diff options
-rw-r--r-- | docs/services/index.rst | 1 | ||||
-rw-r--r-- | docs/vpn/index.rst | 9 | ||||
-rw-r--r-- | docs/vpn/sstp.rst (renamed from docs/services/sstp-server.rst) | 120 |
3 files changed, 67 insertions, 63 deletions
diff --git a/docs/services/index.rst b/docs/services/index.rst index e0773090..ed00a29b 100644 --- a/docs/services/index.rst +++ b/docs/services/index.rst @@ -17,7 +17,6 @@ This chapter describes the available system/network services provided by VyOS. mdns-repeater ipoe-server pppoe-server - sstp-server udp-broadcast-relay snmp ssh diff --git a/docs/vpn/index.rst b/docs/vpn/index.rst index d0e440b0..42a90a3f 100644 --- a/docs/vpn/index.rst +++ b/docs/vpn/index.rst @@ -7,10 +7,11 @@ VPN .. toctree:: :maxdepth: 2 - openvpn - l2tp - site2site_ipsec - gre-ipsec dmvpn + gre-ipsec + l2tp + openvpn pptp + site2site_ipsec + sstp wireguard diff --git a/docs/services/sstp-server.rst b/docs/vpn/sstp.rst index 6e311e19..c5eb5dbf 100644 --- a/docs/services/sstp-server.rst +++ b/docs/vpn/sstp.rst @@ -62,17 +62,33 @@ commands can be used. Configuration ============= -.. cfgcmd:: set service sstp-server authentication local-users username <user> password <pass> +.. cfgcmd:: set vpn sstp authentication local-users username <user> password <pass> Create `<user>` for local authentication on this system. The users password will be set to `<pass>`. -.. cfgcmd:: set service sstp-server authentication protocols <pap | chap | mschap | mschap-v2> +.. cfgcmd:: set vpn sstp authentication local-users username <user> disable + + Disable `<user>` account. + +.. cfgcmd:: set vpn sstp authentication local-users username <user> static-ip <address> + + Assign static IP address to `<user>` account. + +.. cfgcmd:: set vpn sstp authentication local-users username <user> rate-limit download <bandwidth> + + Download bandwidth limit in kbit/s for `<user>`. + +.. cfgcmd:: set vpn sstp authentication local-users username <user> rate-limit upload <bandwidth> + + Upload bandwidth limit in kbit/s for `<user>`. + +.. cfgcmd:: set vpn sstp authentication protocols <pap | chap | mschap | mschap-v2> Require the peer to authenticate itself using one of the following protocols: pap, chap, mschap, mschap-v2. -.. cfgcmd:: set service sstp-server authentication mode <local | radius> +.. cfgcmd:: set vpn sstp authentication mode <local | radius> Set authentication backend. The configured authentication backend is used for all queries. @@ -82,61 +98,58 @@ Configuration * **local**: All authentication queries are handled locally. -.. cfgcmd:: set service sstp-server network-settings client-ip-settings gateway-address <gateway> +.. cfgcmd:: set vpn sstp network-settings client-ip-settings gateway-address <gateway> Specifies single `<gateway>` IP address to be used as local address of PPP interfaces. -.. cfgcmd:: set service sstp-server network-settings client-ip-settings subnet <subnet> +.. cfgcmd:: set vpn sstp network-settings client-ip-settings subnet <subnet> Use `<subnet>` as the IP pool for all connecting clients. -.. cfgcmd:: set service sstp-server network-settings dns-server primary-dns <address> - - Connected client should use `<address>` as their primary DNS server. +.. cfgcmd:: set vpn sstp network-settings name-server <address> + Connected client should use `<address>` as their DNS server. Up to two IPv4 + nameservers can be configured. -.. cfgcmd:: set service sstp-server network-settings dns-server secondary-dns <address> - - Connected client should use `<address>` as their secondary DNS server. SSL Certificates ---------------- -.. cfgcmd:: set service sstp-server sstp-settings ssl-certs ca <file> +.. cfgcmd:: set vpn sstp ssl ca-cert-file <file> Path to `<file>` pointing to the certificate authority certificate. -.. cfgcmd:: set service sstp-server sstp-settings ssl-certs server-cert <file> +.. cfgcmd:: set vpn sstp ssl cert-file <file> Path to `<file>` pointing to the servers certificate (public portion). -.. cfgcmd:: set service sstp-server sstp-settings ssl-certs server-key <file> +.. cfgcmd:: set vpn sstp ssl key-file <file> Path to `<file>` pointing to the servers certificate (private portion). PPP Settings ------------ -.. cfgcmd:: set service sstp-server ppp-settings lcp-echo-failure <number> +.. cfgcmd:: set vpn sstp ppp-settings lcp-echo-failure <number> Defines the maximum `<number>` of unanswered echo requests. Upon reaching the value `<number>`, the session will be reset. -.. cfgcmd:: set service sstp-server ppp-settings lcp-echo-interval <interval> +.. cfgcmd:: set vpn sstp ppp-settings lcp-echo-interval <interval> If this option is specified and is greater than 0, then the PPP module will send LCP pings of the echo request every `<interval>` seconds. -.. cfgcmd:: set service sstp-server ppp-settings lcp-echo-timeout +.. cfgcmd:: set vpn sstp ppp-settings lcp-echo-timeout Specifies timeout in seconds to wait for any peer activity. If this option specified it turns on adaptive lcp echo functionality and "lcp-echo-failure" is not used. -.. cfgcmd:: set service sstp-server ppp-settings mppe <require | prefer | deny> +.. cfgcmd:: set vpn sstp ppp-settings mppe <require | prefer | deny> Specifies :abbr:`MPPE (Microsoft Point-to-Point Encryption)` negotioation preference. @@ -156,107 +169,98 @@ RADIUS Server ^^^^^^ -.. cfgcmd:: set service sstp-server authentication radius-server <server> secret <secret> +.. cfgcmd:: set vpn sstp authentication radius server <server> port <port> - Configure RADIUS `<server>` and its required shared `<secret>` for - communicating with the RADIUS server. + Configure RADIUS `<server>` and its required port for authentication requests. -.. cfgcmd:: set service sstp-server authentication radius-server <server> secret <secret> +.. cfgcmd:: set vpn sstp authentication radius server <server> key <secret> Configure RADIUS `<server>` and its required shared `<secret>` for communicating with the RADIUS server. -.. cfgcmd:: set service sstp-server authentication radius-server <server> fail-time <time> +.. cfgcmd:: set vpn sstp authentication radius server <server> fail-time <time> Mark RADIUS server as offline for this given `<time>` in seconds. -.. cfgcmd:: set service sstp-server authentication radius-server <server> req-limit <limit> +.. cfgcmd:: set vpn sstp authentication radius server <server> disable - Maximum number of simultaneous requests to RADIUS server, default is - unlimited. + Temporary disable this RADIUS server. Options ^^^^^^^ -.. cfgcmd:: set service sstp-server authentication radius-settings acct-timeout +.. cfgcmd:: set vpn sstp authentication radius acct-timeout <timeout> Timeout to wait reply for Interim-Update packets. (default 3 seconds) - -.. cfgcmd:: set service sstp-server authentication radius-settings dae-server ip-address <address> +.. cfgcmd:: set vpn sstp authentication radius dynamic-author server <address> Specifies IP address for Dynamic Authorization Extension server (DM/CoA) - -.. cfgcmd:: set service sstp-server authentication radius-settings dae-server port <port> +.. cfgcmd:: set vpn sstp authentication radius dynamic-author port <port> Port for Dynamic Authorization Extension server (DM/CoA) - -.. cfgcmd:: set service sstp-server authentication radius-settings dae-server secret <secret> +.. cfgcmd:: set vpn sstp authentication radius dynamic-author key <secret> Secret for Dynamic Authorization Extension server (DM/CoA) - -.. cfgcmd:: set service sstp-server authentication radius-settings max-try <number> +.. cfgcmd:: set vpn sstp authentication radius max-try <number> Maximum number of tries to send Access-Request/Accounting-Request queries - -.. cfgcmd:: set service sstp-server authentication radius-settings timeout <timeout> +.. cfgcmd:: set vpn sstp authentication radius timeout <timeout> Timeout to wait response from server (seconds) - -.. cfgcmd:: set service sstp-server authentication radius-settings nas-identifier <identifier> +.. cfgcmd:: set vpn sstp authentication radius nas-identifier <identifier> Value to send to RADIUS server in NAS-Identifier attribute and to be matched in DM/CoA requests. - -.. cfgcmd:: set service sstp-server authentication radius-settings nas-ip-address <address> +.. cfgcmd:: set vpn sstp authentication radius nas-ip-address <address> Value to send to RADIUS server in NAS-IP-Address attribute and to be matched in DM/CoA requests. Also DM/CoA server will bind to that address. +.. cfgcmd:: set vpn sstp authentication radius source-address <address> + + Source IPv4 address used in all RADIUS server queires. -.. cfgcmd:: set service sstp-server authentication radius-settings rate-limit attribute <attribute> +.. cfgcmd:: set vpn sstp authentication radius rate-limit attribute <attribute> Specifies which RADIUS server attribute contains the rate limit information. The default attribute is `Filter-Id`. - -.. cfgcmd:: set service sstp-server authentication radius-settings rate-limit enable +.. cfgcmd:: set vpn sstp authentication radius rate-limit enable Enables bandwidth shaping via RADIUS. - -.. cfgcmd:: set service sstp-server authentication radius-settings rate-limit vendor +.. cfgcmd:: set vpn sstp authentication radius rate-limit vendor Specifies the vendor dictionary, dictionary needs to be in /usr/share/accel-ppp/radius. - Example ======= * Use local user `foo` with password `bar` -* Client IP addresses will be provided from pool `192.0.2.0/24` +* Client IP addresses will be provided from pool `192.0.2.0/25` -Use <tab> to setup the ``set sstp-settings ssl-certs ...``, it automatically +Use <tab> to setup the ``set ssl...``, it automatically looks for all files and directories in ``/config/user-data/sstp``. .. code-block:: none - set service sstp-server authentication local-users username foo password 'bar' - set service sstp-server authentication mode 'local' - set service sstp-server network-settings client-ip-settings gateway-address '192.0.2.0' - set service sstp-server network-settings client-ip-settings subnet '192.0.2.0/24' - set service sstp-server network-settings dns-server primary-dns '10.100.100.1' - set service sstp-server network-settings dns-server secondary-dns '10.200.100.1' - set service sstp-server sstp-settings ssl-certs ca 'ca.crt' - set service sstp-server sstp-settings ssl-certs server-cert 'server.crt' - set service sstp-server sstp-settings ssl-certs server-key 'server.key' + set vpn sstp authentication local-users username foo password 'bar' + set vpn sstp authentication mode 'local' + set vpn sstp network-settings client-ip-settings gateway-address '192.0.2.254' + set vpn sstp network-settings client-ip-settings subnet '192.0.2.0/25' + set vpn sstp network-settings name-server '10.0.0.1' + set vpn sstp network-settings name-server '10.0.0.2' + set vpn sstp ssl ca-cert-file 'ca.crt' + set vpn sstp ssl cert-file 'server.crt' + set vpn sstp ssl key-file 'server.key' .. include:: ../common-references.rst |