Update IKEv2 docs
This commit is contained in:
parent
e1e1b67afd
commit
204904abf4
@ -51,10 +51,17 @@ wget https://git.io/ikev2setup -O ikev2setup.sh && sudo bash ikev2setup.sh
|
|||||||
|
|
||||||
**注:** 另外,在这里你也可以指定 VPN 服务器的域名。例如: `PUBLIC_IP=myvpn.example.com`。
|
**注:** 另外,在这里你也可以指定 VPN 服务器的域名。例如: `PUBLIC_IP=myvpn.example.com`。
|
||||||
|
|
||||||
1. 在 `/etc/ipsec.conf` 文件中添加一个新的 IKEv2 连接:
|
1. 添加一个新的 IKEv2 连接:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
cat >> /etc/ipsec.conf <<EOF
|
if ! grep -qs '^include /etc/ipsec\.d/\*\.conf$' /etc/ipsec.conf; then
|
||||||
|
echo >> /etc/ipsec.conf
|
||||||
|
echo 'include /etc/ipsec.d/*.conf' >> /etc/ipsec.conf
|
||||||
|
fi
|
||||||
|
```
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cat > /etc/ipsec.d/ikev2.conf <<EOF
|
||||||
|
|
||||||
conn ikev2-cp
|
conn ikev2-cp
|
||||||
left=%defaultroute
|
left=%defaultroute
|
||||||
@ -91,19 +98,19 @@ wget https://git.io/ikev2setup -O ikev2setup.sh && sudo bash ikev2setup.sh
|
|||||||
如果是 Libreswan 3.23 或更新版本:
|
如果是 Libreswan 3.23 或更新版本:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
cat >> /etc/ipsec.conf <<EOF
|
cat >> /etc/ipsec.d/ikev2.conf <<EOF
|
||||||
modecfgdns="8.8.8.8 8.8.4.4"
|
modecfgdns="8.8.8.8 8.8.4.4"
|
||||||
encapsulation=yes
|
encapsulation=yes
|
||||||
mobike=no
|
mobike=no
|
||||||
EOF
|
EOF
|
||||||
```
|
```
|
||||||
|
|
||||||
**注:** 如果你的服务器运行 Debian 或者 CentOS/RHEL,并且你想要启用 MOBIKE 支持,可以将上面命令中的 `mobike=no` 换成 `mobike=yes`。**不要**在 Ubuntu 系统上启用该选项。
|
**注:** 如果你的服务器(或者 Docker 主机)运行 Debian 或者 CentOS/RHEL,并且你想要启用 MOBIKE 支持,可以将上面命令中的 `mobike=no` 换成 `mobike=yes`。**不要** 在 Ubuntu 系统上启用该选项。
|
||||||
|
|
||||||
如果是 Libreswan 3.19-3.22:
|
如果是 Libreswan 3.19-3.22:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
cat >> /etc/ipsec.conf <<EOF
|
cat >> /etc/ipsec.d/ikev2.conf <<EOF
|
||||||
modecfgdns1=8.8.8.8
|
modecfgdns1=8.8.8.8
|
||||||
modecfgdns2=8.8.4.4
|
modecfgdns2=8.8.4.4
|
||||||
encapsulation=yes
|
encapsulation=yes
|
||||||
@ -113,7 +120,7 @@ wget https://git.io/ikev2setup -O ikev2setup.sh && sudo bash ikev2setup.sh
|
|||||||
如果是 Libreswan 3.18 或更早版本:
|
如果是 Libreswan 3.18 或更早版本:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
cat >> /etc/ipsec.conf <<EOF
|
cat >> /etc/ipsec.d/ikev2.conf <<EOF
|
||||||
modecfgdns1=8.8.8.8
|
modecfgdns1=8.8.8.8
|
||||||
modecfgdns2=8.8.4.4
|
modecfgdns2=8.8.4.4
|
||||||
forceencaps=yes
|
forceencaps=yes
|
||||||
@ -165,7 +172,7 @@ wget https://git.io/ikev2setup -O ikev2setup.sh && sudo bash ikev2setup.sh
|
|||||||
|
|
||||||
1. 生成客户端证书,然后导出 `.p12` 文件,该文件包含客户端证书,私钥以及 CA 证书。
|
1. 生成客户端证书,然后导出 `.p12` 文件,该文件包含客户端证书,私钥以及 CA 证书。
|
||||||
|
|
||||||
**注:** 如需同时连接多个客户端,则必须为每个客户端生成唯一的证书。你可以重复本步骤来为更多的客户端生成证书,但必须将所有的 `vpnclient` 换成比如 `vpnclient2`,等等。
|
**注:** 你可以重复本步骤来为更多的客户端生成证书,但必须将所有的 `vpnclient` 换成比如 `vpnclient2`,等等。如需同时连接多个客户端,则必须为每个客户端生成唯一的证书。
|
||||||
|
|
||||||
生成客户端证书:
|
生成客户端证书:
|
||||||
|
|
||||||
|
@ -51,10 +51,17 @@ The following example shows how to manually configure IKEv2 with Libreswan. Comm
|
|||||||
|
|
||||||
**Note:** Alternatively, you may specify the server's DNS name here. e.g. `PUBLIC_IP=myvpn.example.com`.
|
**Note:** Alternatively, you may specify the server's DNS name here. e.g. `PUBLIC_IP=myvpn.example.com`.
|
||||||
|
|
||||||
1. Add a new IKEv2 connection to `/etc/ipsec.conf`:
|
1. Add a new IKEv2 connection:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
cat >> /etc/ipsec.conf <<EOF
|
if ! grep -qs '^include /etc/ipsec\.d/\*\.conf$' /etc/ipsec.conf; then
|
||||||
|
echo >> /etc/ipsec.conf
|
||||||
|
echo 'include /etc/ipsec.d/*.conf' >> /etc/ipsec.conf
|
||||||
|
fi
|
||||||
|
```
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cat > /etc/ipsec.d/ikev2.conf <<EOF
|
||||||
|
|
||||||
conn ikev2-cp
|
conn ikev2-cp
|
||||||
left=%defaultroute
|
left=%defaultroute
|
||||||
@ -91,19 +98,19 @@ The following example shows how to manually configure IKEv2 with Libreswan. Comm
|
|||||||
For Libreswan 3.23 and newer:
|
For Libreswan 3.23 and newer:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
cat >> /etc/ipsec.conf <<EOF
|
cat >> /etc/ipsec.d/ikev2.conf <<EOF
|
||||||
modecfgdns="8.8.8.8 8.8.4.4"
|
modecfgdns="8.8.8.8 8.8.4.4"
|
||||||
encapsulation=yes
|
encapsulation=yes
|
||||||
mobike=no
|
mobike=no
|
||||||
EOF
|
EOF
|
||||||
```
|
```
|
||||||
|
|
||||||
**Note:** If your server runs Debian or CentOS/RHEL and you wish to enable MOBIKE support, replace `mobike=no` with `mobike=yes` in the command above. DO NOT enable this option on Ubuntu systems.
|
**Note:** If your server (or Docker host) runs Debian or CentOS/RHEL and you wish to enable MOBIKE support, replace `mobike=no` with `mobike=yes` in the command above. **DO NOT** enable this option on Ubuntu systems.
|
||||||
|
|
||||||
For Libreswan 3.19-3.22:
|
For Libreswan 3.19-3.22:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
cat >> /etc/ipsec.conf <<EOF
|
cat >> /etc/ipsec.d/ikev2.conf <<EOF
|
||||||
modecfgdns1=8.8.8.8
|
modecfgdns1=8.8.8.8
|
||||||
modecfgdns2=8.8.4.4
|
modecfgdns2=8.8.4.4
|
||||||
encapsulation=yes
|
encapsulation=yes
|
||||||
@ -113,7 +120,7 @@ The following example shows how to manually configure IKEv2 with Libreswan. Comm
|
|||||||
For Libreswan 3.18 and older:
|
For Libreswan 3.18 and older:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
cat >> /etc/ipsec.conf <<EOF
|
cat >> /etc/ipsec.d/ikev2.conf <<EOF
|
||||||
modecfgdns1=8.8.8.8
|
modecfgdns1=8.8.8.8
|
||||||
modecfgdns2=8.8.4.4
|
modecfgdns2=8.8.4.4
|
||||||
forceencaps=yes
|
forceencaps=yes
|
||||||
@ -165,7 +172,7 @@ The following example shows how to manually configure IKEv2 with Libreswan. Comm
|
|||||||
|
|
||||||
1. Generate client certificate(s), then export the `.p12` file that contains the client certificate, private key, and CA certificate.
|
1. Generate client certificate(s), then export the `.p12` file that contains the client certificate, private key, and CA certificate.
|
||||||
|
|
||||||
**Note:** To connect multiple VPN clients simultaneously, you must generate a unique certificate for each. You may repeat this step to generate certificates for additional VPN clients, but make sure to replace every `vpnclient` with `vpnclient2`, etc.
|
**Note:** You may repeat this step to generate certificates for additional VPN clients, but make sure to replace every `vpnclient` with `vpnclient2`, etc. To connect multiple VPN clients simultaneously, you must generate a unique certificate for each.
|
||||||
|
|
||||||
Generate client certificate:
|
Generate client certificate:
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user