Overview

This page will show you how to setup the Cyberhive Gatekeeper solution on your Linux device. Supported operating systems:

  • Ubuntu 20
  • Ubuntu 18

Requirements

To complete this guide you will need the following:

Gatekeeper Installation

  • Provisioning URL, E.g.: provisionX.example.com
  • Provisioning Username
  • Provisioning Password
  • Certificate Password
  • Endpoint Address

If you don't have these details to hand, get in touch!

Device

  • The ability to access the device as an administrator

Getting Started

Certificate Installation

Start by accessing your provisioning URL; you will be prompted for a username and password. Use the provisioning username and password supplied. This will take you through to a certificate selection screen:

Index of /

Name                                        Last modified       Size    Description
mySerialNumber.zip                          2020-06-09 12:16    1.7K         

Apache/2.4.29 (Ubuntu) Server at provision1.example.com Port 443

In the case of Linux installations, all of the required files are packaged into a ZIP file with the serial number of your device. Download this file to your local disk and extract the contents to a place of your choosing.

Then, navigate into the directory that contains the files:

myUser@myUser-laptop:/tmp/vpn_files$ ls -lrt
total 24
-rw-r--r-- 1 myUser myUser 1777 Sep 25  2020 EXAMPLE_Certificate_Authority_Certificate.pem
-rw-r--r-- 1 myUser myUser  288 May 23 09:05 123ABC.key
-rw-r--r-- 1 myUser myUser 1338 May 23 09:05 123ABC.crt
-rw-r--r-- 1 myUser myUser  608 May 23 09:05 ipsec-123ABC.conf
-rw-r--r-- 1 myUser myUser   40 May 23 09:05 ipsec-123ABC.secrets
-rw-r--r-- 1 myUser myUser  502 May 23 09:05 install.sh

Run the installation script as administrator:

sudo ./install.sh

This script should:

  • Install the necessary strongswan packages
  • Install the VPN certificates and related certificate authority
  • Install the VPN profile

Start the VPN

Restart the strongswan application in order to bring up the VPN tunnel:

systemctl restart strongswan