mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2025-06-28 11:55:08 +03:00
spelling: function
This commit is contained in:
parent
a452469738
commit
37ff2ecf84
@ -102,7 +102,7 @@ Added the compatibility with Cisco 800 series routers (e.g. Cisco 841M) on the L
|
|||||||
|
|
||||||
Added the support the compatibility to YAMAHA RTX series routers on the L2TPv3 over IPsec protocol.
|
Added the support the compatibility to YAMAHA RTX series routers on the L2TPv3 over IPsec protocol.
|
||||||
|
|
||||||
Added the support for EAP and PEAP. SoftEther VPN Server can now speak RFC3579 (EAP) or Protected EAP (PEAP) to request user authentications to the RADIUS server with the MS-CHAPv2 mechanism. If this function is enabled, all requests from L2TP VPN clients which contain MS-CHAPv2 authentication data will be converted automatically to EAP or PEAP when it is transferred to the RADIUS server. You must enable this function manually for each of Virtual Hubs. To enable the function converting from MS-CHAPv2 to EAP, set the "RadiusConvertAllMsChapv2AuthRequestToEap" value to "true" in the vpn_server.config. To enable the functin converting from MS-CHAPv2 to PEAP, set both "RadiusConvertAllMsChapv2AuthRequestToEap" and "RadiusUsePeapInsteadOfEap" options to "true".
|
Added the support for EAP and PEAP. SoftEther VPN Server can now speak RFC3579 (EAP) or Protected EAP (PEAP) to request user authentications to the RADIUS server with the MS-CHAPv2 mechanism. If this function is enabled, all requests from L2TP VPN clients which contain MS-CHAPv2 authentication data will be converted automatically to EAP or PEAP when it is transferred to the RADIUS server. You must enable this function manually for each of Virtual Hubs. To enable the function converting from MS-CHAPv2 to EAP, set the "RadiusConvertAllMsChapv2AuthRequestToEap" value to "true" in the vpn_server.config. To enable the function converting from MS-CHAPv2 to PEAP, set both "RadiusConvertAllMsChapv2AuthRequestToEap" and "RadiusUsePeapInsteadOfEap" options to "true".
|
||||||
|
|
||||||
SoftEther VPN 4.19 Build 9578 Beta (September 15, 2015)
|
SoftEther VPN 4.19 Build 9578 Beta (September 15, 2015)
|
||||||
Solved the problem that kernel mode drivers do not pass the general tests of "Driver Verifier Manager" in Windows 10.
|
Solved the problem that kernel mode drivers do not pass the general tests of "Driver Verifier Manager" in Windows 10.
|
||||||
|
@ -3320,7 +3320,7 @@ PREFIX D_SM_MSG
|
|||||||
CAPTION Set the Message
|
CAPTION Set the Message
|
||||||
S_MSG_2 You can set a message to display on the screen of a user when a VPN Client connects to the Virtual Hub "%S". To show a message, input the message that you want to show.
|
S_MSG_2 You can set a message to display on the screen of a user when a VPN Client connects to the Virtual Hub "%S". To show a message, input the message that you want to show.
|
||||||
C_USEMSG Show &Message
|
C_USEMSG Show &Message
|
||||||
STATIC1 About the Message Display Funcion
|
STATIC1 About the Message Display Function
|
||||||
S_INFO The VPN Client must be Version 3.0 or later.\r\n\r\nSpecify a single line starts with "http://" as the message to open the default Web browser on the client instead to showing a message.
|
S_INFO The VPN Client must be Version 3.0 or later.\r\n\r\nSpecify a single line starts with "http://" as the message to open the default Web browser on the client instead to showing a message.
|
||||||
IDOK &OK
|
IDOK &OK
|
||||||
IDCANCEL Cancel
|
IDCANCEL Cancel
|
||||||
|
Loading…
Reference in New Issue
Block a user