parent
651c404bf6
commit
8817e6f924
@ -419,6 +419,8 @@ sudo yum --enablerepo=epel install NetworkManager-strongswan-gnome
|
||||
# 示例:提取 CA 证书,客户端证书和私钥。在完成后可以删除 .p12 文件。
|
||||
# 注:你可能需要输入 import password,它可以在 IKEv2 辅助脚本的输出中找到。
|
||||
# 如果在脚本的输出中没有 import password,请按回车键继续。
|
||||
# 注:如果使用 OpenSSL 3.x (运行 "openssl version" 进行检查),
|
||||
# 请将 "-legacy" 附加到下面的 3 个命令。
|
||||
openssl pkcs12 -in vpnclient.p12 -cacerts -nokeys -out ca.cer
|
||||
openssl pkcs12 -in vpnclient.p12 -clcerts -nokeys -out client.cer
|
||||
openssl pkcs12 -in vpnclient.p12 -nocerts -nodes -out client.key
|
||||
|
@ -421,6 +421,8 @@ Next, securely transfer the generated `.p12` file from the VPN server to your Li
|
||||
# Note: You may need to enter the import password, which can be found
|
||||
# in the output of the IKEv2 helper script. If the output does not
|
||||
# contain an import password, press Enter to continue.
|
||||
# Note: If using OpenSSL 3.x (run "openssl version" to check),
|
||||
# append "-legacy" to the 3 commands below.
|
||||
openssl pkcs12 -in vpnclient.p12 -cacerts -nokeys -out ca.cer
|
||||
openssl pkcs12 -in vpnclient.p12 -clcerts -nokeys -out client.cer
|
||||
openssl pkcs12 -in vpnclient.p12 -nocerts -nodes -out client.key
|
||||
|
Loading…
Reference in New Issue
Block a user