If you configure this section, then you don't need to go to the Client section.
The first entry HAS TO BE the local Linux station.
If your CA is on the same computer, make sure that you have created the CA certificates first. Otherwise, make sure you have copied the following files:
You only need the p12 format if your station is a windows one. For more details on how to export your key in pkcs12 format, see below.
Windows: If you want to export the certificate in pkcs12 format, simply run the /usr/share/naat/scripts/gentestcrtwindows script. Example: /usr/share/naat/scripts/gentestcrtwindows localVPNstation.yourdomain.org This will create the /etc/freeswan/ipsec.d/private/localVPNstation.yourdomain.org.p12 key for windows.
Note: A password will be required, that is the reason why this operation is not done through the web interface. This password will be required while importing the certificate in Windows.
If your server and your CA are different, you might need to copy also /etc/freeswan/ipsec.d/cacerts/ca.crt and /etc/freeswan/ipsec.d/crls/crl.crt
So, on each VPN Linux box, you need at least four files, maybe six. See above.
Click on to add a new VPN
server entry. Once you finished adding your VPN servers, click on
the Apply button and then on
to restart the IPSec
service.
Click on the icon to edit the corresponding
VPN server.
Click on the icon to delete the corresponding
VPN server.