Update docs

This commit is contained in:
hwdsl2 2020-08-27 01:16:34 -05:00
parent 89a7008a6c
commit 220954470d

View File

@ -11,7 +11,7 @@ This template will create a fully-working IPsec VPN server on Amazon Elastic Com
> **Note:** Before using the Debian images on EC2, you need to first subscribe at the AWS Marketplace: [Debian 10](https://aws.amazon.com/marketplace/pp/B0859NK4HC), [Debian 9](https://aws.amazon.com/marketplace/pp/B073HW9SP3).
- Your VPN username
- Your VPN password
- Your IPsec PSK (pre-shared key)
- Your VPN IPsec PSK (pre-shared key)
> **Note:** When choosing your VPN username, password and PSK, DO NOT use these special characters: `\ " '`.
@ -27,9 +27,9 @@ At step 4, make sure to confirm that this template may create IAM resources.
Click the icon below to start:
<a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new" target="_blank"><img src="cloudformation-launch-stack-button.png" alt="Deploy using CloudFormation" height="34px"></a>
<a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new" target="_blank"><img src="cloudformation-launch-stack-button.png" alt="Launch stack" height="34px"></a>
Make sure the deployment is successful before continuing to [Next steps: Configure VPN Clients](../README.md#next-steps).
You may choose an AWS region using the selector to the right of your account information on the navigation bar. After the stack is successfully created, click the **Outputs** tab to view your VPN login details. Then continue to [Next steps: Configure VPN Clients](../README.md#next-steps).
> **Note:** You will need to wait at least 5 minutes after the stack shows **CREATE_COMPLETE**, before you can connect to the server with a VPN client. This is to allow time for the VPN setup to complete.
@ -42,9 +42,9 @@ How to connect to the server via SSH after deployment?
Amazon EC2 does not allow users to access the instances with an SSH password. Instead, users are instructed to create "key pairs", which are used as credentials to access the instances via SSH.
This template generates a key pair for you during deployment, which will be available as text in the **Outputs** section after the stack is successfully created.
This template generates a key pair for you during deployment, and the private key will be available as text under the **Outputs** tab after the stack is successfully created.
You will need to save the private key from the **Outputs** section to a file on your computer, if you want to later access the VPN server via SSH.
You will need to save the private key from the **Outputs** tab to a file on your computer, if you want to access the VPN server via SSH.
![Show key](show-key.png)