Fix IKEv2 docs
- Fixed an issue with address pool clashing by reverting to rightaddresspool=192.168.43.10-192.168.43.250 - Replaced "Example" with "IKEv2 VPN" for clarity - Closes #465
This commit is contained in:
parent
26ef49b099
commit
9c529435cf
@ -44,7 +44,7 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
leftrsasigkey=%cert
|
leftrsasigkey=%cert
|
||||||
right=%any
|
right=%any
|
||||||
rightid=%fromcert
|
rightid=%fromcert
|
||||||
rightaddresspool=192.168.43.150-192.168.43.250
|
rightaddresspool=192.168.43.10-192.168.43.250
|
||||||
rightca=%same
|
rightca=%same
|
||||||
rightrsasigkey=%cert
|
rightrsasigkey=%cert
|
||||||
narrowing=yes
|
narrowing=yes
|
||||||
@ -101,8 +101,8 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ certutil -z <(head -c 1024 /dev/urandom) \
|
$ certutil -z <(head -c 1024 /dev/urandom) \
|
||||||
-S -x -n "Example CA" \
|
-S -x -n "IKEv2 VPN CA" \
|
||||||
-s "O=Example,CN=Example CA" \
|
-s "O=IKEv2 VPN,CN=IKEv2 VPN CA" \
|
||||||
-k rsa -g 4096 -v 36 \
|
-k rsa -g 4096 -v 36 \
|
||||||
-d sql:/etc/ipsec.d -t "CT,," -2
|
-d sql:/etc/ipsec.d -t "CT,," -2
|
||||||
```
|
```
|
||||||
@ -119,8 +119,8 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ certutil -z <(head -c 1024 /dev/urandom) \
|
$ certutil -z <(head -c 1024 /dev/urandom) \
|
||||||
-S -c "Example CA" -n "$PUBLIC_IP" \
|
-S -c "IKEv2 VPN CA" -n "$PUBLIC_IP" \
|
||||||
-s "O=Example,CN=$PUBLIC_IP" \
|
-s "O=IKEv2 VPN,CN=$PUBLIC_IP" \
|
||||||
-k rsa -g 4096 -v 36 \
|
-k rsa -g 4096 -v 36 \
|
||||||
-d sql:/etc/ipsec.d -t ",," \
|
-d sql:/etc/ipsec.d -t ",," \
|
||||||
--keyUsage digitalSignature,keyEncipherment \
|
--keyUsage digitalSignature,keyEncipherment \
|
||||||
@ -136,8 +136,8 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ certutil -z <(head -c 1024 /dev/urandom) \
|
$ certutil -z <(head -c 1024 /dev/urandom) \
|
||||||
-S -c "Example CA" -n "vpnclient" \
|
-S -c "IKEv2 VPN CA" -n "vpnclient" \
|
||||||
-s "O=Example,CN=vpnclient" \
|
-s "O=IKEv2 VPN,CN=vpnclient" \
|
||||||
-k rsa -g 4096 -v 36 \
|
-k rsa -g 4096 -v 36 \
|
||||||
-d sql:/etc/ipsec.d -t ",," \
|
-d sql:/etc/ipsec.d -t ",," \
|
||||||
--keyUsage digitalSignature,keyEncipherment \
|
--keyUsage digitalSignature,keyEncipherment \
|
||||||
@ -149,7 +149,7 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
```
|
```
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ certutil -L -d sql:/etc/ipsec.d -n "Example CA" -a -o vpnca.cer
|
$ certutil -L -d sql:/etc/ipsec.d -n "IKEv2 VPN CA" -a -o vpnca.cer
|
||||||
```
|
```
|
||||||
|
|
||||||
**注:** 这个 `vpnca.cer` 文件仅需要在 iOS 客户端上使用。
|
**注:** 这个 `vpnca.cer` 文件仅需要在 iOS 客户端上使用。
|
||||||
@ -178,7 +178,7 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
Certificate Nickname Trust Attributes
|
Certificate Nickname Trust Attributes
|
||||||
SSL,S/MIME,JAR/XPI
|
SSL,S/MIME,JAR/XPI
|
||||||
|
|
||||||
Example CA CTu,u,u
|
IKEv2 VPN CA CTu,u,u
|
||||||
($PUBLIC_IP) u,u,u
|
($PUBLIC_IP) u,u,u
|
||||||
vpnclient u,u,u
|
vpnclient u,u,u
|
||||||
```
|
```
|
||||||
@ -191,7 +191,7 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
$ service ipsec restart
|
$ service ipsec restart
|
||||||
```
|
```
|
||||||
|
|
||||||
1. 将文件 `vpnclient.p12` 安全地传送到 VPN 客户端设备。下一步:
|
1. 将文件 `vpnclient.p12` 安全地传送到 VPN 客户端设备。然后按照你的操作系统对应的步骤操作。**注:** 如果你在上面的第一步指定了服务器的域名,则需要在 **Server** 和 **Remote ID** 字段中输入域名而不是 IP 地址。
|
||||||
|
|
||||||
#### Windows 7, 8.x 和 10
|
#### Windows 7, 8.x 和 10
|
||||||
|
|
||||||
@ -220,7 +220,7 @@ Libreswan 支持通过使用 RSA 签名算法的 X.509 Machine Certificates 来
|
|||||||
|
|
||||||
#### iOS (iPhone/iPad)
|
#### iOS (iPhone/iPad)
|
||||||
|
|
||||||
首先,将你在上面的步骤 4 中导出的两个文件 `vpnca.cer` and `vpnclient.p12` 以电子邮件附件的形式发送给你自己,然后在 iOS 邮件应用中点击它们并逐个导入为 iOS 配置描述文件。或者,你也可以将文件放在一个你的安全的托管网站上,然后在 Mobile Safari 中下载并导入。在完成之后,检查并确保 `vpnclient` 和 `Example CA` 都显示在设置 -> 通用 -> 描述文件中。
|
首先,将你在上面的步骤 4 中导出的两个文件 `vpnca.cer` and `vpnclient.p12` 以电子邮件附件的形式发送给你自己,然后在 iOS 邮件应用中点击它们并逐个导入为 iOS 配置描述文件。或者,你也可以将文件放在一个你的安全的托管网站上,然后在 Mobile Safari 中下载并导入。在完成之后,检查并确保 `vpnclient` 和 `IKEv2 VPN CA` 都显示在设置 -> 通用 -> 描述文件中。
|
||||||
|
|
||||||
1. 进入设置 -> 通用 -> VPN。
|
1. 进入设置 -> 通用 -> VPN。
|
||||||
1. 单击 **添加VPN配置...**。
|
1. 单击 **添加VPN配置...**。
|
||||||
|
@ -44,7 +44,7 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
leftrsasigkey=%cert
|
leftrsasigkey=%cert
|
||||||
right=%any
|
right=%any
|
||||||
rightid=%fromcert
|
rightid=%fromcert
|
||||||
rightaddresspool=192.168.43.150-192.168.43.250
|
rightaddresspool=192.168.43.10-192.168.43.250
|
||||||
rightca=%same
|
rightca=%same
|
||||||
rightrsasigkey=%cert
|
rightrsasigkey=%cert
|
||||||
narrowing=yes
|
narrowing=yes
|
||||||
@ -101,8 +101,8 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ certutil -z <(head -c 1024 /dev/urandom) \
|
$ certutil -z <(head -c 1024 /dev/urandom) \
|
||||||
-S -x -n "Example CA" \
|
-S -x -n "IKEv2 VPN CA" \
|
||||||
-s "O=Example,CN=Example CA" \
|
-s "O=IKEv2 VPN,CN=IKEv2 VPN CA" \
|
||||||
-k rsa -g 4096 -v 36 \
|
-k rsa -g 4096 -v 36 \
|
||||||
-d sql:/etc/ipsec.d -t "CT,," -2
|
-d sql:/etc/ipsec.d -t "CT,," -2
|
||||||
```
|
```
|
||||||
@ -119,8 +119,8 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ certutil -z <(head -c 1024 /dev/urandom) \
|
$ certutil -z <(head -c 1024 /dev/urandom) \
|
||||||
-S -c "Example CA" -n "$PUBLIC_IP" \
|
-S -c "IKEv2 VPN CA" -n "$PUBLIC_IP" \
|
||||||
-s "O=Example,CN=$PUBLIC_IP" \
|
-s "O=IKEv2 VPN,CN=$PUBLIC_IP" \
|
||||||
-k rsa -g 4096 -v 36 \
|
-k rsa -g 4096 -v 36 \
|
||||||
-d sql:/etc/ipsec.d -t ",," \
|
-d sql:/etc/ipsec.d -t ",," \
|
||||||
--keyUsage digitalSignature,keyEncipherment \
|
--keyUsage digitalSignature,keyEncipherment \
|
||||||
@ -136,8 +136,8 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ certutil -z <(head -c 1024 /dev/urandom) \
|
$ certutil -z <(head -c 1024 /dev/urandom) \
|
||||||
-S -c "Example CA" -n "vpnclient" \
|
-S -c "IKEv2 VPN CA" -n "vpnclient" \
|
||||||
-s "O=Example,CN=vpnclient" \
|
-s "O=IKEv2 VPN,CN=vpnclient" \
|
||||||
-k rsa -g 4096 -v 36 \
|
-k rsa -g 4096 -v 36 \
|
||||||
-d sql:/etc/ipsec.d -t ",," \
|
-d sql:/etc/ipsec.d -t ",," \
|
||||||
--keyUsage digitalSignature,keyEncipherment \
|
--keyUsage digitalSignature,keyEncipherment \
|
||||||
@ -149,7 +149,7 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
```
|
```
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ certutil -L -d sql:/etc/ipsec.d -n "Example CA" -a -o vpnca.cer
|
$ certutil -L -d sql:/etc/ipsec.d -n "IKEv2 VPN CA" -a -o vpnca.cer
|
||||||
```
|
```
|
||||||
|
|
||||||
**Note:** This `vpnca.cer` file is only required for iOS clients.
|
**Note:** This `vpnca.cer` file is only required for iOS clients.
|
||||||
@ -178,7 +178,7 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
Certificate Nickname Trust Attributes
|
Certificate Nickname Trust Attributes
|
||||||
SSL,S/MIME,JAR/XPI
|
SSL,S/MIME,JAR/XPI
|
||||||
|
|
||||||
Example CA CTu,u,u
|
IKEv2 VPN CA CTu,u,u
|
||||||
($PUBLIC_IP) u,u,u
|
($PUBLIC_IP) u,u,u
|
||||||
vpnclient u,u,u
|
vpnclient u,u,u
|
||||||
```
|
```
|
||||||
@ -191,7 +191,7 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
$ service ipsec restart
|
$ service ipsec restart
|
||||||
```
|
```
|
||||||
|
|
||||||
1. The `vpnclient.p12` file should then be securely transferred to the VPN client device. Next steps:
|
1. The `vpnclient.p12` file should then be securely transferred to the VPN client device. Next, follow instructions for your operating system. **Note:** If you specified your server's DNS name in step 1 above, enter the DNS name instead of IP address in the **Server** and **Remote ID** fields.
|
||||||
|
|
||||||
#### Windows 7, 8.x and 10
|
#### Windows 7, 8.x and 10
|
||||||
|
|
||||||
@ -220,7 +220,7 @@ Before continuing, make sure you have successfully <a href="https://github.com/h
|
|||||||
|
|
||||||
#### iOS (iPhone/iPad)
|
#### iOS (iPhone/iPad)
|
||||||
|
|
||||||
First, send both `vpnca.cer` and `vpnclient.p12` (exported from step 4 above) to yourself as email attachments, then click to import them one by one as iOS profiles in the iOS Mail app. Alternatively, host the files on a secure website of yours, then download and import in Mobile Safari. When finished, check to make sure both `vpnclient` and `Example CA` are listed under Settings -> General -> Profiles.
|
First, send both `vpnca.cer` and `vpnclient.p12` (exported from step 4 above) to yourself as email attachments, then click to import them one by one as iOS profiles in the iOS Mail app. Alternatively, host the files on a secure website of yours, then download and import in Mobile Safari. When finished, check to make sure both `vpnclient` and `IKEv2 VPN CA` are listed under Settings -> General -> Profiles.
|
||||||
|
|
||||||
1. Go to Settings -> General -> VPN.
|
1. Go to Settings -> General -> VPN.
|
||||||
1. Tap **Add VPN Configuration...**.
|
1. Tap **Add VPN Configuration...**.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user