Integrate OpenVPN with Google SSO

Integrating OpenVPN with Google Single Sign-On (SSO) streamlines user authentication and access management processes, enhancing security and user experience. By leveraging Google as the identity provider, users can log in to OpenVPN using their Google credentials, eliminating the need for separate usernames and passwords Prerequisites Create LDAP Client Download the certificate. Install package dependencies Install…

Continue readingIntegrate OpenVPN with Google SSO

How to enable Change Configuration Notification on Oxidized

Goal : We have diff config notification if there are config changes on network devices Requirements: msmtp msmtp-mta ansi2html oxidized script Package Installation pip install ansi2html apt-get install colordiff msmtp msmtp-mta -y Put the script below, it will automatically create oxidized-report-git-commits in folder /opt/oxidized chmod +x /opt/oxidized/oxidized-report-git-commits The part of configuration which will send via…

Continue readingHow to enable Change Configuration Notification on Oxidized

Site to Site VPN IPSec Between GCP and Juniper SRX

The following scenario IPSec Tunnel Between GCP Cloud VPN to Juniper SRX Create VPN Connections -> Classic VPN No need to configure parameter phase 1 & phase 2, because cloud VPN auto-negotiates the connection as long as the peer side uses a supported IKE cipher setting. Check documentation The following Juniper SRX Configuration Create interface:…

Continue readingSite to Site VPN IPSec Between GCP and Juniper SRX

Tacacs+ configuration on Linux Debian

The first step in setting up this new TACACS+ server will be to acquire the software from the repositories : root@debian-tacacs:~# apt-get install tacacs+ -y This file is where all the TACACS specifications should reside (user permissions, access control lists, host keys, etc). The first thing that needs to be created is a key for…

Continue readingTacacs+ configuration on Linux Debian