Configuring Clients
Configure Client for Android and ChromeOS
Configure Client with macOS, iOS and IpadOS
Configure OpenConnect for linux
Oneconnect Server
Docs: **OneConnect
HowTo: OneConnect VPN tunnel in Netwall
Server settings
Field | Value |
---|---|
Name | Interface name, will be interface used on policies and such. e.g OneConnectServer |
Zone | (Optional) Specifies if member of zone |
Inner IP | Interface IP, will become a core route, IP owned by the firewall e.g. 192.168.10.1 |
Outer Interface | Listening interface for incoming connection, if more then 1 is required its possible to use Interface Group e.g. Wan |
Server IP | The listening ip address for incoming connections. e.g. Wan_ip |
Host Name | (Optional) Limit the user to connect only with a DNS name, needs to resolve to Server IP from the clients perspective amd also match the certificate. e.g. vpn.example.com |
Server Port | The listening TCP port for incoming connection e.g. 443 |
Use DTLS | Yes/No |
DTLS Port | Port used for DTLS connection. e.g. 443 |
Authentication settings
Authentication Source | |
OpenID Connect
Docs: OpenID Connect | Authenticate using a OpenID provider, configured under "Policies → User Authentication → User Directories → OIDC" |
Radius
Docs: Radius | Sends a radius Access-Request to specified radius server, configured under "Policies → User Authentication → User Directories → Radius" |
LDAP Docs: Ldap | Sends a LDAP query to specified LDAP server, configured under "Policies → User Authentication → User Directories → LDAP" |
Local
Docs: Local database | Authenticate towards the local user database in the firewall. configured under "System → Users → Local User Database" |
Authentication Rule
Docs: Authentication Rule | More settings available with Authentication Rule configured under "Policies → User Authentication → Authentication Rules" |
User Groups | Groups the user needs to belong to in order to connect |
Client IP options
Client IP Address Pool | IP pool that will be used for clients, don't use same range as a DHCP or other features. Can be specified by ips e.g. 192.168.10.9-192.168.10.32 or with cidr e.g. 192.168.10.0/24 |
Netmask | e.g. 255.255.255.0 |
Primary DNS | Primary dns server for clients to use, e.g. 8.8.8.8 or internal. Note that internal server needs to be include in the client routes. |
Secondary DNS | Secondary dns server for clients to use, e.g. 1.1.1.1 or internal.Note that internal server needs to be include in the client routes. |
### DNS Suffixes: | Multiple suffixes can be used. e.g. example.local |
Limits:
|
Auto Proxy URL | Proxy URL to be pushed to clients |
### Client Routes | |
All-Nets | All clients traffic will be routed over the vpn. |
Custom | Its possible to configure up to 32 routes, all configured under the custom will be routed over the vpn, rest will use the clients own route, e.g. their internet connection. |
OneConnect Capabilities
OneConnect Server | |
---|---|
Protocol Features | |
TLS (TCP) Support | Yes |
DTLS (UDP) Support | Yes |
Protocol | OpenConnect |
Outer Transport Protocol | UDP, TCP |
Outer IP Protocol | IPv4, IPv6 |
Inner IP Protocol | IPv4 |
Routing Features | |
Split Tunneling Support | Yes |
Split Tunneling Configuration | Dynamically configured on the client by NetWall on every connection attempt, fully transparent for the user. |
Number of Routes | 32 |
Largest Subnet | No limitation |
Client Support | |
Support for 3rd Party Clients | Yes |
Clavister Client Versions |
|
Operating Systems Supported by Clavister Clients |
|
Support for Deep Links | Yes, Deeplinks for easy deployment of configuration profiles |
Support for DNS search suffixes | Yes |
Support for URL redirect after connection (SSO Portal from EasyAccess) | Yes |
Support for HTTP proxy settings | Yes, using Auto Proxy URL to WPAD file. |
Support for VPN on Demand Rules on macOS/iOS/iPadOS | Yes, per profile, power user setting enabled in Preferences |
NetWall Firmware Versions | |
Supported From | cOS Core 13.00.09 |
Certificate
Docs: ACME
Docs: Certificate
Importing certificate
Objects → General → Key Ring → Add → Certificate → Upload Certificate
Applying certificate
System → Device → Device Settings → Remote Management → Advanced settings
This example is based while using the ACME feature
|
Troubleshooting Certificates
This website is common to use to confirm the chain or missconfiguration,
https://whatsmychaincert.com/?vpn.example.com:443
A common issue is with android and that the full chain is missing
Usually an intermediate needs to be added as root certificate.
Related articles
Upgrading EasyAccess to PhenixID Authentication Services
16 Aug, 2024 changeme easyaccess phenixid pas
16 Aug, 2024 changeme easyaccess phenixid pas