From owner-freebsd-net@FreeBSD.ORG Mon Sep 15 16:46:22 2014 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C371C816 for ; Mon, 15 Sep 2014 16:46:22 +0000 (UTC) Received: from mail-lb0-f182.google.com (mail-lb0-f182.google.com [209.85.217.182]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B526DB8 for ; Mon, 15 Sep 2014 16:46:21 +0000 (UTC) Received: by mail-lb0-f182.google.com with SMTP id u10so1250616lbd.13 for ; Mon, 15 Sep 2014 09:46:13 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=txd29MSzVO/F1AMQy9ZmbIQ1O/ZtKDro95nQVysu0E0=; b=OK2UFaa4tktIIh6PlZ9t0M5ASUCsQFfPNpJ5DF8Nz7EBR/wwZxrgvyI3qO0sFSn2MB RmcJVVq+DPiH8Ev6dLrZVIEQh6Zar0sOlKqQtZuui0bvxSiGPl+QqoE6UOEeN+bSeam9 7xhUMPTYct8iU3dVu7kd9JpM/anVqsdG0gf7dVcjxeHxKKRysztIXtJqfsDX2rgK6SkG 0twJv5xaLC/mdZg/bUvi6TVhWMvARb/Rd9oDxTDOZlkHDNq8iXkqjKGIR3wSZDo5DcFN Cg2goAsdCby/BnENMUk+DmGLe2nZgeQ/6s9VdQXBtENyX2CmbdkbUl3Bpxzo/VodhKEs q4Fg== X-Gm-Message-State: ALoCoQnPYPYFjAsGrmp5PBKWaS67iLAyVs8vSuK/EStTNWqCJXZ7WEWmEfX5rcEbQS9KMY7y/O1F MIME-Version: 1.0 X-Received: by 10.112.52.225 with SMTP id w1mr28587177lbo.44.1410799243354; Mon, 15 Sep 2014 09:40:43 -0700 (PDT) Received: by 10.112.219.106 with HTTP; Mon, 15 Sep 2014 09:40:43 -0700 (PDT) In-Reply-To: <20140915160253.GA51285@in-addr.com> References: <54170619.4040508@FreeBSD.org> <20140915160253.GA51285@in-addr.com> Date: Mon, 15 Sep 2014 18:40:43 +0200 Message-ID: Subject: Re: Juniper Secure Access SSL VPN access from FreeBSD? From: Damien Fleuriot To: Gary Palmer Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.18-1 Cc: "freebsd-net@freebsd.org" , Lev Serebryakov X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 15 Sep 2014 16:46:22 -0000 Isn't the plugin closed-source ? If it is and you have no alternatives, you could try : 1/ install the linux compatibility framework to be able to run linux binaries 2/ install a user agent spoofer to trick the Juniper SA into thinking you're running linux 3/ log in to the SA, launches linux plugin, plugin uses the compatibility framework You might need to install a linux version of chrome or FF to get the plugin to work. On 15 September 2014 18:02, Gary Palmer wrote: > On Mon, Sep 15, 2014 at 07:30:33PM +0400, Lev Serebryakov wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA512 > > > > > > If I want to connect to my workstation at $work, I'm forced to use > > Juniper Secure Access SSL VPN + rdesktop. I connect to our office > > JunOS gateway with browser, and run RDesktop from it. But it requires > > to use supported OS (Windows / MacOS X / Linux), as tunnel is created > > via binary browser plugin. > > > > Is it possible to emulate this on FreeBSD? rdesktop from ports should > > work as client, as I access standard Windows system, but I need some > > way to emulate this VPN tunnel. Is it possible? > > Did you try any of the results from Google? Search for > "juniper ssl vpn open source" (without the quotes) seems to show up > some possibilities. > > Regards, > > Gary > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" >