You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-20
Original file line number
Diff line number
Diff line change
@@ -102,31 +102,16 @@ No version of Android supports IKEv2. Install the [strongSwan VPN Client for And
102
102
103
103
### Windows
104
104
105
-
Windows clients have a more complicated setup than most others. Follow the steps below to set one up:
105
+
#### Scripted installation
106
106
107
-
1. Copy the CA certificate (`cacert.pem`), user certificate (`$user.p12`), and the user PowerShell script (`windows_$user.ps1`) to the client computer.
108
-
2. Import the CA certificate to the local machine Trusted Root certificate store.
109
-
3. Open PowerShell as Administrator. Navigate to your copied files.
110
-
4. If you haven't already, you will need to change the Execution Policy to allow unsigned scripts to run.
Copy your powershell script `windows_{username}.ps1` and p12 certificate `{username}.p12` to the Windows machine and run the following command as Administrator to configure the VPN connection.
114
108
```
115
-
116
-
5. In the same PowerShell window, run the included PowerShell script to import the user certificate, set up a VPN connection, and activate stronger ciphers on it.
117
-
6. After you execute the user script, set the Execution Policy back before you close the PowerShell window.
If you want to perform these steps by hand, you will need to import the user certificate to the Personal certificate store, add an IKEv2 connection in the network settings, then activate stronger ciphers on it via the following PowerShell script:
Windows clients have a more complicated setup than most others. Follow the steps below to set one up:
4
+
5
+
1. Copy the CA certificate (`cacert.pem`), user certificate (`$user.p12`), and the user PowerShell script (`windows_$user.ps1`) to the client computer.
6
+
2. Import the CA certificate to the local machine Trusted Root certificate store.
7
+
3. Open PowerShell as Administrator. Navigate to your copied files.
8
+
4. If you haven't already, you will need to change the Execution Policy to allow unsigned scripts to run.
5. In the same PowerShell window, run the included PowerShell script to import the user certificate, set up a VPN connection, and activate stronger ciphers on it.
15
+
6. After you execute the user script, set the Execution Policy back before you close the PowerShell window.
16
+
17
+
```powershell
18
+
Set-ExecutionPolicy Restricted -Scope CurrentUser
19
+
```
20
+
21
+
Your VPN is now installed and ready to use.
22
+
23
+
If you want to perform these steps by hand, you will need to import the user certificate to the Personal certificate store, add an IKEv2 connection in the network settings, then activate stronger ciphers on it via the following PowerShell script:
0 commit comments