<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/data/templates/ipsec/charon, branch c-po-patch-1</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=c-po-patch-1</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=c-po-patch-1'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2022-10-31T14:10:39+00:00</updated>
<entry>
<title>ipsec: T4787: add support for road-warrior/remote-access RADIUS timeout</title>
<updated>2022-10-31T14:10:39+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-10-31T14:09:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=22c3dcbb01d731f0dab0ffefa2e5a0be7009baf1'/>
<id>urn:sha1:22c3dcbb01d731f0dab0ffefa2e5a0be7009baf1</id>
<content type='text'>
This enabled users to also use 2FA/MFA authentication with a radius backend as
there is enough time to enter the second factor.
</content>
</entry>
<entry>
<title>ipsec: T4353: fix Jinja2 linting errors</title>
<updated>2022-05-01T17:44:52+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-05-01T17:44:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=49b1afc25b73d9c5daae1c76edb88aab42afa83e'/>
<id>urn:sha1:49b1afc25b73d9c5daae1c76edb88aab42afa83e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ipsec: T4333: migrate to new vyos_defined Jinja2 test</title>
<updated>2022-04-13T20:51:42+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-04-13T20:51:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e8a637eec0cc398f78a877ece6b9c7cdca418970'/>
<id>urn:sha1:e8a637eec0cc398f78a877ece6b9c7cdca418970</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ipsec: T1210: add RADIUS authentication for remote-access IKEv2 VPN</title>
<updated>2021-07-24T22:15:08+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2021-07-24T22:13:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=794fa2206659457ba45c6f476ba8b162460cdaad'/>
<id>urn:sha1:794fa2206659457ba45c6f476ba8b162460cdaad</id>
<content type='text'>
set vpn ipsec remote-access connection rw authentication client-mode 'eap-radius'
set vpn ipsec remote-access connection rw authentication id '192.0.2.1'
set vpn ipsec remote-access connection rw authentication server-mode 'x509'
set vpn ipsec remote-access connection rw authentication x509 ca-certificate 'CAcert_Class_3_Root'
set vpn ipsec remote-access connection rw authentication x509 certificate 'vyos'
set vpn ipsec remote-access connection rw esp-group 'ESP-RW'
set vpn ipsec remote-access connection rw ike-group 'IKE-RW'
set vpn ipsec remote-access connection rw local-address '192.0.2.1'
set vpn ipsec remote-access connection rw pool 'ra-rw-ipv4'
set vpn ipsec remote-access connection rw unique 'never'

set vpn ipsec remote-access pool ra-rw-ipv4 name-server '192.0.2.2'
set vpn ipsec remote-access pool ra-rw-ipv4 prefix '192.168.22.0/24'

set vpn ipsec remote-access radius nas-identifier 'fooo'
set vpn ipsec remote-access radius server 172.16.100.10 key 'secret'
</content>
</entry>
<entry>
<title>ipsec: T1210: move DHCP server configuration unter remote-access node</title>
<updated>2021-07-24T22:15:08+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2021-07-24T21:04:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=861945045ca04b21e27ad31513b2ff929349ee2e'/>
<id>urn:sha1:861945045ca04b21e27ad31513b2ff929349ee2e</id>
<content type='text'>
As this is only related to remote-access, keeping it under "options" simply
feels wrong.
</content>
</entry>
<entry>
<title>ipsec: T1210: split out pool from remote-access configuration</title>
<updated>2021-07-19T17:01:43+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2021-07-19T17:01:43+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=9556d78b1d54c7320a0154990c61d23c6197c38f'/>
<id>urn:sha1:9556d78b1d54c7320a0154990c61d23c6197c38f</id>
<content type='text'>
Remote access IP pools can now be defined at a global level and referenced
in IPSec remote-access connections. To defined a pool use:

set vpn ipsec remote-access pool global-ipv4 name-server '172.16.1.1'
set vpn ipsec remote-access pool global-ipv4 prefix '192.168.0.0/24'
set vpn ipsec remote-access pool global-ipv6 name-server '2001:db8::1'
set vpn ipsec remote-access pool global-ipv6 prefix '2001:db8:1000::/64'

A connection can then reference the pool:

set vpn ipsec remote-access connection foo pool 'global-ipv4'
set vpn ipsec remote-access connection foo pool 'global-ipv6'
</content>
</entry>
<entry>
<title>ipsec: T1210: T1251: Add more features to remote-access connections</title>
<updated>2021-07-05T20:01:10+00:00</updated>
<author>
<name>sarthurdev</name>
<email>965089+sarthurdev@users.noreply.github.com</email>
</author>
<published>2021-07-05T14:22:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=0b93fce06526a2826c19adcbb25874e51cccf68e'/>
<id>urn:sha1:0b93fce06526a2826c19adcbb25874e51cccf68e</id>
<content type='text'>
- Adds client/server authentication methods.
- Adds basic verification to remote-access.
- Adds DHCP pool and options to remote-access.
- Cleanup unused PKI files.
</content>
</entry>
</feed>
