Generating RSA keypair, this will take a while...
Install OpenVPN plugin for NetworkManager by executing following two command in the terminal:
sudo apt install -y network-manager-openvpn-gnome
sudo systemctl restart network-manager
Open up network connections:
Hit Add button:
Select Import a saved VPN configuration...:
Select downloaded file:
Once profile is successfully imported following dialog appears:
By default all traffic is routed via VPN gateway, route only intranet subnets to the gateway select Routes... under IPv4 Settings:
Check Use this connection only for resources on its network:
To activate the connection select it under VPN Connections:
Copy-paste follownig to terminal as root user:
{% include "snippets/request-client.sh" %}
cat << EOF > '/etc/NetworkManager/system-connections/OpenVPN to {{ authority.namespace }}'
{% include "snippets/networkmanager-openvpn.conf" %}EOF
nmcli con reload
Copy-paste follownig to terminal as root user:
{% include "snippets/request-client.sh" %}
cat << EOF > '/etc/NetworkManager/system-connections/IPSec to {{ authority.namespace }}'
{% include "snippets/networkmanager-strongswan.conf" %}EOF
nmcli con reload
Install OpenVPN plugin for NetworkManager by running following two commands:
dnf install NetworkManager-openvpn-gnome
systemctl restart NetworkManager
Right click in the NetworkManager icon, select network settings. Hit the + button and select Import from file..., select the downloaded .ovpn file.
Remove the .ovpn file from the Downloads folder.
Fetch OpenVPN profile
To configure IPSec IKEv2 tunnel on Windows, open PowerShell as administrator and copy-paste following:
{% include "snippets/windows.ps1" %}
Install OpenVPN community edition client. Move the downloaded .ovpn file to C:\Program Files\OpenVPN\config and right click in the system tray on OpenVPN icon and select Connect from the menu. For finishing touch adjust the file permissions so only local administrator can read that file, remove regular user access to the file.
Get OpenVPN community edition Fetch OpenVPN profileDownload OpenVPN from the link supplied above:
Install OpenVPN:
Move the configuraiton file downloaded from the second button above:
Connect from system tray:
Connection is successfully configured:
Download Tunnelblick. Tap on the button above and import the profile.
Get Tunnelblick Fetch OpenVPN profileInstall OpenVPN Connect app, tap on the button below.
Get OpenVPN Connect app Fetch OpenVPN profileTap the button below, you'll be prompted about configuration profile, tap Allow. Hit Install in the top-right corner. Enter your passcode to unlock trust store. Tap Install and confirm by hitting Install. Where password for the certificate is prompted, enter 1234. Hit Done. Go to Settings, open VPN submenu and tap on the VPN profile to connect.
Fetch IPSec IKEv2 VPN profileClick on the button below, you'll be prompted about configuration profile, tap Allow. Hit Install in the top-right corner. Enter your passcode to unlock trust store. Tap Install and confirm by hitting Install. Where password for the certificate is prompted, enter 1234. Hit Done. Go to Settings, open VPN submenu and tap on the VPN profile to connect.
Fetch VPN profileIntall OpenVPN Connect app on your device. Tap on the downloaded .ovpn file, OpenVPN Connect should prompt for import. Hit Accept and then Connect. Remember to delete any remaining .ovpn files under the Downloads.
Get OpenVPN Connect app Fetch OpenVPN profileInstall strongSwan Client app on your device. Tap on the downloaded .sswan file, StrongSwan Client should prompt for import. Hit Import certificate from VPN profile and then Import in the top-right corner. Remember to delete any remaining .sswan files under the Downloads.
Get strongSwan VPN Client app Fetch StrongSwan profile