Line 1: |
Line 1: |
| <!-- Template uses {{{name}}}, {{{series}}} --> | | <!-- Template uses {{{name}}}, {{{series}}} --> |
| {{Template:Networking_rutos_manual_fw_disclosure | | {{Template:Networking_rutos_manual_fw_disclosure |
− | | fw_version = {{{series}}}_R_00.07.00 | + | | fw_version = {{{series}}}_R_00.07.01 |
| | series = {{{series}}} | | | series = {{{series}}} |
| }} | | }} |
− | {{#ifeq: {{{legacy}}} | 1 |<br><i><b>Note</b>: <b>[[{{{name}}} VPN (legacy WebUI)|click here]]</b> for the old style WebUI (FW version RUT9XX_R_00.06.08.2 and earlier) user manual page.</i>|}} | + | {{#ifeq: {{{series}}} | RUT9 |<br><i><b>Note</b>: <b>[[{{{name}}} VPN (legacy WebUI)|click here]]</b> for the old style WebUI (FW version RUT9XX_R_00.06.08.3 and earlier) user manual page.</i>|}} |
| + | {{#ifeq: {{{series}}} | RUT2 |<br><i><b>Note</b>: <b>[[{{{name}}} VPN (legacy WebUI)|click here]]</b> for the old style WebUI (FW version RUT2XX_R_00.01.14.1 and earlier) user manual page.</i>|}} |
| ==Summary== | | ==Summary== |
| | | |
Line 20: |
Line 21: |
| <b>OpenVPN</b> is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It is often regarded as being the most universal VPN protocol because of its flexibility, support of SSL/TLS security, multiple encryption methods, many networking features and compatibility with most OS platforms. | | <b>OpenVPN</b> is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It is often regarded as being the most universal VPN protocol because of its flexibility, support of SSL/TLS security, multiple encryption methods, many networking features and compatibility with most OS platforms. |
| | | |
− | {{{name}}} devices run OpenVPN version <b>2.4.5</b>. | + | {{{name}}} devices run OpenVPN version <b>2.5.2</b>. |
| | | |
| ===OpenVPN Client=== | | ===OpenVPN Client=== |
Line 26: |
Line 27: |
| An <b>OpenVPN client</b> is an entity that initiates a connection to an OpenVPN server. To create a new client instance, go to the <i>Services → VPN → OpenVPN</i> section, select <i>Role: Client</i>, enter a custom name and click the 'Add' button. An OpenVPN client instance with the given name will appear in the "OpenVPN Configuration" list. | | An <b>OpenVPN client</b> is an entity that initiates a connection to an OpenVPN server. To create a new client instance, go to the <i>Services → VPN → OpenVPN</i> section, select <i>Role: Client</i>, enter a custom name and click the 'Add' button. An OpenVPN client instance with the given name will appear in the "OpenVPN Configuration" list. |
| | | |
− | To begin configuration, click the button that looks liek a pencil next to the client instance. Refer to the figure and table below for information on the OpenVPN client's configuration fields: | + | To begin configuration, click the button that looks like a pencil next to the client instance. Refer to the figure and table below for information on the OpenVPN client's configuration fields: |
| | | |
| [[File:Networking_trb2_vpn_openvpn_client_configuration_v2.png|border|class=tlt-border|]] | | [[File:Networking_trb2_vpn_openvpn_client_configuration_v2.png|border|class=tlt-border|]] |
Line 667: |
Line 668: |
| </ul> | | </ul> |
| </td> | | </td> |
| + | </tr> |
| + | <tr> |
| + | <td>Multiple secrets</td> |
| + | <td>off {{!}} on; default: <b>off</b></td> |
| + | <td>Enable to show <b>Global Secret Settings</b> section for configuring multiple secrets.</td> |
| </tr> | | </tr> |
| </table> | | </table> |
Line 679: |
Line 685: |
| </li> | | </li> |
| </ul> | | </ul> |
| + | |
| + | ====Global Secrets Settings==== |
| + | ---- |
| + | This section is displayed when <b>Multiple secrets</b> is enabled in General settings. You can add new instances by pressing <b>Add</b>. |
| + | |
| + | [[File:Networking_rutos_vpn_ipsec_ipsec_instance_general_settings_global_secrets_settings.png|border|class=tlt-border]] |
| + | |
| + | <table class="nd-mantable"> |
| + | <tr> |
| + | <th>Field</th> |
| + | <th>Value</th> |
| + | <th>Description</th> |
| + | </tr> |
| + | <tr> |
| + | <td>ID Selector</td> |
| + | <td>%any, IP or FQDN; default: <b>none</b></td> |
| + | <td>Each secret can be preceded by a list of optional ID selectors. A selector is an IP address, a Fully Qualified Domain Name, user@FQDN or %any. When using IKEv1 use IP address.</br><b>NOTE:</b> IKEv1 only supports IP address ID selector.</td> |
| + | </tr> |
| + | <tr> |
| + | <td>Type</td> |
| + | <td>psk {{!}} xauth; default: <b>psk</b></td> |
| + | <td>IPSec secret type.</br><b>NOTE:</b> XAUTH secrets are IKEv1 only.</td> |
| + | </tr> |
| + | <tr> |
| + | <td>Secret</td> |
| + | <td>string; default: <b>none</b></td> |
| + | <td>A shared password to authenticate between the peers. Minimum length is 5 symbols. All characters are allowed except `.</td> |
| + | </tr> |
| + | </table> |
| | | |
| ====Advanced Settings==== | | ====Advanced Settings==== |
Line 1,781: |
Line 1,816: |
| </tr> | | </tr> |
| </table> | | </table> |
− | <!--
| + | |
| ==WireGuard== | | ==WireGuard== |
| | | |
Line 1,948: |
Line 1,983: |
| </tr> | | </tr> |
| </table> | | </table> |
− | -->
| + | |
| [[Category:{{{name}}} Services section]] | | [[Category:{{{name}}} Services section]] |