mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
fix build warnings and errors
This commit is contained in:
parent
704901aef5
commit
ee91e1d5c1
@ -18,6 +18,7 @@ This chapter contains various configuration examples:
|
|||||||
pppoe-ipv6-basic
|
pppoe-ipv6-basic
|
||||||
l3vpn-hub-and-spoke
|
l3vpn-hub-and-spoke
|
||||||
inter-vrf-routing-vrf-lite
|
inter-vrf-routing-vrf-lite
|
||||||
|
openvpn-ldap
|
||||||
|
|
||||||
|
|
||||||
Configuration Blueprints (autotest)
|
Configuration Blueprints (autotest)
|
||||||
|
|||||||
@ -2,11 +2,13 @@
|
|||||||
|
|
||||||
.. _examples-openvvpn-ldap:
|
.. _examples-openvvpn-ldap:
|
||||||
|
|
||||||
|
#########################
|
||||||
OpenVPN with LDAP example
|
OpenVPN with LDAP example
|
||||||
-------------------
|
#########################
|
||||||
|
|
||||||
Configuration AD and a windows server
|
Configuration AD and a windows server
|
||||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
=====================================
|
||||||
|
|
||||||
We aim to configure LDAP authentication between the VYOS router and Windows Server 2019 (role: Active Directory) when our customers connect to our privet network using the OpenVPN client.
|
We aim to configure LDAP authentication between the VYOS router and Windows Server 2019 (role: Active Directory) when our customers connect to our privet network using the OpenVPN client.
|
||||||
Using the general schema for example:
|
Using the general schema for example:
|
||||||
|
|
||||||
@ -38,7 +40,7 @@ Picture 1 - Adding the AD role
|
|||||||
Picture 2 - Adding the AD role
|
Picture 2 - Adding the AD role
|
||||||
|
|
||||||
Configuration VyOS router
|
Configuration VyOS router
|
||||||
^^^^^^^^^^^^^^^^^^^^^^^^^
|
=========================
|
||||||
|
|
||||||
Make the configuration file for the LDAP plugin.
|
Make the configuration file for the LDAP plugin.
|
||||||
|
|
||||||
|
|||||||
@ -56,7 +56,7 @@ Server Configuration
|
|||||||
set vpn openconnect ssl passphrase <pki-password>
|
set vpn openconnect ssl passphrase <pki-password>
|
||||||
|
|
||||||
2FA OTP support
|
2FA OTP support
|
||||||
====================
|
===============
|
||||||
|
|
||||||
Instead of password only authentication, 2FA password
|
Instead of password only authentication, 2FA password
|
||||||
authentication + OTP key can be used. Alternatively, OTP authentication only,
|
authentication + OTP key can be used. Alternatively, OTP authentication only,
|
||||||
@ -223,7 +223,7 @@ To display the configured OTP user settings, use the command:
|
|||||||
show openconnect-server user <username> otp <full|key-b32|key-hex|qrcode|uri>
|
show openconnect-server user <username> otp <full|key-b32|key-hex|qrcode|uri>
|
||||||
|
|
||||||
Configuring RADIUS accounting
|
Configuring RADIUS accounting
|
||||||
===========================
|
=============================
|
||||||
|
|
||||||
OpenConnect can be configured to send accounting information to a
|
OpenConnect can be configured to send accounting information to a
|
||||||
RADIUS server to capture user session data such as time of
|
RADIUS server to capture user session data such as time of
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user