全文検索:
- 03 Strongswan IKEv2 with PSK
- tokyo) ===== <code|ipsec.conf> conn %default type=tunnel authby=psk keyingtries=3 keyex... osaka) ===== <code|ipsec.conf> conn %default type=tunnel authby=psk keyingtries=3 keyex
- 05 KVM Multi-Queue
- t' queues='N'/></color> この部分追加 <code> <interface type='network'> <source network='default'/> <model type='virtio'/> <driver name='vhost' queues='N'/
- 02 Linux IPsec Client
- ekey=yes ikelifetime=8h keylife=1h type=transport left=%any leftprotoport=17/17
- 04 Strongswan IKEv2 EAP
- c.conf ==== <code|ipsec.conf> conn %default type=tunnel authby=psk keyingtries=3 keyex