Skip to content

Commit dad2e04

Browse files
Merge pull request #251390 from esvmicrosoft/vpndocs
Updated CLI steps to establish VPN for Linux Client
2 parents 8cabc93 + 6a09a88 commit dad2e04

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/vpn-gateway/point-to-site-vpn-client-cert-linux.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,8 @@ This section walks you through the configuration using the strongSwan CLI.
116116
1. Copy or move the p12 file you generated to **/etc/ipsec.d/private/**. This file is the client certificate for the VPN gateway. Use the following command:
117117

118118
```
119-
sudo cp "${USERNAME}.p12" /etc/ipsec.d/private/
119+
cat ${USERNAME}Cert.pem ${USERNAME}Key.pem | sudo tee /etc/ipsec.d/private/myclientcert.pem
120+
sudo chmod go-rwx /etc/ipsec.d/private/myclientcert.pem
120121
```
121122

122123
1. Run the following command to take note of your hostname. You’ll use this value in the next step.
@@ -135,13 +136,15 @@ This section walks you through the configuration using the strongSwan CLI.
135136
type=tunnel
136137
leftfirewall=yes
137138
left=%any
138-
leftauth=eap-tls
139+
leftcert=myclientcert.pem
140+
leftauth=pubkey
139141
leftid=%client # use the hostname of your machine with % character prepended. Example: %client
140142
right= #Azure VPN gateway address. Example: azuregateway-xxx-xxx.vpn.azure.com
141143
rightid=% #Azure VPN gateway FQDN with % character prepended. Example: %azuregateway-xxx-xxx.vpn.azure.com
142144
rightsubnet=0.0.0.0/0
143145
leftsourceip=%config
144146
auto=add
147+
esp=aes256gcm16
145148
```
146149

147150

0 commit comments

Comments
 (0)