Advertisement
Guest User

Untitled

a guest
Mar 3rd, 2016
220
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.36 KB | None | 0 0
  1. # User authentication method. Could be set multiple times and in
  2. # that case all should succeed. To enable multiple methods use
  3. # multiple auth directives. Available options: certificate,
  4. # plain, pam, radius, gssapi.
  5. #
  6. # Note that authentication methods cannot be changed with reload.
  7.  
  8. # certificate:
  9. # This indicates that all connecting users must present a certificate.
  10. #
  11. # pam[gid-min=1000]:
  12. # This enabled PAM authentication of the user. The gid-min option is used
  13. # by auto-select-group option, in order to select the minimum valid group ID.
  14. #
  15. # plain[passwd=/etc/ocserv/ocpasswd,otp=/etc/ocserv/users.otp]
  16. # The plain option requires specifying a password file which contains
  17. # entries of the following format.
  18. # "username:groupname1,groupname2:encoded-password"
  19. # One entry must be listed per line, and 'ocpasswd' should be used
  20. # to generate password entries. The 'otp' suboption allows to specify
  21. # an oath password file to be used for one time passwords; the format of
  22. # the file is described in https://code.google.com/p/mod-authn-otp/wiki/UsersFile
  23. #
  24. # radius[config=/etc/radiusclient/radiusclient.conf,groupconfig=true,nas-identifier=name,override-interim-updates=false]:
  25. # The radius option requires specifying freeradius-client configuration
  26. # file. If the groupconfig option is set, then config-per-user will be overriden,
  27. # and all configuration will be read from radius. The 'override-interim-updates' if set to
  28. # true will ignore Acct-Interim-Interval from the server and 'stats-report-time' will be considered.
  29. #
  30. # gssapi[keytab=/etc/key.tab,require-local-user-map=true,tgt-freshness-time=900]
  31. # The gssapi option allows to use authentication methods supported by GSSAPI,
  32. # such as Kerberos tickets with ocserv. It should be best used as an alternative
  33. # to PAM (i.e., have pam in auth and gssapi in enable-auth), to allow users with
  34. # tickets and without tickets to login. The default value for require-local-user-map
  35. # is true. The 'tgt-freshness-time' if set, it would require the TGT tickets presented
  36. # to have been issued within the provided number of seconds. That option is used to
  37. # restrict logins even if the KDC provides long time TGT tickets.
  38.  
  39. #auth = "pam"
  40. #auth = "pam[gid-min=1000]"
  41. #auth = "plain[passwd=./sample.passwd,otp=./sample.otp]"
  42. auth = "certificate"
  43. #auth = "radius[config=/etc/radiusclient/radiusclient.conf,groupconfig=true]"
  44.  
  45. # Specify alternative authentication methods that are sufficient
  46. # for authentication. That is, if set, any of the methods enabled
  47. # will be sufficient to login.
  48. #enable-auth = "certificate"
  49. #enable-auth = "gssapi"
  50. #enable-auth = "gssapi[keytab=/etc/key.tab,require-local-user-map=true,tgt-freshness-time=900]"
  51.  
  52. # Accounting methods available:
  53. # radius: can be combined with any authentication method, it provides
  54. # radius accounting to available users (see also stats-report-time).
  55. #
  56. # pam: can be combined with any authentication method, it provides
  57. # a validation of the connecting user's name using PAM. It is
  58. # superfluous to use this method when authentication is already
  59. # PAM.
  60. #
  61. # Only one accounting method can be specified.
  62. #acct = "radius[config=/etc/radiusclient/radiusclient.conf]"
  63.  
  64. # Use listen-host to limit to specific IPs or to the IPs of a provided
  65. # hostname.
  66. #listen-host = [IP|HOSTNAME]
  67.  
  68. # When the server has a dynamic DNS address (that may change),
  69. # should set that to true to ask the client to resolve again on
  70. # reconnects.
  71. #listen-host-is-dyndns = true
  72.  
  73. # TCP and UDP port number
  74. tcp-port = 1194
  75. udp-port = 1194
  76.  
  77. # Accept connections using a socket file. It accepts HTTP
  78. # connections (i.e., without SSL/TLS unlike its TCP counterpart),
  79. # and uses it as the primary channel. That option cannot be
  80. # combined with certificate authentication.
  81. #listen-clear-file = /var/run/ocserv-conn.socket
  82.  
  83. # The user the worker processes will be run as. It should be
  84. # unique (no other services run as this user).
  85. run-as-user = ocserv
  86. run-as-group = ocserv
  87.  
  88. # socket file used for IPC with occtl. You only need to set that,
  89. # if you use more than a single servers.
  90. #occtl-socket-file = /var/run/occtl.socket
  91.  
  92. # socket file used for server IPC (worker-main), will be appended with .PID
  93. # It must be accessible within the chroot environment (if any), so it is best
  94. # specified relatively to the chroot directory.
  95. socket-file = ocserv.sock
  96.  
  97. # The default server directory. Does not require any devices present.
  98. chroot-dir = /var/lib/ocserv
  99.  
  100.  
  101. ### All configuration options below this line are reloaded on a SIGHUP.
  102. ### The options above, will remain unchanged.
  103.  
  104. # Whether to enable seccomp/Linux namespaces worker isolation. That restricts the number of
  105. # system calls allowed to a worker process, in order to reduce damage from a
  106. # bug in the worker process. It is available on Linux systems at a performance cost.
  107. # The performance cost is roughly 2% overhead at transfer time (tested on a Linux 3.17.8).
  108. isolate-workers = true
  109.  
  110. # A banner to be displayed on clients
  111. banner = "GTFO"
  112.  
  113. # Limit the number of clients. Unset or set to zero for unlimited.
  114. #max-clients = 1024
  115. max-clients = 16
  116.  
  117. # Limit the number of identical clients (i.e., users connecting
  118. # multiple times). Unset or set to zero for unlimited.
  119. max-same-clients = 2
  120.  
  121. # When the server has a dynamic DNS address (that may change),
  122. # should set that to true to ask the client to resolve again on
  123. # reconnects.
  124. #listen-host-is-dyndns = true
  125.  
  126. # Limit the number of client connections to one every X milliseconds
  127. # (X is the provided value). Set to zero for no limit.
  128. #rate-limit-ms = 100
  129.  
  130. # Stats report time. The number of seconds after which each
  131. # worker process will report its usage statistics (number of
  132. # bytes transferred etc). This is useful when accounting like
  133. # radius is in use.
  134. #stats-report-time = 360
  135.  
  136. # Keepalive in seconds
  137. keepalive = 32400
  138.  
  139. # Dead peer detection in seconds.
  140. # Note that when the client is behind a NAT this value
  141. # needs to be short enough to prevent the NAT disassociating
  142. # his UDP session from the port number. Otherwise the client
  143. # could have his UDP connection stalled, for several minutes.
  144. dpd = 90
  145.  
  146. # Dead peer detection for mobile clients. That needs to
  147. # be higher to prevent such clients being awaken too
  148. # often by the DPD messages, and save battery.
  149. # The mobile clients are distinguished from the header
  150. # 'X-AnyConnect-Identifier-DeviceType'.
  151. mobile-dpd = 1800
  152.  
  153. # MTU discovery (DPD must be enabled)
  154. try-mtu-discovery = false
  155.  
  156. # The key and the certificates of the server
  157. # The key may be a file, or any URL supported by GnuTLS (e.g.,
  158. # tpmkey:uuid=xxxxxxx-xxxx-xxxx-xxxx-xxxxxxxx;storage=user
  159. # or pkcs11:object=my-vpn-key;object-type=private)
  160. #
  161. # The server-cert file may contain a single certificate, or
  162. # a sorted certificate chain.
  163. #
  164. # There may be multiple server-cert and server-key directives,
  165. # but each key should correspond to the preceding certificate.
  166. server-cert = /etc/ocserv/server-cert.pem
  167. server-key = /etc/ocserv/server-key.pem
  168.  
  169. # Diffie-Hellman parameters. Only needed if you require support
  170. # for the DHE ciphersuites (by default this server supports ECDHE).
  171. # Can be generated using:
  172. # certtool --generate-dh-params --outfile /path/to/dh.pem
  173. dh-params = /etc/ocserv/dh.pem
  174.  
  175. # If you have a certificate from a CA that provides an OCSP
  176. # service you may provide a fresh OCSP status response within
  177. # the TLS handshake. That will prevent the client from connecting
  178. # independently on the OCSP server.
  179. # You can update this response periodically using:
  180. # ocsptool --ask --load-cert=your_cert --load-issuer=your_ca --outfile response
  181. # Make sure that you replace the following file in an atomic way.
  182. #ocsp-response = /path/to/ocsp.der
  183.  
  184. # In case PKCS #11, TPM or encrypted keys are used the PINs should be available
  185. # in files. The srk-pin-file is applicable to TPM keys only, and is the
  186. # storage root key.
  187. #pin-file = /path/to/pin.txt
  188. #srk-pin-file = /path/to/srkpin.txt
  189.  
  190. # The password or PIN needed to unlock the key in server-key file.
  191. # Only needed if the file is encrypted or a PKCS #11 object. This
  192. # is an alternative method to pin-file.
  193. #key-pin = 1234
  194.  
  195. # The SRK PIN for TPM.
  196. # This is an alternative method to srk-pin-file.
  197. #srk-pin = 1234
  198.  
  199. # The Certificate Authority that will be used to verify
  200. # client certificates (public keys) if certificate authentication
  201. # is set.
  202. ca-cert = /etc/ocserv/ca-cert.pem
  203.  
  204. # The object identifier that will be used to read the user ID in the client
  205. # certificate. The object identifier should be part of the certificate's DN
  206. # Useful OIDs are:
  207. # CN = 2.5.4.3, UID = 0.9.2342.19200300.100.1.1
  208. cert-user-oid = 0.9.2342.19200300.100.1.1
  209.  
  210. # The object identifier that will be used to read the user group in the
  211. # client certificate. The object identifier should be part of the certificate's
  212. # DN. Useful OIDs are:
  213. # OU (organizational unit) = 2.5.4.11
  214. #cert-group-oid = 2.5.4.11
  215.  
  216. # The revocation list of the certificates issued by the 'ca-cert' above.
  217. # See the manual to generate an empty CRL initially.
  218. #crl = /path/to/crl.pem
  219.  
  220. # Uncomment this to enable compression negotiation (LZS, LZ4).
  221. #compression = true
  222.  
  223. # Set the minimum size under which a packet will not be compressed.
  224. # That is to allow low-latency for VoIP packets. The default size
  225. # is 256 bytes. Modify it if the clients typically use compression
  226. # as well of VoIP with codecs that exceed the default value.
  227. #no-compress-limit = 256
  228.  
  229. # GnuTLS priority string; note that SSL 3.0 is disabled by default
  230. # as there are no openconnect (and possibly anyconnect clients) using
  231. # that protocol. The string below does not enforce perfect forward
  232. # secrecy, in order to be compatible with legacy clients.
  233. #
  234. # Note that the most performant ciphersuites are the moment are the ones
  235. # involving AES-GCM. These are very fast in x86 and x86-64 hardware, and
  236. # in addition require no padding, thus taking full advantage of the MTU.
  237. # For that to be taken advantage of, the openconnect client must be
  238. # used, and the server must be compiled against GnuTLS 3.2.7 or later.
  239. # Use "gnutls-cli --benchmark-tls-ciphers", to see the performance
  240. # difference with AES_128_CBC_SHA1 (the default for anyconnect clients)
  241. # in your system.
  242.  
  243. tls-priorities = "NORMAL:%SERVER_PRECEDENCE:%COMPAT:-VERS-SSL3.0"
  244.  
  245. # More combinations in priority strings are available, check
  246. # http://gnutls.org/manual/html_node/Priority-Strings.html
  247. # E.g., the string below enforces perfect forward secrecy (PFS)
  248. # on the main channel.
  249. #tls-priorities = "NORMAL:%SERVER_PRECEDENCE:%COMPAT:-RSA:-VERS-SSL3.0:-ARCFOUR-128"
  250.  
  251. # The time (in seconds) that a client is allowed to stay connected prior
  252. # to authentication
  253. auth-timeout = 40
  254.  
  255. # The time (in seconds) that a client is allowed to stay idle (no traffic)
  256. # before being disconnected. Unset to disable.
  257. #idle-timeout = 1200
  258.  
  259. # The time (in seconds) that a client is allowed to stay connected
  260. # Unset to disable.
  261. #session-timeout = 86400
  262.  
  263. # The time (in seconds) that a mobile client is allowed to stay idle (no
  264. # traffic) before being disconnected. Unset to disable.
  265. #mobile-idle-timeout = 2400
  266.  
  267. # The time (in seconds) that a client is not allowed to reconnect after
  268. # a failed authentication attempt.
  269. min-reauth-time = 300
  270.  
  271. # Banning clients in ocserv works with a point system. IP addresses
  272. # that get a score over that configured number are banned for
  273. # min-reauth-time seconds. By default a wrong password attempt is 10 points,
  274. # a KKDCP POST is 1 point, and a connection is 1 point. Note that
  275. # due to difference processes being involved the count of points
  276. # will not be real-time precise.
  277. #
  278. # Score banning cannot be reliably used when receiving proxied connections
  279. # locally from an HTTP server (i.e., when listen-clear-file is used).
  280. #
  281. # Set to zero to disable.
  282. max-ban-score = 50
  283.  
  284. # The time (in seconds) that all score kept for a client is reset.
  285. ban-reset-time = 300
  286.  
  287. # In case you'd like to change the default points.
  288. #ban-points-wrong-password = 10
  289. #ban-points-connection = 1
  290. #ban-points-kkdcp = 1
  291.  
  292. # Cookie timeout (in seconds)
  293. # Once a client is authenticated he's provided a cookie with
  294. # which he can reconnect. That cookie will be invalided if not
  295. # used within this timeout value. On a user disconnection, that
  296. # cookie will also be active for this time amount prior to be
  297. # invalid. That should allow a reasonable amount of time for roaming
  298. # between different networks.
  299. cookie-timeout = 300
  300.  
  301. # If this is enabled (not recommended) the cookies will stay
  302. # valid even after a user manually disconnects, and until they
  303. # expire. This may improve roaming with some broken clients.
  304. #persistent-cookies = true
  305.  
  306. # Whether roaming is allowed, i.e., if true a cookie is
  307. # restricted to a single IP address and cannot be re-used
  308. # from a different IP.
  309. deny-roaming = false
  310.  
  311. # ReKey time (in seconds)
  312. # ocserv will ask the client to refresh keys periodically once
  313. # this amount of seconds is elapsed. Set to zero to disable (note
  314. # that, some clients fail if rekey is disabled).
  315. rekey-time = 172800
  316.  
  317. # ReKey method
  318. # Valid options: ssl, new-tunnel
  319. # ssl: Will perform an efficient rehandshake on the channel allowing
  320. # a seamless connection during rekey.
  321. # new-tunnel: Will instruct the client to discard and re-establish the channel.
  322. # Use this option only if the connecting clients have issues with the ssl
  323. # option.
  324. rekey-method = ssl
  325.  
  326. # Script to call when a client connects and obtains an IP.
  327. # The following parameters are passed on the environment.
  328. # REASON, USERNAME, GROUPNAME, HOSTNAME (the hostname selected by client),
  329. # DEVICE, IP_REAL (the real IP of the client), IP_LOCAL (the local IP
  330. # in the P-t-P connection), IP_REMOTE (the VPN IP of the client),
  331. # IPV6_LOCAL (the IPv6 local address if there are both IPv4 and IPv6
  332. # assigned), IPV6_REMOVE (the IPv6 remote address), and
  333. # ID (a unique numeric ID); REASON may be "connect" or "disconnect".
  334.  
  335. # The disconnect script will receive the additional values: STATS_BYTES_IN,
  336. # STATS_BYTES_OUT, STATS_DURATION that contain a 64-bit counter of the bytes
  337. # output from the tun device, and the duration of the session in seconds.
  338.  
  339. #connect-script = /usr/bin/ocserv-script
  340. #disconnect-script = /usr/bin/ocserv-script
  341.  
  342. # UTMP
  343. # Register the connected clients to utmp. This will allow viewing
  344. # the connected clients using the command 'who'.
  345. #use-utmp = true
  346.  
  347. # Whether to enable support for the occtl tool (i.e., either through D-BUS,
  348. # or via a unix socket).
  349. use-occtl = true
  350.  
  351. # PID file. It can be overriden in the command line.
  352. pid-file = /var/run/ocserv.pid
  353.  
  354. # Set the protocol-defined priority (SO_PRIORITY) for packets to
  355. # be sent. That is a number from 0 to 6 with 0 being the lowest
  356. # priority. Alternatively this can be used to set the IP Type-
  357. # Of-Service, by setting it to a hexadecimal number (e.g., 0x20).
  358. # This can be set per user/group or globally.
  359. #net-priority = 3
  360.  
  361. # Set the VPN worker process into a specific cgroup. This is Linux
  362. # specific and can be set per user/group or globally.
  363. #cgroup = "cpuset,cpu:test"
  364.  
  365. #
  366. # Network settings
  367. #
  368.  
  369. # The name to use for the tun device
  370. device = vpns
  371.  
  372. # Whether the generated IPs will be predictable, i.e., IP stays the
  373. # same for the same user when possible.
  374. predictable-ips = true
  375.  
  376. # The default domain to be advertised
  377. default-domain = example.com
  378.  
  379. # The pool of addresses that leases will be given from. If the leases
  380. # are given via Radius, or via the explicit-ip? per-user config option then
  381. # these network values should contain a network with at least a single
  382. # address that will remain under the full control of ocserv (that is
  383. # to be able to assign the local part of the tun device address).
  384. ipv4-network = 10.0.3.0
  385. ipv4-netmask = 255.255.255.0
  386.  
  387. # An alternative way of specifying the network:
  388. #ipv4-network = 192.168.1.0/24
  389.  
  390. # The IPv6 subnet that leases will be given from.
  391. #ipv6-network = fda9:4efe:7e3b:03ea::/64
  392.  
  393. # Specify the size of the network to provide to clients. It is
  394. # generally recommended to provide clients with a /64 network in
  395. # IPv6, but any subnet may be specified. To provide clients only
  396. # with a single IP use the prefix 128.
  397. #ipv6-subnet-prefix = 128
  398. #ipv6-subnet-prefix = 64
  399.  
  400. # The advertized DNS server. Use multiple lines for
  401. # multiple servers.
  402. # dns = fc00::4be0
  403. dns = 10.0.1.1
  404. dns = 8.8.8.8
  405.  
  406. # The NBNS server (if any)
  407. #nbns = 192.168.1.3
  408.  
  409. # The domains over which the provided DNS should be used. Use
  410. # multiple lines for multiple domains.
  411. #split-dns = example.com
  412.  
  413. # Prior to leasing any IP from the pool ping it to verify that
  414. # it is not in use by another (unrelated to this server) host.
  415. # Only set to true, if there can be occupied addresses in the
  416. # IP range for leases.
  417. ping-leases = false
  418.  
  419. # Use this option to enforce an MTU value to the incoming
  420. # connections. Unset to use the default MTU of the TUN device.
  421. #mtu = 1420
  422.  
  423. # Unset to enable bandwidth restrictions (in bytes/sec). The
  424. # setting here is global, but can also be set per user or per group.
  425. #rx-data-per-sec = 40000
  426. #tx-data-per-sec = 40000
  427.  
  428. # The number of packets (of MTU size) that are available in
  429. # the output buffer. The default is low to improve latency.
  430. # Setting it higher will improve throughput.
  431. #output-buffer = 10
  432.  
  433. # Routes to be forwarded to the client. If you need the
  434. # client to forward routes to the server, you may use the
  435. # config-per-user/group or even connect and disconnect scripts.
  436. #
  437. # To set the server as the default gateway for the client just
  438. # comment out all routes from the server, or use the special keyword
  439. # 'default'.
  440.  
  441. route = 10.0.0.0/255.255.252.0
  442. #route = 192.168.0.0/255.255.0.0
  443. #route = fef4:db8:1000:1001::/64
  444.  
  445. # Subsets of the routes above that will not be routed by
  446. # the server.
  447.  
  448. #no-route = 192.168.5.0/255.255.255.0
  449.  
  450. # If set, the script /usr/bin/ocserv-fw will be called to restrict
  451. # the user to its allowed routes and prevent him from accessing
  452. # any other routes. In case of defaultroute, the no-routes are restricted.
  453. # All the routes applied by ocserv can be reverted using /usr/bin/ocserv-fw
  454. # --removeall. This option can be set globally or in the per-user configuration.
  455. #restrict-user-to-routes = true
  456.  
  457. # When set to true, all client's iroutes are made visible to all
  458. # connecting clients except for the ones offering them. This option
  459. # only makes sense if config-per-user is set.
  460. #expose-iroutes = true
  461.  
  462. # Groups that a client is allowed to select from.
  463. # A client may belong in multiple groups, and in certain use-cases
  464. # it is needed to switch between them. For these cases the client can
  465. # select prior to authentication. Add multiple entries for multiple groups.
  466. # The group may be followed by a user-friendly name in brackets.
  467. #select-group = group1
  468. #select-group = group2[My special group]
  469.  
  470. # The name of the (virtual) group that if selected it would assign the user
  471. # to its default group.
  472. #default-select-group = DEFAULT
  473.  
  474. # Instead of specifying manually all the allowed groups, you may instruct
  475. # ocserv to scan all available groups and include the full list.
  476. #auto-select-group = true
  477.  
  478. # Configuration files that will be applied per user connection or
  479. # per group. Each file name on these directories must match the username
  480. # or the groupname.
  481. # The options allowed in the configuration files are dns, nbns,
  482. # ipv?-network, ipv4-netmask, rx/tx-per-sec, iroute, route, no-route,
  483. # explicit-ipv4, explicit-ipv6, net-priority, deny-roaming, no-udp,
  484. # user-profile, cgroup, stats-report-time, and session-timeout.
  485. #
  486. # Note that the 'iroute' option allows to add routes on the server
  487. # based on a user or group. The syntax depends on the input accepted
  488. # by the commands route-add-cmd and route-del-cmd (see below). The no-udp
  489. # is a boolean option (e.g., no-udp = true), and will prevent a UDP session
  490. # for that specific user or group.
  491.  
  492. #config-per-user = /etc/ocserv/config-per-user/
  493. #config-per-group = /etc/ocserv/config-per-group/
  494.  
  495. # When config-per-xxx is specified and there is no group or user that
  496. # matches, then utilize the following configuration.
  497. #default-user-config = /etc/ocserv/defaults/user.conf
  498. #default-group-config = /etc/ocserv/defaults/group.conf
  499.  
  500. # The system command to use to setup a route. %{R} will be replaced with the
  501. # route/mask and %{D} with the (tun) device.
  502. #
  503. # The following example is from linux systems. %R should be something
  504. # like 192.168.2.0/24 (the argument of iroute).
  505.  
  506. #route-add-cmd = "ip route add %{R} dev %{D}"
  507. #route-del-cmd = "ip route delete %{R} dev %{D}"
  508.  
  509. # This option allows to forward a proxy. The special keywords '%{U}'
  510. # and '%{G}', if present will be replaced by the username and group name.
  511. #proxy-url = http://example.com/
  512. #proxy-url = http://example.com/%{U}/
  513.  
  514. # This option allows you to specify a URL location where a client can
  515. # post using MS-KKDCP, and the message will be forwarded to the provided
  516. # KDC server. That is a translation URL between HTTP and Kerberos.
  517. # In MIT kerberos you'll need to add in realms:
  518. # EXAMPLE.COM = {
  519. # kdc = https://ocserv.example.com/kerberos
  520. # http_anchors = FILE:/etc/ocserv-ca.pem
  521. # }
  522. # This option is available if ocserv is compiled with GSSAPI support.
  523.  
  524. #kkdcp = SERVER-PATH KERBEROS-REALM PROTOCOL@SERVER:PORT
  525. #kkdcp = /kerberos EXAMPLE.COM udp@127.0.0.1:88
  526. #kkdcp = /kerberos-tcp EXAMPLE.COM tcp@127.0.0.1:88
  527.  
  528. #
  529. # The following options are for (experimental) AnyConnect client
  530. # compatibility.
  531.  
  532. # This option must be set to true to support legacy CISCO clients.
  533. # A side effect of this option is that it will no longer be required
  534. # for clients to present their certificate on every connection.
  535. # That is they may resume a cookie without presenting a certificate
  536. # (when certificate authentication is used).
  537. cisco-client-compat = true
  538.  
  539. # Client profile xml. A sample file exists in doc/profile.xml.
  540. # It is required by some of the CISCO clients.
  541. # This file must be accessible from inside the worker's chroot.
  542. user-profile = profile.xml
  543.  
  544. #Advanced options
  545.  
  546. # Option to allow sending arbitrary custom headers to the client after
  547. # authentication and prior to VPN tunnel establishment. You shouldn't
  548. # need to use this option normally; if you do and you think that
  549. # this may help others, please send your settings and reason to
  550. # the openconnect mailing list. The special keywords '%{U}'
  551. # and '%{G}', if present will be replaced by the username and group name.
  552. #custom-header = "X-My-Header: hi there"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement