Skip to content

Commit 630a2f0

Browse files
committed
add xml example
1 parent cb96f8c commit 630a2f0

File tree

1 file changed

+32
-1
lines changed

1 file changed

+32
-1
lines changed

articles/virtual-wan/openvpn-azure-ad-client.md

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,38 @@ You can modify the downloaded profile XML file and add the **\<dnsservers>\<dnss
187187
188188
### <a name="multi-cert"></a>Can I specify multiple certificates for the VPN client?
189189

190-
If you have 2 hubs for your virtual WAN that are each configured for P2S User VPN and use the same VPN configuration, and that configuration is configured to use multiple certificates, you can now configure the VPN clients for multiple certificates. This means that if one certificate can't be used for any reason, the other certificate can still be used for authentication. Previously, you couldn't configure the client with the settings for both certificates. Go to the Virtual WAN -> User VPN configurations page, select the User VPN configuration used by both hubs, then select **Download virtual WAN user VPN profile** to download the global user VPN profile (rather than the hub profile). The files you download contain the root end certificates. You can configure multiple certificate support on the client side by either using the Azure VPN Client interface (version 2.1963.44.0 or higher), or by using a multiple certificate tag in the xml profile.
190+
If you have 2 hubs for your virtual WAN that are each configured for P2S User VPN and use the same VPN configuration, and that configuration is configured to use multiple certificates, you can now configure the VPN clients for multiple certificates. This means that if one certificate can't be used for any reason, the other certificate can still be used for authentication. Previously, you couldn't configure the client with the settings for both certificates. Go to the Virtual WAN -> User VPN configurations page, select the User VPN configuration used by both hubs, then select **Download virtual WAN user VPN profile** to download the global user VPN profile (rather than the hub profile). The files you download contain the root end certificates.
191+
192+
You can configure multiple certificate support on the client side by either using the Azure VPN Client interface (version 2.1963.44.0 or higher), or by using multiple certificate tags in the xml profile.
193+
194+
Example:
195+
196+
```xml
197+
</protocolconfig>
198+
<serverlist>
199+
<ServerEntry>
200+
<displayname
201+
i:nil="true" />
202+
<fqdn>wan.kycyz81dpw483xnf3fg62v24f.vpn.azure.com</fqdn>
203+
</ServerEntry>
204+
</serverlist>
205+
<servervalidation>
206+
<cert>
207+
<hash>A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436</hash>
208+
<issuer
209+
i:nil="true" />
210+
</cert>
211+
<cert>
212+
<hash>59470697201baejC4B2D7D66D40C6DD2FB19C5436</hash>
213+
<issuer
214+
i:nil="true" />
215+
</cert>
216+
<cert>
217+
<hash>cab20a7f63f00f2bae76202gdfe36db3a03a9cb9</hash>
218+
<issuer
219+
i:nil="true" />
220+
</cert>
221+
```
191222

192223
### <a name="custom-routes"></a>How do I add custom routes to the VPN client?
193224

0 commit comments

Comments
 (0)