"LINUX VPN 設定" 修訂間的差異
(已建立頁面,內容為 "紅字的部分是須根據個人的帳號與密碼設定, 如test 帳號, 密碼:123456 Linux VPN Client 建置 一.參考網址 https://zh.codepre.com/how-to…") |
|||
(未顯示同一使用者於中間所作的 7 次修訂) | |||
行 1: | 行 1: | ||
− | |||
Linux VPN Client 建置 | Linux VPN Client 建置 | ||
− | 一.參考網址 https://zh.codepre.com/how-to-6731.html | + | 一.參考網址 https://zh.codepre.com/how-to-6731.html 及 https://kifarunix.com/configure-strongswan-vpn-client-on-ubuntu-18-04-centos-8/ |
二.對CentOS 8 環境失敗 | 二.對CentOS 8 環境失敗 | ||
行 13: | 行 12: | ||
1. Install strongSwan | 1. Install strongSwan | ||
− | apt update | + | apt update |
− | apt install strongswan libcharon-extra-plugins | + | apt install strongswan libcharon-extra-plugins |
2. Install strongSwan VPN Server CA certificate on the Client | 2. Install strongSwan VPN Server CA certificate on the Client | ||
− | 將vpn1.ncu.edu.tw 的chainXX.pem(/etc/letsencrypt/archive/vpn1.ncu.edu.tw 目錄下) , 更名成chain.pem , 放置到/etc/ipsec.d/cacerts/ 目錄下 | + | |
+ | 將vpn1.ncu.edu.tw 的chainXX.pem(/etc/letsencrypt/archive/vpn1.ncu.edu.tw 目錄下) , 更名成chain.pem , 放置到/etc/ipsec.d/cacerts/ 目錄下 | ||
3. Configure strongSwan VPN client | 3. Configure strongSwan VPN client | ||
− | (1) vi /etc/ipsec.conf | + | |
+ | (1) vi /etc/ipsec.conf | ||
+ | |||
conn ipsec-ikev2-vpn-client | conn ipsec-ikev2-vpn-client | ||
行 37: | 行 39: | ||
leftid=test | leftid=test | ||
+ | |||
+ | #根據個人的帳號與密碼設定, 如test 帳號 | ||
leftauth=eap-mschapv2 | leftauth=eap-mschapv2 | ||
行 42: | 行 46: | ||
eap_identity=%identity | eap_identity=%identity | ||
− | + | (2)vi /etc/ipsec.secrets | |
− | |||
− | (2)vi /etc/ipsec.secrets | ||
− | |||
− | |||
− | |||
− | |||
− | # RSA private | + | # This file holds shared secrets or RSA private keys for authentication. |
− | # | + | # RSA private key for this host, authenticating it to any other host |
− | + | # which knows the public part. | |
− | # user id : EAP secret | + | # user id : EAP secret |
− | test : EAP "123456" | + | test : EAP "123456" |
− | # | + | #根據個人的帳號與密碼設定, 如test 帳號, 密碼:123456 |
− | # | + | # this file is managed with debconf and will contain the automatically created private key |
− | + | #include /var/lib/strongswan/ipsec.secrets.inc | |
4. 解決no issuer certificate found 'C=US , O="Let's Encrypt, CN=R3"憑證問題 | 4. 解決no issuer certificate found 'C=US , O="Let's Encrypt, CN=R3"憑證問題 | ||
− | cp /etc/ssl/certs/DST_ROOT_X3.pem /etc/ipsec.d/cacerts/ | + | cp /etc/ssl/certs/DST_ROOT_X3.pem /etc/ipsec.d/cacerts/ |
− | cp /etc/ssl/certs/ISRG_Root_X1.pem etc/ipsec.d/cacerts/ | + | cp /etc/ssl/certs/ISRG_Root_X1.pem etc/ipsec.d/cacerts/ |
5.啟動 strongswan | 5.啟動 strongswan | ||
− | systemctl start strongswan | + | systemctl start strongswan |
− | ps:避免strongswan 在系統啟動時運行systemctl disable strongswan | + | ps:避免strongswan 在系統啟動時運行systemctl disable strongswan |
6.查看狀況 | 6.查看狀況 | ||
− | systemctl status strongswan | + | systemctl status strongswan |
於 2021年6月3日 (四) 05:46 的最新修訂
Linux VPN Client 建置
一.參考網址 https://zh.codepre.com/how-to-6731.html 及 https://kifarunix.com/configure-strongswan-vpn-client-on-ubuntu-18-04-centos-8/
二.對CentOS 8 環境失敗
三.使用Ubuntu Live Server 18.04.5 環境測試OK
四. 設定方式如下
1. Install strongSwan
apt update
apt install strongswan libcharon-extra-plugins
2. Install strongSwan VPN Server CA certificate on the Client
將vpn1.ncu.edu.tw 的chainXX.pem(/etc/letsencrypt/archive/vpn1.ncu.edu.tw 目錄下) , 更名成chain.pem , 放置到/etc/ipsec.d/cacerts/ 目錄下
3. Configure strongSwan VPN client
(1) vi /etc/ipsec.conf
conn ipsec-ikev2-vpn-client
auto=start
right=vpn1.ncu.edu.tw
rightid=vpn1.ncu.edu.tw
rightsubnet=0.0.0.0/0
rightauth=pubkey
leftsourceip=%config
leftid=test
#根據個人的帳號與密碼設定, 如test 帳號
leftauth=eap-mschapv2
eap_identity=%identity
(2)vi /etc/ipsec.secrets
# This file holds shared secrets or RSA private keys for authentication.
# RSA private key for this host, authenticating it to any other host
# which knows the public part.
# user id : EAP secret
test : EAP "123456"
#根據個人的帳號與密碼設定, 如test 帳號, 密碼:123456
# this file is managed with debconf and will contain the automatically created private key
#include /var/lib/strongswan/ipsec.secrets.inc
4. 解決no issuer certificate found 'C=US , O="Let's Encrypt, CN=R3"憑證問題
cp /etc/ssl/certs/DST_ROOT_X3.pem /etc/ipsec.d/cacerts/
cp /etc/ssl/certs/ISRG_Root_X1.pem etc/ipsec.d/cacerts/
5.啟動 strongswan
systemctl start strongswan
ps:避免strongswan 在系統啟動時運行systemctl disable strongswan
6.查看狀況
systemctl status strongswan