mirror of
https://git.sr.ht/~rouven/nixos-config
synced 2025-04-25 16:08:30 +02:00
remove openconnect configurations
This commit is contained in:
parent
5d94104678
commit
1d50fdc0e2
3 changed files with 1 additions and 49 deletions
|
@ -1,13 +1,11 @@
|
|||
{ config, pkgs, lib, ... }:
|
||||
{
|
||||
age.secrets = {
|
||||
tud.file = ../../../../secrets/thinkpad/tud.age;
|
||||
agdsn.file = ../../../../secrets/thinkpad/agdsn.age;
|
||||
dyport-auth = {
|
||||
file = ../../../../secrets/thinkpad/dyport-auth.age;
|
||||
};
|
||||
};
|
||||
programs.openvpn3.enable = true;
|
||||
networking = {
|
||||
supplicant = {
|
||||
"LAN" = {
|
||||
|
@ -100,47 +98,11 @@
|
|||
extraConfig = "disabled=1";
|
||||
};
|
||||
};
|
||||
openconnect.interfaces = {
|
||||
TUD-A-Tunnel = {
|
||||
# apparently device names have a character limit
|
||||
protocol = "anyconnect";
|
||||
gateway = "vpn2.zih.tu-dresden.de";
|
||||
user = "rose159e@tu-dresden.de";
|
||||
passwordFile = config.age.secrets.tud.path;
|
||||
autoStart = false;
|
||||
extraOptions = {
|
||||
authgroup = "A-Tunnel-TU-Networks";
|
||||
compression = "stateless";
|
||||
};
|
||||
};
|
||||
TUD-C-Tunnel = {
|
||||
protocol = "anyconnect";
|
||||
gateway = "vpn2.zih.tu-dresden.de";
|
||||
user = "rose159e@tu-dresden.de";
|
||||
passwordFile = config.age.secrets.tud.path;
|
||||
autoStart = false;
|
||||
extraOptions = {
|
||||
authgroup = "C-Tunnel-All-Networks";
|
||||
compression = "stateless";
|
||||
};
|
||||
};
|
||||
ZIH = {
|
||||
protocol = "anyconnect";
|
||||
gateway = "vpn2.zih.tu-dresden.de";
|
||||
user = "rose159e@zih-ma-vpn";
|
||||
passwordFile = config.age.secrets.tud.path;
|
||||
autoStart = false;
|
||||
extraOptions = {
|
||||
authgroup = "A-Tunnel-TU-Networks";
|
||||
compression = "stateless";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
systemd.services = {
|
||||
openfortivpn-agdsn = {
|
||||
description = "AG DSN Fortinet VPN";
|
||||
script = "${pkgs.openfortivpn}/bin/openfortivpn vpn.agdsn.de:443 --realm admin-vpn -u r5 -p $(cat $CREDENTIALS_DIRECTORY/password) --trusted-cert 2edda9c8797e09af039bbefeb083a9238c353cbc913210ad8a4f737820c35a91";
|
||||
script = "${pkgs.openfortivpn}/bin/openfortivpn vpn.agdsn.de:443 --realm admin-vpn -u r5 -p $(cat $CREDENTIALS_DIRECTORY/password) --trusted-cert 82ed105286f02f4308f3c525a4034caed6cb738c3336f0f1da52421d419c87a9";
|
||||
requires = [ "network-online.target" ];
|
||||
after = [ "network.target" "network-online.target" ];
|
||||
serviceConfig = {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue