ -1,14 +1,19 @@
|
|||||||
# How-To: IKEv2 VPN for Windows, macOS, Android and iOS
|
# Step-by-Step Guide: How to Set Up IKEv2 VPN
|
||||||
|
|
||||||
*Read this in other languages: [English](ikev2-howto.md), [简体中文](ikev2-howto-zh.md).*
|
*Read this in other languages: [English](ikev2-howto.md), [简体中文](ikev2-howto-zh.md).*
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
**Important:** This guide is for **advanced users** only. Other users please use [IPsec/L2TP](clients.md) or [IPsec/XAuth](clients-xauth.md) mode.
|
**Important:** This guide is for **advanced users** only. Other users please use [IPsec/L2TP](clients.md) or [IPsec/XAuth](clients-xauth.md) mode.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
* [Introduction](#introduction)
|
||||||
|
* [Set up IKEv2 on the VPN server](#set-up-ikev2-on-the-vpn-server)
|
||||||
|
* [Configure IKEv2 VPN clients](#configure-ikev2-vpn-clients)
|
||||||
|
* [Known issues](#known-issues)
|
||||||
|
* [References](#references)
|
||||||
|
|
||||||
Windows 7 and newer releases support the IKEv2 standard through Microsoft's Agile VPN functionality. Internet Key Exchange (IKE or IKEv2) is the protocol used to set up a Security Association (SA) in the IPsec protocol suite. Compared to IKE version 1, IKEv2 contains <a href="https://en.wikipedia.org/wiki/Internet_Key_Exchange#Improvements_with_IKEv2" target="_blank">improvements</a> such as Standard Mobility support through MOBIKE, and improved reliability.
|
## Introduction
|
||||||
|
|
||||||
|
Modern operating systems (such as Windows 7 and newer) support the IKEv2 standard. Internet Key Exchange (IKE or IKEv2) is the protocol used to set up a Security Association (SA) in the IPsec protocol suite. Compared to IKE version 1, IKEv2 contains <a href="https://en.wikipedia.org/wiki/Internet_Key_Exchange#Improvements_with_IKEv2" target="_blank">improvements</a> such as Standard Mobility support through MOBIKE, and improved reliability.
|
||||||
|
|
||||||
Libreswan can authenticate IKEv2 clients on the basis of X.509 Machine Certificates using RSA signatures. This method does not require an IPsec PSK, username or password. It can be used with:
|
Libreswan can authenticate IKEv2 clients on the basis of X.509 Machine Certificates using RSA signatures. This method does not require an IPsec PSK, username or password. It can be used with:
|
||||||
|
|
||||||
@ -17,9 +22,11 @@ Libreswan can authenticate IKEv2 clients on the basis of X.509 Machine Certifica
|
|||||||
- Android 4.x and newer (using the strongSwan VPN client)
|
- Android 4.x and newer (using the strongSwan VPN client)
|
||||||
- iOS (iPhone/iPad)
|
- iOS (iPhone/iPad)
|
||||||
|
|
||||||
The following example shows how to configure IKEv2 with Libreswan. Commands below must be run as `root`.
|
## Set up IKEv2 on the VPN server
|
||||||
|
|
||||||
Before continuing, make sure you have successfully <a href="https://github.com/hwdsl2/setup-ipsec-vpn" target="_blank">set up your VPN server</a>, and upgraded Libreswan <a href="https://github.com/hwdsl2/setup-ipsec-vpn#upgrade-libreswan" target="_blank">to the latest version</a>.
|
**Important:** As a prerequisite to using this guide, and before continuing, you must make sure that you have successfully <a href="https://github.com/hwdsl2/setup-ipsec-vpn" target="_blank">set up your own VPN server</a>, and (optional but recommended) <a href="../README.md#upgrade-libreswan" target="_blank">upgraded Libreswan</a> to the latest version.
|
||||||
|
|
||||||
|
The following example shows how to configure IKEv2 with Libreswan. Commands below must be run as `root`.
|
||||||
|
|
||||||
1. Find the VPN server's public IP, save it to a variable and check.
|
1. Find the VPN server's public IP, save it to a variable and check.
|
||||||
|
|
||||||
@ -200,80 +207,82 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
service ipsec restart
|
service ipsec restart
|
||||||
```
|
```
|
||||||
|
|
||||||
1. Follow instructions below for your operating system.
|
The IKEv2 setup on the VPN server is now complete. Follow instructions below to configure your VPN clients.
|
||||||
|
|
||||||
**Note:** If you specified the server's DNS name (instead of its IP address) in step 1 above, you must enter the DNS name in the **Server** and **Remote ID** fields.
|
## Configure IKEv2 VPN clients
|
||||||
|
|
||||||
#### Windows 7, 8.x and 10
|
**Note:** If you specified the server's DNS name (instead of its IP address) in step 1 above, you must enter the DNS name in the **Server** and **Remote ID** fields.
|
||||||
|
|
||||||
1. Securely transfer `vpnclient.p12` to your computer, then import it into the "Computer account" certificate store. Make sure that the client cert is placed in "Personal -> Certificates", and the CA cert is placed in "Trusted Root Certification Authorities -> Certificates".
|
### Windows 7, 8.x and 10
|
||||||
|
|
||||||
|
1. Securely transfer `vpnclient.p12` to your computer, then import it into the "Computer account" certificate store. Make sure that the client cert is placed in "Personal -> Certificates", and the CA cert is placed in "Trusted Root Certification Authorities -> Certificates".
|
||||||
|
|
||||||
Detailed instructions:
|
Detailed instructions:
|
||||||
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Certs
|
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Certs
|
||||||
|
|
||||||
1. On the Windows computer, add a new IKEv2 VPN connection:
|
1. On the Windows computer, add a new IKEv2 VPN connection:
|
||||||
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Config
|
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Config
|
||||||
|
|
||||||
1. Start the new VPN connection, and enjoy your IKEv2 VPN!
|
1. Start the new VPN connection, and enjoy your IKEv2 VPN!
|
||||||
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Connect
|
https://wiki.strongswan.org/projects/strongswan/wiki/Win7Connect
|
||||||
|
|
||||||
1. (Optional) You may enable stronger ciphers by adding the registry key `NegotiateDH2048_AES256` and reboot. Read more <a href="https://wiki.strongswan.org/projects/strongswan/wiki/WindowsClients#AES-256-CBC-and-MODP2048" target="_blank">here</a>.
|
1. (Optional) Enable stronger ciphers by adding the registry key `NegotiateDH2048_AES256` and reboot. Read more <a href="https://wiki.strongswan.org/projects/strongswan/wiki/WindowsClients#AES-256-CBC-and-MODP2048" target="_blank">here</a>.
|
||||||
|
|
||||||
#### OS X (macOS)
|
### OS X (macOS)
|
||||||
|
|
||||||
First, securely transfer both `vpnca.cer` and `vpnclient.p12` to your Mac, then double-click to import them one by one into the **login** keychain in **Keychain Access**. Next, double-click on the imported `IKEv2 VPN CA` certificate, expand **Trust** and select **Always Trust** from the **IP Security (IPsec)** drop-down menu. When finished, check to make sure both `vpnclient` and `IKEv2 VPN CA` are listed under the **Certificates** category of **login** keychain.
|
First, securely transfer both `vpnca.cer` and `vpnclient.p12` to your Mac, then double-click to import them one by one into the **login** keychain in **Keychain Access**. Next, double-click on the imported `IKEv2 VPN CA` certificate, expand **Trust** and select **Always Trust** from the **IP Security (IPsec)** drop-down menu. When finished, check to make sure both `vpnclient` and `IKEv2 VPN CA` are listed under the **Certificates** category of **login** keychain.
|
||||||
|
|
||||||
1. Open System Preferences and go to the Network section.
|
1. Open System Preferences and go to the Network section.
|
||||||
1. Click the **+** button in the lower-left corner of the window.
|
1. Click the **+** button in the lower-left corner of the window.
|
||||||
1. Select **VPN** from the **Interface** drop-down menu.
|
1. Select **VPN** from the **Interface** drop-down menu.
|
||||||
1. Select **IKEv2** from the **VPN Type** drop-down menu.
|
1. Select **IKEv2** from the **VPN Type** drop-down menu.
|
||||||
1. Enter anything you like for the **Service Name**.
|
1. Enter anything you like for the **Service Name**.
|
||||||
1. Click **Create**.
|
1. Click **Create**.
|
||||||
1. Enter `Your VPN Server IP` (or DNS name) for the **Server Address**.
|
1. Enter `Your VPN Server IP` (or DNS name) for the **Server Address**.
|
||||||
1. Enter `Your VPN Server IP` (or DNS name) for the **Remote ID**.
|
1. Enter `Your VPN Server IP` (or DNS name) for the **Remote ID**.
|
||||||
1. Leave the **Local ID** field blank.
|
1. Leave the **Local ID** field blank.
|
||||||
1. Click the **Authentication Settings...** button.
|
1. Click the **Authentication Settings...** button.
|
||||||
1. Select **None** from the **Authentication Settings** drop-down menu.
|
1. Select **None** from the **Authentication Settings** drop-down menu.
|
||||||
1. Select the **Certificate** radio button, then select the **vpnclient** certificate.
|
1. Select the **Certificate** radio button, then select the **vpnclient** certificate.
|
||||||
1. Click **OK**.
|
1. Click **OK**.
|
||||||
1. Check the **Show VPN status in menu bar** checkbox.
|
1. Check the **Show VPN status in menu bar** checkbox.
|
||||||
1. Click **Apply** to save the VPN connection information.
|
1. Click **Apply** to save the VPN connection information.
|
||||||
1. Click **Connect**.
|
1. Click **Connect**.
|
||||||
|
|
||||||
#### Android 4.x and newer
|
### Android 4.x and newer
|
||||||
|
|
||||||
1. Securely transfer `vpnclient.p12` to your Android device.
|
1. Securely transfer `vpnclient.p12` to your Android device.
|
||||||
1. Install <a href="https://play.google.com/store/apps/details?id=org.strongswan.android" target="_blank">strongSwan VPN Client</a> from **Google Play**.
|
1. Install <a href="https://play.google.com/store/apps/details?id=org.strongswan.android" target="_blank">strongSwan VPN Client</a> from **Google Play**.
|
||||||
1. Launch the VPN client and tap **Add VPN Profile**.
|
1. Launch the VPN client and tap **Add VPN Profile**.
|
||||||
1. Enter `Your VPN Server IP` (or DNS name) in the **Server** field.
|
1. Enter `Your VPN Server IP` (or DNS name) in the **Server** field.
|
||||||
1. Select **IKEv2 Certificate** from the **VPN Type** drop-down menu.
|
1. Select **IKEv2 Certificate** from the **VPN Type** drop-down menu.
|
||||||
1. Tap **Select user certificate**, then tap **Install certificate**.
|
1. Tap **Select user certificate**, then tap **Install certificate**.
|
||||||
1. Choose the `.p12` file you copied from the VPN server, and follow the prompts.
|
1. Choose the `.p12` file you copied from the VPN server, and follow the prompts.
|
||||||
1. Save the new VPN connection, then tap to connect.
|
1. Save the new VPN connection, then tap to connect.
|
||||||
|
|
||||||
#### iOS (iPhone/iPad)
|
### iOS (iPhone/iPad)
|
||||||
|
|
||||||
First, securely transfer both `vpnca.cer` and `vpnclient.p12` to your iOS device, then import them one by one as iOS profiles. To transfer the files, you may use AirDrop. Alternatively, host the files on a secure website of yours, then download and import in Mobile Safari. When finished, check to make sure both `vpnclient` and `IKEv2 VPN CA` are listed under Settings -> General -> Profiles.
|
First, securely transfer both `vpnca.cer` and `vpnclient.p12` to your iOS device, then import them one by one as iOS profiles. To transfer the files, you may use AirDrop. Alternatively, host the files on a secure website of yours, then download and import them in Mobile Safari. When finished, check to make sure both `vpnclient` and `IKEv2 VPN CA` are listed under Settings -> General -> Profiles.
|
||||||
|
|
||||||
1. Go to Settings -> General -> VPN.
|
1. Go to Settings -> General -> VPN.
|
||||||
1. Tap **Add VPN Configuration...**.
|
1. Tap **Add VPN Configuration...**.
|
||||||
1. Tap **Type**. Select **IKEv2** and go back.
|
1. Tap **Type**. Select **IKEv2** and go back.
|
||||||
1. Tap **Description** and enter anything you like.
|
1. Tap **Description** and enter anything you like.
|
||||||
1. Tap **Server** and enter `Your VPN Server IP` (or DNS name).
|
1. Tap **Server** and enter `Your VPN Server IP` (or DNS name).
|
||||||
1. Tap **Remote ID** and enter `Your VPN Server IP` (or DNS name).
|
1. Tap **Remote ID** and enter `Your VPN Server IP` (or DNS name).
|
||||||
1. Leave the **Local ID** field blank.
|
1. Leave the **Local ID** field blank.
|
||||||
1. Tap **User Authentication**. Select **None** and go back.
|
1. Tap **User Authentication**. Select **None** and go back.
|
||||||
1. Make sure the **Use Certificate** switch is ON.
|
1. Make sure the **Use Certificate** switch is ON.
|
||||||
1. Tap **Certificate**. Select **vpnclient** and go back.
|
1. Tap **Certificate**. Select **vpnclient** and go back.
|
||||||
1. Tap **Done**.
|
1. Tap **Done**.
|
||||||
1. Slide the **VPN** switch ON.
|
1. Slide the **VPN** switch ON.
|
||||||
|
|
||||||
1. Once successfully connected, you can verify that your traffic is being routed properly by <a href="https://www.google.com/search?q=my+ip" target="_blank">looking up your IP address on Google</a>. It should say "Your public IP address is `Your VPN Server IP`".
|
Once successfully connected, you can verify that your traffic is being routed properly by <a href="https://www.google.com/search?q=my+ip" target="_blank">looking up your IP address on Google</a>. It should say "Your public IP address is `Your VPN Server IP`".
|
||||||
|
|
||||||
## Known Issues
|
## Known issues
|
||||||
|
|
||||||
1. The built-in VPN client in Windows may not support IKEv2 fragmentation. On some networks, this can cause the connection to fail or have other issues. You may instead try the <a href="clients.md" target="_blank">IPsec/L2TP</a> or <a href="clients-xauth.md" target="_blank">IPsec/XAuth</a> mode.
|
1. The built-in VPN client in Windows may not support IKEv2 fragmentation. On some networks, this can cause the connection to fail or have other issues. You may instead try the <a href="clients.md" target="_blank">IPsec/L2TP</a> or <a href="clients-xauth.md" target="_blank">IPsec/XAuth</a> mode.
|
||||||
1. If using the strongSwan Android VPN client, you must <a href="https://github.com/hwdsl2/setup-ipsec-vpn#upgrade-libreswan" target="_blank">upgrade Libreswan</a> on your server to version 3.26 or above.
|
1. If using the strongSwan Android VPN client, you must <a href="../README.md#upgrade-libreswan" target="_blank">upgrade Libreswan</a> on your server to version 3.26 or above.
|
||||||
1. Ubuntu 18.04 and CentOS users may encounter the error "The password you entered is incorrect" when trying to import the generated `.p12` file into Windows. This is due to a bug in `NSS`. Read more <a href="https://github.com/hwdsl2/setup-ipsec-vpn/issues/414#issuecomment-460430354" target="_blank">here</a>.
|
1. Ubuntu 18.04 and CentOS users may encounter the error "The password you entered is incorrect" when trying to import the generated `.p12` file into Windows. This is due to a bug in `NSS`. Read more <a href="https://github.com/hwdsl2/setup-ipsec-vpn/issues/414#issuecomment-460430354" target="_blank">here</a>.
|
||||||
1. Connecting multiple IKEv2 clients simultaneously from behind the same NAT (e.g. home router) is not supported at this time. For this use case, please instead use <a href="clients-xauth.md" target="_blank">IPsec/XAuth</a> mode.
|
1. Connecting multiple IKEv2 clients simultaneously from behind the same NAT (e.g. home router) is not supported at this time. For this use case, please instead use <a href="clients-xauth.md" target="_blank">IPsec/XAuth</a> mode.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user