Application Examples
R&S
®
GP-E/GP-S
190User Manual v16.2.1 ─ 01
3.
Add an LDAP user to the desktop by clicking (Pin this user to desktop) in the
item list bar.
The LDAP user appears as a node on the desktop.
Note: The user's login name has to exactly match the name displayed on the desk-
top (case-sensitive). Otherwise, the name in the user-specific firewall rules does
not correspond to the user logging on to the client and the rules do not match.
4. Repeat the process for all LDAP users that require VPN access.
5.
Click "
Activate" in the toolbar at the top of the desktop to apply your configura-
tion changes.
For authentication by "Client Certificate" :
For authentication by "Client Certificate" , export the client certificates with private
keys:
1. From the menu in the navigation pane, select "VPN > OpenVPN > Client-to-Site".
2. Under "Certificate" , select the VPN certificate for the client created in Chap-
ter 4.12.3.1, "Creating a VPN Certificate", on page 187.
3. Optionally, you can create a user on the desktop to create firewall rules for the cli-
ent. In this case use the certificate name (CN) as username.
4. Export the CA without the private key and the client certificate with the private key
(see Chapter 3.4.8.1, "Certificates", on page 122 for further information).
5. Install the client certificate and the signing CA on the client computer.
For more information, see Chapter 3.4.1.8, "User Authentication", on page 47.
4.12.3.3 Setting Up the VPN Connection
Define a connection to enable remote client computers to connect securely to the inter-
nal network via the Internet.
1. From the menu in the navigation pane, select "VPN > OpenVPN > Client-to-Site".
2.
Click the plus button
in the item list header to create a new virtual private net-
work connection.
An editor panel is opened, allowing you to configure an OpenVPN C2S connection.
VPN Setup Examples