diff options
Diffstat (limited to 'docs')
-rw-r--r-- | docs/vpn/anyconnect.rst | 51 | ||||
-rw-r--r-- | docs/vpn/index.rst | 2 | ||||
-rw-r--r-- | docs/vpn/openconnect.rst | 80 |
3 files changed, 109 insertions, 24 deletions
diff --git a/docs/vpn/anyconnect.rst b/docs/vpn/anyconnect.rst index 0016cf46..e8945fbb 100644 --- a/docs/vpn/anyconnect.rst +++ b/docs/vpn/anyconnect.rst @@ -1,11 +1,12 @@ -.. _vpn-anyconnect: +.. _vpn-openconnect: -AnyConnect +OpenConnect ----- -Cisco AnyConnect-compatible server(based on great OpenConnect software) feature is available from this release. -Anyconnect VPN supports SSL connection and offers full network access. SSL VPN network extension connects the end-user system to the corporate network with access controls based only on network layer information, such as destination IP address and port number. So, it provides safe communication for all types of device traffic across public networks and private networks, also encrypts the traffic with SSL protocol. -The remote user will use the anyconnect client to connect to the router and will receive an IP address from a VPN pool, allowing full access to the network. +OpenConnect-compatible server feature is available from this release. +Openconnect VPN supports SSL connection and offers full network access. SSL VPN network extension connects the end-user system to the corporate network with access controls based only on network layer information, such as destination IP address and port number. So, it provides safe communication for all types of device traffic across public networks and private networks, also encrypts the traffic with SSL protocol. +The remote user will use the openconnect client to connect to the router and will receive an IP address from a VPN pool, allowing full access to the network. + .. note:: All certificates should be stored on VyOS under /config/auth. If certificates are not stored in the /config directory they will not be migrated during a software update. @@ -24,7 +25,7 @@ The following command will create a self signed certificates and will be stored openssl req -newkey rsa:4096 -new -nodes -x509 -days 3650 -keyout /config/auth/server.key -out /config/auth/server.crt openssl req -new -x509 -key /config/auth/server.key -out /config/auth/ca.crt -We can also create the certificates using Cerbort which is an easy-to-use client that fetches a certificate from Let’s Encrypt—an open certificate authority launched by the EFF, Mozilla, and others—and deploys it to a web server. +We can also create the certificates using Cerbort which is an easy-to-use client that fetches a certificate from Let’s Encrypt — an open certificate authority launched by the EFF, Mozilla, and others—and deploys it to a web server. .. code-block:: none @@ -35,14 +36,15 @@ Server Configuration .. code-block:: none - set vpn anyconnect authentication local-users username <user> password <pass> - set vpn anyconnect authentication mode <local|radius> - set vpn anyconnect network-settings client-ip-settings subnet <subnet> - set vpn anyconnect network-settings name-server <address> - set vpn anyconnect network-settings name-server <address> - set vpn anyconnect ssl ca-cert-file <file> - set vpn anyconnect ssl cert-file <file> - set vpn anyconnect ssl key-file <file> + set vpn openconnect authentication local-users username <user> password <pass> + set vpn openconnect authentication mode <local|radius> + set vpn opneconnect network-settings client-ip-settings subnet <subnet> + set vpn openconnect network-settings name-server <address> + set vpn openconnect network-settings name-server <address> + set vpn openconnect ssl ca-cert-file <file> + set vpn openconnect ssl cert-file <file> + set vpn openconnect ssl key-file <file> + Example ---- @@ -53,21 +55,24 @@ The Gateway IP Address must be in one of the router´s interfaces. .. code-block:: none - set vpn anyconnect authentication local-users username user4 password 'SecretPassword' - set vpn anyconnect authentication mode 'local' - set vpn anyconnect network-settings client-ip-settings subnet '100.64.0.0/24' - set vpn anyconnect network-settings name-server '1.1.1.1' - set vpn anyconnect network-settings name-server '8.8.8.8' - set vpn anyconnect ssl ca-cert-file '/config/auth/fullchain.pem' - set vpn anyconnect ssl cert-file '/config/auth/cert.pem' - set vpn anyconnect ssl key-file '/config/auth/privkey.pem' + set vpn openconnect authentication local-users username user4 password 'SecretPassword' + set vpn openconnect authentication mode 'local' + set vpn openconnect network-settings client-ip-settings subnet '100.64.0.0/24' + set vpn openconnect network-settings name-server '1.1.1.1' + set vpn openconnect network-settings name-server '8.8.8.8' + set vpn openconnect ssl ca-cert-file '/config/auth/fullchain.pem' + set vpn openconnect ssl cert-file '/config/auth/cert.pem' + set vpn openconnect ssl key-file '/config/auth/privkey.pem' + Verification ---- .. code-block:: none - vyos@RTR1:~$ show anyconnect-server sessions + + vyos@RTR1:~$ show openconnect-server sessions + interface username ip remote IP RX TX state uptime ----------- ---------- ------------ ------------- -------- -------- --------- -------- sslvpn0 user4 100.64.0.105 xx.xxx.49.253 127.3 KB 160.0 KB connected 12m:28s diff --git a/docs/vpn/index.rst b/docs/vpn/index.rst index aea1ada2..4441c003 100644 --- a/docs/vpn/index.rst +++ b/docs/vpn/index.rst @@ -15,4 +15,4 @@ VPN site2site_ipsec sstp wireguard - anyconnect + OpenConnect diff --git a/docs/vpn/openconnect.rst b/docs/vpn/openconnect.rst new file mode 100644 index 00000000..9d6dd6da --- /dev/null +++ b/docs/vpn/openconnect.rst @@ -0,0 +1,80 @@ +.. _vpn-openconnect: + +OpenConnect +----- + +OpenConnect-compatible server feature is available from this release. +Openconnect VPN supports SSL connection and offers full network access. SSL VPN network extension connects the end-user system to the corporate network with access controls based only on network layer information, such as destination IP address and port number. So, it provides safe communication for all types of device traffic across public networks and private networks, also encrypts the traffic with SSL protocol. +The remote user will use the openconnect client to connect to the router and will receive an IP address from a VPN pool, allowing full access to the network. + + +.. note:: All certificates should be stored on VyOS under /config/auth. If certificates are not stored in the /config directory they will not be migrated during a software update. + + +Configuration +^^^^^^^^^^ + +SSL Certificates +---- + +We need to generate the certificate which authenticates users who attempt to access the network resource through the SSL VPN tunnels. +The following command will create a self signed certificates and will be stored in the file path /config/auth + +.. code-block:: none + + openssl req -newkey rsa:4096 -new -nodes -x509 -days 3650 -keyout /config/auth/server.key -out /config/auth/server.crt + openssl req -new -x509 -key /config/auth/server.key -out /config/auth/ca.crt + +We can also create the certificates using Cerbort which is an easy-to-use client that fetches a certificate from Let’s Encrypt — an open certificate authority launched by the EFF, Mozilla, and others—and deploys it to a web server. + +.. code-block:: none + + sudo certbot certonly --standalone --preferred-challenges http -d <domain name> + +Server Configuration +------------------------- + +.. code-block:: none + + set vpn openconnect authentication local-users username <user> password <pass> + set vpn openconnect authentication mode <local|radius> + set vpn opneconnect network-settings client-ip-settings subnet <subnet> + set vpn openconnect network-settings name-server <address> + set vpn openconnect network-settings name-server <address> + set vpn openconnect ssl ca-cert-file <file> + set vpn openconnect ssl cert-file <file> + set vpn openconnect ssl key-file <file> + + +Example +---- + +Use local user name "user4" with password "SecretPassword" +Client IP addresses will be provided from pool 100.64.0.0/24 +The Gateway IP Address must be in one of the router´s interfaces. + +.. code-block:: none + + set vpn openconnect authentication local-users username user4 password 'SecretPassword' + set vpn openconnect authentication mode 'local' + set vpn openconnect network-settings client-ip-settings subnet '100.64.0.0/24' + set vpn openconnect network-settings name-server '1.1.1.1' + set vpn openconnect network-settings name-server '8.8.8.8' + set vpn openconnect ssl ca-cert-file '/config/auth/fullchain.pem' + set vpn openconnect ssl cert-file '/config/auth/cert.pem' + set vpn openconnect ssl key-file '/config/auth/privkey.pem' + + +Verification +---- + +.. code-block:: none + + + vyos@RTR1:~$ show openconnect-server sessions + + interface username ip remote IP RX TX state uptime + ----------- ---------- ------------ ------------- -------- -------- --------- -------- + sslvpn0 user4 100.64.0.105 xx.xxx.49.253 127.3 KB 160.0 KB connected 12m:28s + +.. note:: It is compatible with Cisco (R) AnyConnect (R) clients. |