Quote from: chemlud on February 11, 2021, 06:19:52 PM
Do your LAN rules on both sides allow traffic to the respective remote LANs?
Uploaded my complete config in screenshots
Server:
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: chemlud on February 11, 2021, 06:19:52 PM
Do your LAN rules on both sides allow traffic to the respective remote LANs?
Quote from: tsgan on December 11, 2020, 12:09:03 PM
OPNsense on NanoPI R4S
Quote from: mimugmail on September 28, 2019, 02:37:26 PM
You add a second Phase2, left wanip/32, right remote subnet
Quote from: mimugmail on September 27, 2019, 10:02:59 PM
Add WAN IP to a second Phase2 :)
Quote from: franco on January 10, 2019, 04:13:38 PM
#ping -S LANIP LDAPIP
Cheers,
Franco
Quote from: SpawnY on January 05, 2019, 12:20:27 PM
+1 for put the auth in the gui!
but i have the same problem as akron.
After i fill the auth forms correct i just get an{"message":"Basic auth failed"}
Did you find a solution akron?
Cheers Chris
Quote from: fraenki on November 11, 2018, 06:34:44 PM
For future reference: os-haproxy 2.10 (available in the upcoming OPNsense 18.7.8 ) finally adds support for HTTP Basic Auth.
See https://github.com/opnsense/plugins/pull/970#issuecomment-437688137
Quote from: qinohe on June 27, 2018, 01:33:37 PM
Hey akron, what @fabian says, and a question: did you check the certificate with another connection, did that work?
My guess, there's something wrong with the crt.
Btw. I simply pushed the crt. to the store and that was it, no CA (need to set that up in spare time, heck, I may use Opnsense for that :P)
Greetings mark
Quote from: fabian on June 26, 2018, 10:40:09 PM
Very likely another certificate validation error. I would check host name and time range of the certificate but I don't know this code.
Quote from: qinohe on June 24, 2018, 06:11:58 PM
Hey fabian, thanks for the clear answer.
Your first Q. :yes using self signed cert. for my server, all is a localdomain.
Next: what say the logs:config[23141]: {"url":"https:\/\/cloud.localdomain\/nextcloud\/remote.php\/dav\/files\/backer\/","content_type":null,"http_code":0,"header_size":0,"request_size":0,"filetime":-1,"ssl_verify_result":18,"redirect_count":0,"total_time":0.164199,"namelookup_time":0.004971,"connect_time":0.005542,"pretransfer_time":0,"size_upload":0,"size_download":0,"speed_download":0,"speed_upload":0,"download_content_length":-1,"upload_content_length":-1,"starttransfer_time":0,"redirect_time":0,"redirect_url":"","primary_ip":"10.10.100.6","certinfo":[],"primary_port":443,"local_ip":"10.10.100.1","local_port":42812}
Than: no hehe I did not forget the 's' :PI click on it from another webpageI don't know what I was thinking here, I don't do that, just the address
I allraedy 'knew' app password should be okay with 2fa but still tested I, wanted to be sure that was not an issue when I post here, thanks.