From 7c087aeed94011a2b9e7ada8ff7d07030b0ded7e Mon Sep 17 00:00:00 2001 From: Anton T Johansson Date: Thu, 29 Mar 2018 23:33:18 +0200 Subject: [PATCH] Fixed path in Network Manager section (#860) "configs" directory missing in paths. --- docs/client-linux.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/client-linux.md b/docs/client-linux.md index a515550..954839c 100644 --- a/docs/client-linux.md +++ b/docs/client-linux.md @@ -61,11 +61,11 @@ In this example we'll assume the IP of our Algo VPN server is `1.2.3.4` and the * Name: your choice, e.g.: *ikev2-1.2.3.4* * Gateway: * Address: IP of the Algo VPN server, e.g: `1.2.3.4` - * Certificate: `cacert.pem` found at `/path/to/algo/1.2.3.4/cacert.pem` + * Certificate: `cacert.pem` found at `/path/to/algo/configs/1.2.3.4/cacert.pem` * Client: * Authentication: *Certificate/Private key* - * Certificate: `user-name.crt` found at `/path/to/algo/1.2.3.4/pki/certs/user-name.crt` - * Private key: `user-name.key` found at `/path/to/algo/1.2.3.4/pki/private/user-name.key` + * Certificate: `user-name.crt` found at `/path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt` + * Private key: `user-name.key` found at `/path/to/algo/configs/1.2.3.4/pki/private/user-name.key` * Options: * Check *Request an inner IP address*, connection will fail without this option * Optionally check *Enforce UDP encapsulation* @@ -75,4 +75,4 @@ In this example we'll assume the IP of our Algo VPN server is `1.2.3.4` and the * Check *Enable custom proposals* * IKE: `aes128gcm16-prfsha512-ecp256,aes128-sha2_512-prfsha512-ecp256,aes128-sha2_384-prfsha384-ecp256` * ESP: `aes128gcm16-ecp256,aes128-sha2_512-prfsha512-ecp256` -* Apply and turn the connection on, you should now be connected \ No newline at end of file +* Apply and turn the connection on, you should now be connected