Skip to content

Commit 8dbd777

Browse files
authored
Merge pull request #108200 from cherylmc/p2svwan1
update
2 parents 9473366 + 03917db commit 8dbd777

17 files changed

+196
-157
lines changed

articles/virtual-wan/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@
5454
items:
5555
- name: Create a User VPN connection
5656
href: virtual-wan-point-to-site-portal.md
57-
- name: Configure certificates
57+
- name: Generate certificates
5858
href: certificates-point-to-site.md
5959
- name: Configure Azure AD tenant
6060
href: openvpn-azure-ad-tenant.md
@@ -63,7 +63,7 @@
6363
- name: Global and hub-based profile
6464
href: global-hub-profile.md
6565
- name: Configure OpenVPN clients
66-
href: ../vpn-gateway/vpn-gateway-howto-openvpn-clients.md?toc=%2fazure%2fvirtual-wan%2ftoc.json
66+
href: howto-openvpn-clients.md?
6767
- name: Configure Always On VPN user tunnel
6868
href: howto-always-on-user-tunnel.md
6969
- name: Configure Always On VPN device tunnel

articles/virtual-wan/about-vpn-profile-download.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,11 @@ ms.author: cherylmc
1212
---
1313
# Working with User VPN client profiles
1414

15-
The downloaded profile file contains information that is necessary to configure a VPN connection. This article will help you obtain and understand the information necessary for a User VPN client profile.
15+
The downloaded profile file contains information that is necessary to configure a VPN connection. This article helps you obtain and understand the information necessary for a User VPN client profile.
1616

1717
[!INCLUDE [client profiles](../../includes/vpn-gateway-vwan-vpn-profile-download.md)]
1818

19-
* The **OpenVPN folder** contains the *ovpn* profile that needs to be modified to include the key and the certificate. For more information, see [Configure OpenVPN clients](../vpn-gateway/vpn-gateway-howto-openvpn-clients.md#windows).
19+
* The **OpenVPN folder** contains the *ovpn* profile that needs to be modified to include the key and the certificate. For more information, see [Configure OpenVPN clients](../virtual-wan/howto-openvpn-clients.md#windows).
2020

2121
## Next steps
2222

articles/virtual-wan/certificates-point-to-site.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
2-
title: 'Generate and export certificates for Azure Virtual WAN user VPN connections | Microsoft Docs'
2+
title: 'Generate and export certificates for User VPN connections | Azure Virtual WAN'
33
description: Create a self-signed root certificate, export the public key, and generate client certificates using PowerShell on Windows 10 or Windows Server 2016.
44
services: virtual-wan
55
author: cherylmc
66

77
ms.service: virtual-wan
88
ms.topic: conceptual
9-
ms.date: 10/09/2019
9+
ms.date: 03/18/2020
1010
ms.author: cherylmc
1111

1212
---
13-
# Generate and export certificates for Virtual WAN user VPN connections
13+
# Generate and export certificates for User VPN connections
1414

15-
User VPN connections use certificates to authenticate. This article shows you how to create a self-signed root certificate and generate client certificates using PowerShell on Windows 10 or Windows Server 2016.
15+
User VPN (point-to-site) connections use certificates to authenticate. This article shows you how to create a self-signed root certificate and generate client certificates using PowerShell on Windows 10 or Windows Server 2016.
1616

1717
You must perform the steps in this article on a computer running Windows 10 or Windows Server 2016. The PowerShell cmdlets that you use to generate certificates are part of the operating system and do not work on other versions of Windows. The Windows 10 or Windows Server 2016 computer is only needed to generate the certificates. Once the certificates are generated, you can upload them, or install them on any supported client operating system.
1818

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: 'Configure OpenVPN clients for Azure Virtual WAN'
3+
description: Steps to configure OpenVPN clients for Azure Virtual WAN
4+
services: virtual-wan
5+
author: cherylmc
6+
7+
ms.service: virtual-wan
8+
ms.topic: conceptual
9+
ms.date: 03/18/2020
10+
ms.author: cherylmc
11+
12+
---
13+
# Configure an OpenVPN client for Azure Virtual WAN
14+
15+
This article helps you configure **OpenVPN ® Protocol** clients.
16+
17+
## Before you begin
18+
19+
Create a User VPN (point-to-site) configuration. Make sure that you select "OpenVPN" for tunnel type. For steps, see [Create a P2S configuration for Azure Virtual WAN](virtual-wan-point-to-site-portal.md#p2sconfig).
20+
21+
[!INCLUDE [configuration steps](../../includes/vpn-gateway-vwan-config-openvpn-clients.md)]
22+
23+
## Next steps
24+
25+
For more information about User VPN (point-to-site), see [Create User VPN connections](virtual-wan-point-to-site-portal.md).
26+
27+
**"OpenVPN" is a trademark of OpenVPN Inc.**

articles/virtual-wan/virtual-wan-point-to-site-portal.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: anzaman
66

77
ms.service: virtual-wan
88
ms.topic: tutorial
9-
ms.date: 11/04/2019
9+
ms.date: 03/18/2020
1010
ms.author: alzam
1111

1212
---
@@ -33,7 +33,7 @@ In this tutorial, you learn how to:
3333

3434
Verify that you have met the following criteria before beginning your configuration:
3535

36-
* You have a virtual network that you want to connect to. Verify that none of the subnets of your on-premises networks overlap with the virtual networks that you want to connect to. To create a virtual network in the Azure portal, see the [Quickstart](../virtual-network/quick-create-portal.md).
36+
* You have a virtual network that you want to connect to. Verify that none of the subnets of your on-premises networks overlap with the virtual networks that you want to connect to. To create a virtual network in the Azure portal, see the [quickstart](../virtual-network/quick-create-portal.md).
3737

3838
* Your virtual network does not have any virtual network gateways. If your virtual network has a gateway (either VPN or ExpressRoute), you must remove all gateways. This configuration requires that virtual networks are connected instead, to the Virtual WAN hub gateway.
3939

@@ -130,8 +130,8 @@ Use the downloaded profile to configure the remote access clients. The procedure
130130
1. Download and install the OpenVPN client from the official website.
131131
2. Download the VPN profile for the gateway. This can be done from the User VPN configurations tab in Azure portal, or New-AzureRmVpnClientConfiguration in PowerShell.
132132
3. Unzip the profile. Open the vpnconfig.ovpn configuration file from the OpenVPN folder in notepad.
133-
4. Fill in the P2S client certificate section with the P2S client certificate public key in base64. In a PEM formatted certificate, you can simply open the .cer file and copy over the base64 key between the certificate headers. See here [how to export a certificate to get the encoded public key.](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-certificates-point-to-site)
134-
5. Fill in the private key section with the P2S client certificate private key in base64. See here [how to extract private key.](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-howto-openvpn-clients#windows)
133+
4. Fill in the P2S client certificate section with the P2S client certificate public key in base64. In a PEM formatted certificate, you can simply open the .cer file and copy over the base64 key between the certificate headers. For steps, see [How to export a certificate to get the encoded public key.](certificates-point-to-site.md)
134+
5. Fill in the private key section with the P2S client certificate private key in base64. For steps, see [How to extract private key.](howto-openvpn-clients.md#windows).
135135
6. Do not change any other fields. Use the filled in configuration in client input to connect to the VPN.
136136
7. Copy the vpnconfig.ovpn file to C:\Program Files\OpenVPN\config folder.
137137
8. Right-click the OpenVPN icon in the system tray and click connect.
@@ -141,7 +141,7 @@ Use the downloaded profile to configure the remote access clients. The procedure
141141
1. Select the VPN client configuration files that correspond to the architecture of the Windows computer. For a 64-bit processor architecture, choose the 'VpnClientSetupAmd64' installer package. For a 32-bit processor architecture, choose the 'VpnClientSetupX86' installer package.
142142
2. Double-click the package to install it. If you see a SmartScreen popup, click More info, then Run anyway.
143143
3. On the client computer, navigate to Network Settings and click VPN. The VPN connection shows the name of the virtual network that it connects to.
144-
4. Before you attempt to connect, verify that you have installed a client certificate on the client computer. A client certificate is required for authentication when using the native Azure certificate authentication type. For more information about generating certificates, see [Generate Certificates](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-certificates-point-to-site). For information about how to install a client certificate, see Install a client certificate.
144+
4. Before you attempt to connect, verify that you have installed a client certificate on the client computer. A client certificate is required for authentication when using the native Azure certificate authentication type. For more information about generating certificates, see [Generate Certificates](certificates-point-to-site.md). For information about how to install a client certificate, see [Install a client certificate](../vpn-gateway/point-to-site-how-to-vpn-client-install-azure-cert.md).
145145

146146
## <a name="viewwan"></a>View your virtual WAN
147147

articles/vpn-gateway/vpn-gateway-howto-openvpn-clients.md

Lines changed: 2 additions & 143 deletions
Original file line numberDiff line numberDiff line change
@@ -12,154 +12,13 @@ ms.author: cherylmc
1212
---
1313
# Configure OpenVPN clients for Azure VPN Gateway
1414

15-
This article helps you configure **OpenVPN ® Protocol** clients.
15+
This article helps you configure **OpenVPN &reg; Protocol** clients.
1616

1717
## Before you begin
1818

19-
20-
2119
Verify that you have completed the steps to configure OpenVPN for your VPN gateway. For details, see [Configure OpenVPN for Azure VPN Gateway](vpn-gateway-howto-openvpn.md).
2220

23-
## <a name="windows"></a>Windows clients
24-
25-
1. Download and install the OpenVPN client (version 2.4 or higher) from the official [OpenVPN website](https://openvpn.net/index.php/open-source/downloads.html).
26-
2. Download the VPN profile for the gateway. This can be done from the Point-to-site configuration tab in the Azure portal, or 'New-AzVpnClientConfiguration' in PowerShell.
27-
3. Unzip the profile. Next, open the *vpnconfig.ovpn* configuration file from the OpenVPN folder using Notepad.
28-
4. [Export](vpn-gateway-certificates-point-to-site.md#clientexport) the P2S client certificate you created and uploaded to your P2S configuration on the gateway.
29-
5. Extract the private key and the base64 thumbprint from the *.pfx*. There are multiple ways to do this. Using OpenSSL on your machine is one way. The *profileinfo.txt* file contains the private key and the thumbprint for the CA and the Client certificate. Be sure to use the thumbprint of the client certificate.
30-
31-
```
32-
openssl pkcs12 -in "filename.pfx" -nodes -out "profileinfo.txt"
33-
```
34-
6. Open *profileinfo.txt* in Notepad. To get the thumbprint of the client (child) certificate, select the text (including and between)"-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" for the child certificate and copy it. You can identify the child certificate by looking at the subject=/ line.
35-
7. Switch to the *vpnconfig.ovpn* file you opened in Notepad from step 3. Find the section shown below and replace everything between "cert" and "/cert".
36-
37-
```
38-
# P2S client certificate
39-
# please fill this field with a PEM formatted cert
40-
<cert>
41-
$CLIENTCERTIFICATE
42-
</cert>
43-
```
44-
8. Open the *profileinfo.txt* in Notepad. To get the private key, select the text (including and between) "-----BEGIN PRIVATE KEY-----" and "-----END PRIVATE KEY-----" and copy it.
45-
9. Go back to the vpnconfig.ovpn file in Notepad and find this section. Paste the private key replacing everything between and "key" and "/key".
46-
47-
```
48-
# P2S client root certificate private key
49-
# please fill this field with a PEM formatted key
50-
<key>
51-
$PRIVATEKEY
52-
</key>
53-
```
54-
10. Do not change any other fields. Use the filled in configuration in client input to connect to the VPN.
55-
11. Copy the vpnconfig.ovpn file to C:\Program Files\OpenVPN\config folder.
56-
12. Right-click the OpenVPN icon in the system tray and click connect.
57-
58-
## <a name="mac"></a>Mac clients
59-
60-
1. Download and install an OpenVPN client, such as [TunnelBlick](https://tunnelblick.net/downloads.html).
61-
2. Download the VPN profile for the gateway. This can be done from the point-to-site configuration tab in the Azure portal, or by using 'New-AzVpnClientConfiguration' in PowerShell.
62-
3. Unzip the profile. Open the vpnconfig.ovpn configuration file from the OpenVPN folder in a text editor.
63-
4. Fill in the P2S client certificate section with the P2S client certificate public key in base64. In a PEM formatted certificate, you can simply open the .cer file and copy over the base64 key between the certificate headers. See [Export the public key](vpn-gateway-certificates-point-to-site.md#cer) for information about how to export a certificate to get the encoded public key.
64-
5. Fill in the private key section with the P2S client certificate private key in base64. See [Export your private key](https://openvpn.net/community-resources/how-to/#pki) for information about how to extract a private key.
65-
6. Do not change any other fields. Use the filled in configuration in client input to connect to the VPN.
66-
7. Double-click the profile file to create the profile in Tunnelblick.
67-
8. Launch Tunnelblick from the applications folder.
68-
9. Click on the Tunnelblick icon in the system tray and pick connect.
69-
70-
> [!IMPORTANT]
71-
>Only iOS 11.0 and above and MacOS 10.13 and above are supported with OpenVPN protocol.
72-
>
73-
## <a name="iOS"></a>iOS clients
74-
75-
1. Install the OpenVPN client (version 2.4 or higher) from the App store.
76-
2. Download the VPN profile for the gateway. This can be done from the point-to-site configuration tab in the Azure portal, or by using 'New-AzVpnClientConfiguration' in PowerShell.
77-
3. Unzip the profile. Open the vpnconfig.ovpn configuration file from the OpenVPN folder in a text editor.
78-
4. Fill in the P2S client certificate section with the P2S client certificate public key in base64. In a PEM formatted certificate, you can simply open the .cer file and copy over the base64 key between the certificate headers. See [Export the public key](vpn-gateway-certificates-point-to-site.md#cer) for information about how to export a certificate to get the encoded public key.
79-
5. Fill in the private key section with the P2S client certificate private key in base64. See [Export your private key](https://openvpn.net/community-resources/how-to/#pki) for information about how to extract a private key.
80-
6. Do not change any other fields.
81-
7. E-mail the profile file (.ovpn) to your email account that is configured in the mail app on your iPhone.
82-
8. Open the e-mail in the mail app on the iPhone, and tap the attached file
83-
84-
![Open email](./media/vpn-gateway-howto-openvpn-clients/ios2.png)
85-
86-
9. Tap on **More** if you do not see **Copy to OpenVPN** option
87-
88-
![Copy to OpenVPN](./media/vpn-gateway-howto-openvpn-clients/ios3.png)
89-
90-
10. Tap on **Copy to OpenVPN**
91-
92-
![Copy to OpenVPN](./media/vpn-gateway-howto-openvpn-clients/ios4.png)
93-
94-
11. Tap on **ADD** in the **Import Profile** page
95-
96-
![Copy to OpenVPN](./media/vpn-gateway-howto-openvpn-clients/ios5.png)
97-
98-
12. Tap on **ADD** in the **Imported Profile** page
99-
100-
![Copy to OpenVPN](./media/vpn-gateway-howto-openvpn-clients/ios6.png)
101-
102-
13. Launch the OpenVPN app and slide the switch in the **Profile** page right to connect
103-
104-
![Connect](./media/vpn-gateway-howto-openvpn-clients/ios8.png)
105-
106-
107-
## <a name="linux"></a>Linux clients
108-
109-
1. Open a new Terminal session. You can open a new session by pressing 'Ctrl + Alt + t' at the same time.
110-
2. Enter the following command to install needed components:
111-
112-
```
113-
sudo apt-get install openvpn
114-
sudo apt-get -y install network-manager-openvpn
115-
sudo service network-manager restart
116-
```
117-
3. Download the VPN profile for the gateway. This can be done from the Point-to-site configuration tab in the Azure portal.
118-
4. [Export](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-certificates-point-to-site#clientexport) the P2S client certificate you created and uploaded to your P2S configuration on the gateway.
119-
5. Extract the private key and the base64 thumbprint from the .pfx. There are multiple ways to do this. Using OpenSSL on your computer is one way.
120-
121-
```
122-
openssl.exe pkcs12 -in "filename.pfx" -nodes -out "profileinfo.txt"
123-
```
124-
The *profileinfo.txt* file will contain the private key and the thumbprint for the CA, and the Client certificate. Be sure to use the thumbprint of the client certificate.
125-
126-
6. Open *profileinfo.txt* in a text editor. To get the thumbprint of the client (child) certificate, select the text including and between "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" for the child certificate and copy it. You can identify the child certificate by looking at the subject=/ line.
127-
128-
7. Open the *vpnconfig.ovpn* file and find the section shown below. Replace everything between the and "cert" and "/cert".
129-
130-
```
131-
# P2S client certificate
132-
# please fill this field with a PEM formatted cert
133-
<cert>
134-
$CLIENTCERTIFICATE
135-
</cert>
136-
```
137-
8. Open the profileinfo.txt in a text editor. To get the private key, select the text including and between "-----BEGIN PRIVATE KEY-----" and "-----END PRIVATE KEY-----" and copy it.
138-
139-
9. Open the vpnconfig.ovpn file in a text editor and find this section. Paste the private key replacing everything between and "key" and "/key".
140-
141-
```
142-
# P2S client root certificate private key
143-
# please fill this field with a PEM formatted key
144-
<key>
145-
$PRIVATEKEY
146-
</key>
147-
```
148-
149-
10. Do not change any other fields. Use the filled in configuration in client input to connect to the VPN.
150-
11. To connect using the command line, type the following command:
151-
152-
```
153-
sudo openvpn –-config <name and path of your VPN profile file>&
154-
```
155-
12. To connect using the GUI, go to system settings.
156-
13. Click **+** to add a new VPN connection.
157-
14. Under **Add VPN**, pick **Import from file…**
158-
15. Browse to the profile file and double-click or pick **Open**.
159-
16. Click **Add** on the **Add VPN** window.
160-
161-
![Import from file](./media/vpn-gateway-howto-openvpn-clients/importfromfile.png)
162-
17. You can connect by turning the VPN **ON** on the **Network Settings** page, or under the network icon in the system tray.
21+
[!INCLUDE [configuration steps](../../includes/vpn-gateway-vwan-config-openvpn-clients.md)]
16322

16423
## Next steps
16524

0 commit comments

Comments
 (0)