Closed evilsi closed 1 year ago
@evilsi Thanks for the feedback! I have assigned the issue to the content author to evaluate and update as appropriate.
@anzaman
Those guides really need an update. I've spent two evenings now trying to setup up an azure vpn using either OpenVPN or Strongswan and connect to it using any guides I have come across, and I have yet to successfully authenticate even once.
I am in the same situation. @TethysSvensson did you find a method that worked?
No. We gave up and my friend had to switch to windows.
Unfortunately, we have been unable to review this issue in a timely manner. We sincerely apologize for the delayed response. We are closing this issue. If you feel that the problem persists, please respond to this issue with additional information.
Please continue to provide feedback about the documentation. We appreciate your contributions to our community.
There are changes to Strongswan which means this configuration no longer works. install these only: apt install strongswan strongswan-pki libstrongswan-extra-plugins
Generate the client certificate but specify --size 4096
ipsec pki --gen --size 4096 --outform pem > "${USERNAME}Key.pem"
copy the certificates in to the folders like this: (variations breaks the authentication)
/etc/ipsec.d/certs - clientCert.pem
/etc/ipsec.d/private - clientKey.pem & client.p12
/etc/ipsec.d/cacerts - VpnServerRoot.cer
remove 'leftauth=eap-tls' from /etc/ipsec.conf
Document Details
⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.