Update docs
This commit is contained in:
parent
82cb3f82b1
commit
7573090022
76
README-zh.md
76
README-zh.md
@ -163,13 +163,64 @@ https://gitlab.com/hwdsl2/setup-ipsec-vpn/-/raw/master/vpnsetup.sh
|
|||||||
如果无法下载,打开 [vpnsetup.sh](vpnsetup.sh),然后点击右边的 `Raw` 按钮。按快捷键 `Ctrl/Cmd+A` 全选,`Ctrl/Cmd+C` 复制,然后粘贴到你喜欢的编辑器。
|
如果无法下载,打开 [vpnsetup.sh](vpnsetup.sh),然后点击右边的 `Raw` 按钮。按快捷键 `Ctrl/Cmd+A` 全选,`Ctrl/Cmd+C` 复制,然后粘贴到你喜欢的编辑器。
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
## 自定义 IKEv2 选项
|
## 自定义 VPN 选项
|
||||||
|
|
||||||
|
### 使用其他的 DNS 服务器
|
||||||
|
|
||||||
|
在 VPN 已连接时,客户端默认配置为使用 [Google Public DNS](https://developers.google.com/speed/public-dns/)。在安装 VPN 时,你可以为所有的 VPN 模式指定另外的 DNS 服务器。这是可选的。示例如下:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 sh vpn.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
使用 `VPN_DNS_SRV1` 指定主 DNS 服务器,使用 `VPN_DNS_SRV2` 指定辅助 DNS 服务器(可选)。
|
||||||
|
|
||||||
|
以下是一些流行的公共 DNS 提供商的列表,供你参考。
|
||||||
|
|
||||||
|
| 提供商 | 主 DNS | 辅助 DNS | 注释 |
|
||||||
|
| ----- | ------ | ------- | ---- |
|
||||||
|
| [Google Public DNS](https://developers.google.com/speed/public-dns) | 8.8.8.8 | 8.8.4.4 | 本项目默认 |
|
||||||
|
| [Cloudflare](https://1.1.1.1/dns/) | 1.1.1.1 | 1.0.0.1 | 另见:[Cloudflare for families](https://1.1.1.1/family/) |
|
||||||
|
| [Quad9](https://www.quad9.net) | 9.9.9.9 | 149.112.112.112 | 阻止恶意域 |
|
||||||
|
| [OpenDNS](https://www.opendns.com/home-internet-security/) | 208.67.222.222 | 208.67.220.220 | 阻止网络钓鱼域,可配置。 |
|
||||||
|
| [CleanBrowsing](https://cleanbrowsing.org/filters/) | 185.228.168.9 | 185.228.169.9 | [域过滤器](https://cleanbrowsing.org/filters/)可用 |
|
||||||
|
| [NextDNS](https://nextdns.io/?from=bg25bwmp) | 按需选择 | 按需选择 | 广告拦截,免费套餐可用。[了解更多](https://nextdns.io/?from=bg25bwmp)。 |
|
||||||
|
| [Control D](https://controld.com/free-dns) | 按需选择 | 按需选择 | 广告拦截,可配置。[了解更多](https://controld.com/free-dns)。 |
|
||||||
|
|
||||||
|
如果你需要在安装 VPN 之后更改 DNS 服务器,参见[高级用法](docs/advanced-usage-zh.md)。
|
||||||
|
|
||||||
|
**注:** 如果服务器上已经配置了 IKEv2,则以上变量对 IKEv2 模式无效。在这种情况下,如需自定义 IKEv2 选项(例如 DNS 服务器),你可以首先 [移除 IKEv2](docs/ikev2-howto-zh.md#移除-ikev2),然后运行 `sudo ikev2.sh` 重新配置。
|
||||||
|
|
||||||
|
### 自定义 IKEv2 选项
|
||||||
|
|
||||||
在安装 VPN 时,高级用户可以自定义 IKEv2 选项。这是可选的。
|
在安装 VPN 时,高级用户可以自定义 IKEv2 选项。这是可选的。
|
||||||
|
|
||||||
|
<details open>
|
||||||
|
<summary>
|
||||||
|
选项 1: 在安装 VPN 时跳过 IKEv2,然后使用自定义选项配置 IKEv2。
|
||||||
|
</summary>
|
||||||
|
|
||||||
|
在安装 VPN 时,你可以跳过 IKEv2,仅安装 IPsec/L2TP 和 IPsec/XAuth ("Cisco IPsec") 模式:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo VPN_SKIP_IKEV2=yes sh vpn.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
(可选)如需为 VPN 客户端指定另外的 DNS 服务器,你可以定义 `VPN_DNS_SRV1` 和 `VPN_DNS_SRV2`(可选)。有关详细信息,参见[使用其他的 DNS 服务器](#使用其他的-dns-服务器)。
|
||||||
|
|
||||||
|
然后运行 IKEv2 辅助脚本以使用自定义选项以交互方式配置 IKEv2:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo ikev2.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
你可以自定义以下选项:VPN 服务器的域名,第一个客户端的名称和证书有效期,VPN 客户端的 DNS 服务器以及是否对客户端配置文件进行密码保护。
|
||||||
|
|
||||||
|
**注:** 如果服务器上已经配置了 IKEv2,则 `VPN_SKIP_IKEV2` 变量无效。在这种情况下,如需自定义 IKEv2 选项,你可以首先 [移除 IKEv2](docs/ikev2-howto-zh.md#移除-ikev2),然后运行 `sudo ikev2.sh` 重新配置。
|
||||||
|
</details>
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
选项 1: 使用环境变量自定义 IKEv2 选项。
|
选项 2: 使用环境变量自定义 IKEv2 选项。
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
在安装 VPN 时,你可以指定一个域名作为 IKEv2 服务器地址。这是可选的。该域名必须是一个全称域名(FQDN)。示例如下:
|
在安装 VPN 时,你可以指定一个域名作为 IKEv2 服务器地址。这是可选的。该域名必须是一个全称域名(FQDN)。示例如下:
|
||||||
@ -198,27 +249,6 @@ sudo VPN_PROTECT_CONFIG=yes sh vpn.sh
|
|||||||
</details>
|
</details>
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
选项 2: 在安装 VPN 时跳过 IKEv2,然后使用自定义选项配置 IKEv2。
|
|
||||||
</summary>
|
|
||||||
|
|
||||||
在安装 VPN 时,你可以跳过 IKEv2,仅安装 IPsec/L2TP 和 IPsec/XAuth ("Cisco IPsec") 模式:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sudo VPN_SKIP_IKEV2=yes sh vpn.sh
|
|
||||||
```
|
|
||||||
|
|
||||||
(可选)如需为 VPN 客户端指定另外的 DNS 服务器,你可以定义 `VPN_DNS_SRV1` 和 `VPN_DNS_SRV2`(可选)。有关详细信息,参见上面的选项 1。
|
|
||||||
|
|
||||||
然后运行 IKEv2 辅助脚本以使用自定义选项以交互方式配置 IKEv2:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sudo ikev2.sh
|
|
||||||
```
|
|
||||||
|
|
||||||
**注:** 如果服务器上已经配置了 IKEv2,则 `VPN_SKIP_IKEV2` 变量无效。在这种情况下,如需自定义 IKEv2 选项,你可以首先 [移除 IKEv2](docs/ikev2-howto-zh.md#移除-ikev2),然后运行 `sudo ikev2.sh` 重新配置。
|
|
||||||
</details>
|
|
||||||
<details>
|
|
||||||
<summary>
|
|
||||||
供参考:IKEv1 和 IKEv2 参数列表。
|
供参考:IKEv1 和 IKEv2 参数列表。
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
|
76
README.md
76
README.md
@ -163,13 +163,64 @@ https://gitlab.com/hwdsl2/setup-ipsec-vpn/-/raw/master/vpnsetup.sh
|
|||||||
If you are unable to download, open [vpnsetup.sh](vpnsetup.sh), then click the `Raw` button on the right. Press `Ctrl/Cmd+A` to select all, `Ctrl/Cmd+C` to copy, then paste into your favorite editor.
|
If you are unable to download, open [vpnsetup.sh](vpnsetup.sh), then click the `Raw` button on the right. Press `Ctrl/Cmd+A` to select all, `Ctrl/Cmd+C` to copy, then paste into your favorite editor.
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
## Customize IKEv2 options
|
## Customize VPN options
|
||||||
|
|
||||||
|
### Use alternative DNS servers
|
||||||
|
|
||||||
|
By default, clients are set to use [Google Public DNS](https://developers.google.com/speed/public-dns/) when the VPN is active. When installing the VPN, you may optionally specify custom DNS server(s) for all VPN modes. Example:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 sh vpn.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
Use `VPN_DNS_SRV1` to specify the primary DNS server, and `VPN_DNS_SRV2` to specify the secondary DNS server (optional).
|
||||||
|
|
||||||
|
Below is a list of some popular public DNS providers for your reference.
|
||||||
|
|
||||||
|
| Provider | Primary DNS | Secondary DNS | Notes |
|
||||||
|
| -------- | ----------- | ------------- | ----- |
|
||||||
|
| [Google Public DNS](https://developers.google.com/speed/public-dns) | 8.8.8.8 | 8.8.4.4 | Default in this project |
|
||||||
|
| [Cloudflare](https://1.1.1.1/dns/) | 1.1.1.1 | 1.0.0.1 | See also: [Cloudflare for families](https://1.1.1.1/family/) |
|
||||||
|
| [Quad9](https://www.quad9.net) | 9.9.9.9 | 149.112.112.112 | Blocks malicious domains |
|
||||||
|
| [OpenDNS](https://www.opendns.com/home-internet-security/) | 208.67.222.222 | 208.67.220.220 | Blocks phishing domains, configurable. |
|
||||||
|
| [CleanBrowsing](https://cleanbrowsing.org/filters/) | 185.228.168.9 | 185.228.169.9 | [Domain filters](https://cleanbrowsing.org/filters/) available |
|
||||||
|
| [NextDNS](https://nextdns.io/?from=bg25bwmp) | Varies | Varies | Ad blocking, free tier available. [Learn more](https://nextdns.io/?from=bg25bwmp). |
|
||||||
|
| [Control D](https://controld.com/free-dns) | Varies | Varies | Ad blocking, configurable. [Learn more](https://controld.com/free-dns). |
|
||||||
|
|
||||||
|
If you need to change DNS servers after VPN setup, see [Advanced usage](docs/advanced-usage.md).
|
||||||
|
|
||||||
|
**Note:** If IKEv2 is already set up on the server, the variables above have no effect for IKEv2 mode. In that case, to customize IKEv2 options such as DNS servers, you can first [remove IKEv2](docs/ikev2-howto.md#remove-ikev2), then set it up again using `sudo ikev2.sh`.
|
||||||
|
|
||||||
|
### Customize IKEv2 options
|
||||||
|
|
||||||
When installing the VPN, advanced users can optionally customize IKEv2 options.
|
When installing the VPN, advanced users can optionally customize IKEv2 options.
|
||||||
|
|
||||||
|
<details open>
|
||||||
|
<summary>
|
||||||
|
Option 1: Skip IKEv2 during VPN setup, then set up IKEv2 using custom options.
|
||||||
|
</summary>
|
||||||
|
|
||||||
|
When installing the VPN, you can skip IKEv2 and only install the IPsec/L2TP and IPsec/XAuth ("Cisco IPsec") modes:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo VPN_SKIP_IKEV2=yes sh vpn.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
(Optional) If you want to specify custom DNS server(s) for VPN clients, define `VPN_DNS_SRV1` and optionally `VPN_DNS_SRV2`. See [Use alternative DNS servers](#use-alternative-dns-servers) for details.
|
||||||
|
|
||||||
|
After that, run the IKEv2 helper script to set up IKEv2 interactively using custom options:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo ikev2.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
You can customize the following options: VPN server's DNS name, name and validity period of the first client, DNS server for VPN clients and whether to password protect client config files.
|
||||||
|
|
||||||
|
**Note:** The `VPN_SKIP_IKEV2` variable has no effect if IKEv2 is already set up on the server. In that case, to customize IKEv2 options, you can first [remove IKEv2](docs/ikev2-howto.md#remove-ikev2), then set it up again using `sudo ikev2.sh`.
|
||||||
|
</details>
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
Option 1: Customize IKEv2 options using environment variables.
|
Option 2: Customize IKEv2 options using environment variables.
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
When installing the VPN, you can optionally specify a DNS name for the IKEv2 server address. The DNS name must be a fully qualified domain name (FQDN). Example:
|
When installing the VPN, you can optionally specify a DNS name for the IKEv2 server address. The DNS name must be a fully qualified domain name (FQDN). Example:
|
||||||
@ -198,27 +249,6 @@ sudo VPN_PROTECT_CONFIG=yes sh vpn.sh
|
|||||||
</details>
|
</details>
|
||||||
<details>
|
<details>
|
||||||
<summary>
|
<summary>
|
||||||
Option 2: Skip IKEv2 during VPN setup, then set up IKEv2 using custom options.
|
|
||||||
</summary>
|
|
||||||
|
|
||||||
When installing the VPN, you can skip IKEv2 and only install the IPsec/L2TP and IPsec/XAuth ("Cisco IPsec") modes:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sudo VPN_SKIP_IKEV2=yes sh vpn.sh
|
|
||||||
```
|
|
||||||
|
|
||||||
(Optional) If you want to specify custom DNS server(s) for VPN clients, define `VPN_DNS_SRV1` and optionally `VPN_DNS_SRV2`. See option 1 above for details.
|
|
||||||
|
|
||||||
After that, run the IKEv2 helper script to set up IKEv2 interactively using custom options:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sudo ikev2.sh
|
|
||||||
```
|
|
||||||
|
|
||||||
**Note:** The `VPN_SKIP_IKEV2` variable has no effect if IKEv2 is already set up on the server. In that case, to customize IKEv2 options, you can first [remove IKEv2](docs/ikev2-howto.md#remove-ikev2), then set it up again using `sudo ikev2.sh`.
|
|
||||||
</details>
|
|
||||||
<details>
|
|
||||||
<summary>
|
|
||||||
For reference: List of IKEv1 and IKEv2 parameters.
|
For reference: List of IKEv1 and IKEv2 parameters.
|
||||||
</summary>
|
</summary>
|
||||||
|
|
||||||
|
@ -17,13 +17,21 @@
|
|||||||
|
|
||||||
## 使用其他的 DNS 服务器
|
## 使用其他的 DNS 服务器
|
||||||
|
|
||||||
在 VPN 已连接时,客户端配置为使用 [Google Public DNS](https://developers.google.com/speed/public-dns/)。如果偏好其它的域名解析服务,你可以编辑以下文件:`/etc/ppp/options.xl2tpd`, `/etc/ipsec.conf` 和 `/etc/ipsec.d/ikev2.conf`(如果存在),并替换 `8.8.8.8` 和 `8.8.4.4`。然后运行 `service ipsec restart` 和 `service xl2tpd restart`。
|
在 VPN 已连接时,客户端默认配置为使用 [Google Public DNS](https://developers.google.com/speed/public-dns/)。如果偏好其它的域名解析服务,你可以编辑以下文件:`/etc/ppp/options.xl2tpd`, `/etc/ipsec.conf` 和 `/etc/ipsec.d/ikev2.conf`(如果存在),并替换 `8.8.8.8` 和 `8.8.4.4`。然后运行 `service ipsec restart` 和 `service xl2tpd restart`。
|
||||||
|
|
||||||
高级用户可以在运行 VPN 安装脚本和 [IKEv2 辅助脚本](ikev2-howto-zh.md#使用辅助脚本配置-ikev2) 时定义 `VPN_DNS_SRV1` 和 `VPN_DNS_SRV2`(可选)。比如你想使用 [Cloudflare 的 DNS 服务](https://1.1.1.1/dns/):
|
以下是一些流行的公共 DNS 提供商的列表,供你参考。
|
||||||
|
|
||||||
```
|
| 提供商 | 主 DNS | 辅助 DNS | 注释 |
|
||||||
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 sh vpn.sh
|
| ----- | ------ | ------- | ---- |
|
||||||
```
|
| [Google Public DNS](https://developers.google.com/speed/public-dns) | 8.8.8.8 | 8.8.4.4 | 本项目默认 |
|
||||||
|
| [Cloudflare](https://1.1.1.1/dns/) | 1.1.1.1 | 1.0.0.1 | 另见:[Cloudflare for families](https://1.1.1.1/family/) |
|
||||||
|
| [Quad9](https://www.quad9.net) | 9.9.9.9 | 149.112.112.112 | 阻止恶意域 |
|
||||||
|
| [OpenDNS](https://www.opendns.com/home-internet-security/) | 208.67.222.222 | 208.67.220.220 | 阻止网络钓鱼域,可配置。 |
|
||||||
|
| [CleanBrowsing](https://cleanbrowsing.org/filters/) | 185.228.168.9 | 185.228.169.9 | [域过滤器](https://cleanbrowsing.org/filters/)可用 |
|
||||||
|
| [NextDNS](https://nextdns.io/?from=bg25bwmp) | 按需选择 | 按需选择 | 广告拦截,免费套餐可用。[了解更多](https://nextdns.io/?from=bg25bwmp)。 |
|
||||||
|
| [Control D](https://controld.com/free-dns) | 按需选择 | 按需选择 | 广告拦截,可配置。[了解更多](https://controld.com/free-dns)。 |
|
||||||
|
|
||||||
|
高级用户可以在运行 VPN 安装脚本时定义 `VPN_DNS_SRV1` 和 `VPN_DNS_SRV2`(可选)。有关更多详细信息,请参见[自定义 VPN 选项](../README-zh.md#自定义-vpn-选项)。
|
||||||
|
|
||||||
在某些情况下,你可能希望 VPN 客户端仅使用指定的 DNS 服务器来解析内部域名,并使用其本地配置的 DNS 服务器来解析所有其他域名。这可以使用 `modecfgdomains` 选项进行配置,例如 `modecfgdomains="internal.example.com, home"`。对于 IKEv2,将此选项添加到 `/etc/ipsec.d/ikev2.conf` 中的 `conn ikev2-cp` 小节。对于 IPsec/XAuth ("Cisco IPsec"),将此选项添加到 `/etc/ipsec.conf` 中的 `conn xauth-psk` 小节。然后运行 `service ipsec restart`。IPsec/L2TP 模式不支持此选项。
|
在某些情况下,你可能希望 VPN 客户端仅使用指定的 DNS 服务器来解析内部域名,并使用其本地配置的 DNS 服务器来解析所有其他域名。这可以使用 `modecfgdomains` 选项进行配置,例如 `modecfgdomains="internal.example.com, home"`。对于 IKEv2,将此选项添加到 `/etc/ipsec.d/ikev2.conf` 中的 `conn ikev2-cp` 小节。对于 IPsec/XAuth ("Cisco IPsec"),将此选项添加到 `/etc/ipsec.conf` 中的 `conn xauth-psk` 小节。然后运行 `service ipsec restart`。IPsec/L2TP 模式不支持此选项。
|
||||||
|
|
||||||
|
@ -17,13 +17,21 @@
|
|||||||
|
|
||||||
## Use alternative DNS servers
|
## Use alternative DNS servers
|
||||||
|
|
||||||
Clients are set to use [Google Public DNS](https://developers.google.com/speed/public-dns/) when the VPN is active. If another DNS provider is preferred, you may replace `8.8.8.8` and `8.8.4.4` in these files: `/etc/ppp/options.xl2tpd`, `/etc/ipsec.conf` and `/etc/ipsec.d/ikev2.conf` (if exists). Then run `service ipsec restart` and `service xl2tpd restart`.
|
By default, clients are set to use [Google Public DNS](https://developers.google.com/speed/public-dns/) when the VPN is active. If another DNS provider is preferred, you may replace `8.8.8.8` and `8.8.4.4` in these files: `/etc/ppp/options.xl2tpd`, `/etc/ipsec.conf` and `/etc/ipsec.d/ikev2.conf` (if exists). Then run `service ipsec restart` and `service xl2tpd restart`.
|
||||||
|
|
||||||
Advanced users can define `VPN_DNS_SRV1` and optionally `VPN_DNS_SRV2` when running the VPN setup script and the [IKEv2 helper script](ikev2-howto.md#set-up-ikev2-using-helper-script). For example, if you want to use [Cloudflare's DNS service](https://1.1.1.1/dns/):
|
Below is a list of some popular public DNS providers for your reference.
|
||||||
|
|
||||||
```
|
| Provider | Primary DNS | Secondary DNS | Notes |
|
||||||
sudo VPN_DNS_SRV1=1.1.1.1 VPN_DNS_SRV2=1.0.0.1 sh vpn.sh
|
| -------- | ----------- | ------------- | ----- |
|
||||||
```
|
| [Google Public DNS](https://developers.google.com/speed/public-dns) | 8.8.8.8 | 8.8.4.4 | Default in this project |
|
||||||
|
| [Cloudflare](https://1.1.1.1/dns/) | 1.1.1.1 | 1.0.0.1 | See also: [Cloudflare for families](https://1.1.1.1/family/) |
|
||||||
|
| [Quad9](https://www.quad9.net) | 9.9.9.9 | 149.112.112.112 | Blocks malicious domains |
|
||||||
|
| [OpenDNS](https://www.opendns.com/home-internet-security/) | 208.67.222.222 | 208.67.220.220 | Blocks phishing domains, configurable. |
|
||||||
|
| [CleanBrowsing](https://cleanbrowsing.org/filters/) | 185.228.168.9 | 185.228.169.9 | [Domain filters](https://cleanbrowsing.org/filters/) available |
|
||||||
|
| [NextDNS](https://nextdns.io/?from=bg25bwmp) | Varies | Varies | Ad blocking, free tier available. [Learn more](https://nextdns.io/?from=bg25bwmp). |
|
||||||
|
| [Control D](https://controld.com/free-dns) | Varies | Varies | Ad blocking, configurable. [Learn more](https://controld.com/free-dns). |
|
||||||
|
|
||||||
|
Advanced users can define `VPN_DNS_SRV1` and optionally `VPN_DNS_SRV2` when running the VPN setup script. For more details, see [Customize VPN options](../README.md#customize-vpn-options).
|
||||||
|
|
||||||
In certain circumstances, you may want VPN clients to use the specified DNS server(s) only for resolving internal domain name(s), and use their locally configured DNS servers to resolve all other domain names. This can be configured using the `modecfgdomains` option, e.g. `modecfgdomains="internal.example.com, home"`. Add this option to section `conn ikev2-cp` in `/etc/ipsec.d/ikev2.conf` for IKEv2, and to section `conn xauth-psk` in `/etc/ipsec.conf` for IPsec/XAuth ("Cisco IPsec"). Then run `service ipsec restart`. IPsec/L2TP mode does not support this option.
|
In certain circumstances, you may want VPN clients to use the specified DNS server(s) only for resolving internal domain name(s), and use their locally configured DNS servers to resolve all other domain names. This can be configured using the `modecfgdomains` option, e.g. `modecfgdomains="internal.example.com, home"`. Add this option to section `conn ikev2-cp` in `/etc/ipsec.d/ikev2.conf` for IKEv2, and to section `conn xauth-psk` in `/etc/ipsec.conf` for IPsec/XAuth ("Cisco IPsec"). Then run `service ipsec restart`. IPsec/L2TP mode does not support this option.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user