Create a self-signed CA, set up group configs, add script to allow new connections through the firewall. In the base debian role, drop the default nftables forward chain with drop policy because it clashes with this. If you enable forwarding on a debian host, make sure to configure the firewall.
		
			
				
	
	
		
			11 lines
		
	
	
	
		
			444 B
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			11 lines
		
	
	
	
		
			444 B
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| Install and configure ocserv with a script to configure nftables on (dis)connection.
 | |
| 
 | |
| Create a self‐signed CA authority for issuing user certificates. User and group are read from the CN and OU certificate subject fields, respectively. To configure VPN groups, define the variable `vpn` as follows:
 | |
| 
 | |
|     "vpn": {
 | |
|         "network": "<VPN network>"
 | |
|         "routes": {
 | |
|             "<group>": [ "<route>", … ]
 | |
|             …
 | |
|         }
 | |
|     }
 |