You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vpn-gateway/point-to-site-vpn-client-cert-linux.md
+24-8Lines changed: 24 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,17 @@ This section walks you through the configuration using the strongSwan CLI.
113
113
114
114
1. From the VPN client profile configuration files **Generic** folder, copy or move the **VpnServerRoot.cer** to **/etc/ipsec.d/cacerts**.
115
115
116
-
1. Copy or move **cp client.p12** to **/etc/ipsec.d/private/**. This file is the client certificate for the VPN gateway.
116
+
1. Copy or move the p12 file you generated to **/etc/ipsec.d/private/**. This file is the client certificate for the VPN gateway. Use the following command:
117
+
118
+
```
119
+
sudo cp "${USERNAME}.p12" /etc/ipsec.d/private/
120
+
```
121
+
122
+
1. Run the following command to take note of your hostname. You’ll use this value in the next step.
123
+
124
+
```
125
+
hostnamectl --static
126
+
```
117
127
118
128
1. Open the **VpnSettings.xml** file and copy the `<VpnServer>` value. You’ll use this value in the next step.
119
129
@@ -126,25 +136,31 @@ This section walks you through the configuration using the strongSwan CLI.
126
136
leftfirewall=yes
127
137
left=%any
128
138
leftauth=eap-tls
129
-
leftid=%client # use the DNS alternative name prefixed with the %
130
-
right= Enter the VPN Server value here# Azure VPN gateway address
131
-
rightid=% # Enter the VPN Server value here# Azure VPN gateway FQDN with %
139
+
leftid=%client # use the hostname of your machine with % character prepended. Example: %client
0 commit comments