Update docs
This commit is contained in:
parent
7b5d7a3738
commit
5bdf03a39c
@ -155,7 +155,7 @@ sudo VPN_CLIENT_NAME='your_client_name' sh vpn.sh
|
|||||||
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 sh vpn.sh
|
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 sh vpn.sh
|
||||||
```
|
```
|
||||||
|
|
||||||
默认情况下,导入 IKEv2 客户端配置时不需要密码。你可以选择使用随机密码保护客户端配置文件。示例如下:
|
默认情况下,导入 IKEv2 客户端配置时不需要密码。你可以选择使用随机密码保护客户端配置文件。
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo VPN_PROTECT_CONFIG=yes sh vpn.sh
|
sudo VPN_PROTECT_CONFIG=yes sh vpn.sh
|
||||||
|
@ -155,7 +155,7 @@ By default, clients are set to use [Google Public DNS](https://developers.google
|
|||||||
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 sh vpn.sh
|
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 sh vpn.sh
|
||||||
```
|
```
|
||||||
|
|
||||||
By default, no password is required when importing IKEv2 client configuration. You can choose to protect client config files using a random password. Example:
|
By default, no password is required when importing IKEv2 client configuration. You can choose to protect client config files using a random password.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo VPN_PROTECT_CONFIG=yes sh vpn.sh
|
sudo VPN_PROTECT_CONFIG=yes sh vpn.sh
|
||||||
|
@ -53,7 +53,7 @@ sudo bash ikev2onlymode.sh
|
|||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
另外,你也可以手动启用仅限 IKEv2 模式。点这里查看详情。
|
另外,你也可以手动启用仅限 IKEv2 模式。
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
另外,你也可以手动启用仅限 IKEv2 模式。首先使用 `ipsec --version` 命令检查 Libreswan 版本,并 [更新 Libreswan](../README-zh.md#升级libreswan)(如果需要)。然后编辑 VPN 服务器上的 `/etc/ipsec.conf`。在 `config setup` 小节的末尾添加 `ikev1-policy=drop`,开头必须空两格。保存文件并运行 `service ipsec restart`。在完成后,你可以使用 `ipsec status` 命令来验证仅启用了 `ikev2-cp` 连接。
|
另外,你也可以手动启用仅限 IKEv2 模式。首先使用 `ipsec --version` 命令检查 Libreswan 版本,并 [更新 Libreswan](../README-zh.md#升级libreswan)(如果需要)。然后编辑 VPN 服务器上的 `/etc/ipsec.conf`。在 `config setup` 小节的末尾添加 `ikev1-policy=drop`,开头必须空两格。保存文件并运行 `service ipsec restart`。在完成后,你可以使用 `ipsec status` 命令来验证仅启用了 `ikev2-cp` 连接。
|
||||||
|
@ -53,7 +53,7 @@ To disable IKEv2-only mode, run the helper script again and select the appropria
|
|||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
Alternatively, you may manually enable IKEv2-only mode. Click here for details.
|
Alternatively, you may manually enable IKEv2-only mode.
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
Alternatively, you may manually enable IKEv2-only mode. First check Libreswan version using `ipsec --version`, and [update Libreswan](../README.md#upgrade-libreswan) if needed. Then edit `/etc/ipsec.conf` on the VPN server. Append `ikev1-policy=drop` to the end of the `config setup` section, indented by two spaces. Save the file and run `service ipsec restart`. When finished, you can run `ipsec status` to verify that only the `ikev2-cp` connection is enabled.
|
Alternatively, you may manually enable IKEv2-only mode. First check Libreswan version using `ipsec --version`, and [update Libreswan](../README.md#upgrade-libreswan) if needed. Then edit `/etc/ipsec.conf` on the VPN server. Append `ikev1-policy=drop` to the end of the `config setup` section, indented by two spaces. Save the file and run `service ipsec restart`. When finished, you can run `ipsec status` to verify that only the `ikev2-cp` connection is enabled.
|
||||||
|
@ -84,7 +84,7 @@ sudo VPN_CLIENT_NAME='your_client_name' ikev2.sh --auto
|
|||||||
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 ikev2.sh --auto
|
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 ikev2.sh --auto
|
||||||
```
|
```
|
||||||
|
|
||||||
默认情况下,导入 IKEv2 客户端配置时不需要密码。你可以选择使用随机密码保护客户端配置文件。示例如下:
|
默认情况下,导入 IKEv2 客户端配置时不需要密码。你可以选择使用随机密码保护客户端配置文件。
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo VPN_PROTECT_CONFIG=yes ikev2.sh --auto
|
sudo VPN_PROTECT_CONFIG=yes ikev2.sh --auto
|
||||||
@ -595,7 +595,7 @@ sudo ikev2.sh --revokeclient [client name]
|
|||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
另外,你也可以手动吊销客户端证书。点这里查看步骤。
|
另外,你也可以手动吊销客户端证书。
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
另外,你也可以手动吊销客户端证书。这可以通过 `crlutil` 实现。下面举例说明,这些命令必须用 `root` 账户运行。
|
另外,你也可以手动吊销客户端证书。这可以通过 `crlutil` 实现。下面举例说明,这些命令必须用 `root` 账户运行。
|
||||||
@ -996,7 +996,7 @@ sudo ikev2.sh --removeikev2
|
|||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
另外,你也可以手动移除 IKEv2。点这里查看步骤。
|
另外,你也可以手动移除 IKEv2。
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
要手动从 VPN 服务器移除 IKEv2,但是保留 [IPsec/L2TP](clients-zh.md) 和 [IPsec/XAuth ("Cisco IPsec")](clients-xauth-zh.md) 模式,按照以下步骤操作。这些命令必须用 `root` 账户运行。
|
要手动从 VPN 服务器移除 IKEv2,但是保留 [IPsec/L2TP](clients-zh.md) 和 [IPsec/XAuth ("Cisco IPsec")](clients-xauth-zh.md) 模式,按照以下步骤操作。这些命令必须用 `root` 账户运行。
|
||||||
|
@ -84,7 +84,7 @@ By default, IKEv2 clients are set to use [Google Public DNS](https://developers.
|
|||||||
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 ikev2.sh --auto
|
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 ikev2.sh --auto
|
||||||
```
|
```
|
||||||
|
|
||||||
By default, no password is required when importing IKEv2 client configuration. You can choose to protect client config files using a random password. Example:
|
By default, no password is required when importing IKEv2 client configuration. You can choose to protect client config files using a random password.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo VPN_PROTECT_CONFIG=yes ikev2.sh --auto
|
sudo VPN_PROTECT_CONFIG=yes ikev2.sh --auto
|
||||||
@ -597,10 +597,10 @@ sudo ikev2.sh --revokeclient [client name]
|
|||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
Alternatively, you may manually revoke a client certificate. Click here for instructions.
|
Alternatively, you can manually revoke a client certificate.
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
Alternatively, you may manually revoke a client certificate. This can be done using `crlutil`. See example steps below, commands must be run as `root`.
|
Alternatively, you can manually revoke a client certificate. This can be done using `crlutil`. See example steps below, commands must be run as `root`.
|
||||||
|
|
||||||
1. Check the database, and identify the nickname of the client certificate you want to revoke.
|
1. Check the database, and identify the nickname of the client certificate you want to revoke.
|
||||||
|
|
||||||
@ -998,7 +998,7 @@ After removing IKEv2, if you want to set it up again, refer to [this section](#s
|
|||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
Alternatively, you can manually remove IKEv2. Click here for instructions.
|
Alternatively, you can manually remove IKEv2.
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
To manually remove IKEv2 from the VPN server, but keep the [IPsec/L2TP](clients.md) and [IPsec/XAuth ("Cisco IPsec")](clients-xauth.md) modes, follow these steps. Commands must be run as `root`.
|
To manually remove IKEv2 from the VPN server, but keep the [IPsec/L2TP](clients.md) and [IPsec/XAuth ("Cisco IPsec")](clients-xauth.md) modes, follow these steps. Commands must be run as `root`.
|
||||||
|
Loading…
Reference in New Issue
Block a user