diff --git a/docs/howitallworks.md b/docs/howitallworks.md index 4fb1a2cd..3be492d7 100644 --- a/docs/howitallworks.md +++ b/docs/howitallworks.md @@ -599,7 +599,7 @@ Choose your method: systemctl restart tacticalagent.service ``` -=== ":material-mdiApple: Mac" +=== ":material-apple: Mac" In terminal window: diff --git a/docs/images/2023-08-22-00-25-13.png b/docs/images/2023-08-22-00-25-13.png new file mode 100644 index 00000000..a1b04f13 Binary files /dev/null and b/docs/images/2023-08-22-00-25-13.png differ diff --git a/docs/install_agent.md b/docs/install_agent.md index c68faa00..f7c4c834 100644 --- a/docs/install_agent.md +++ b/docs/install_agent.md @@ -152,9 +152,17 @@ If you want to deploy the TRMM agent using AD, Intune, Mesh, TeamViewer, Group P You can always use this to silently uninstall the agent on workstations: -```cmd -"C:\Program Files\TacticalAgent\unins000.exe" /VERYSILENT -``` +Choose your method: + +=== ":material-console-line: Windows Automatically" + + ```cmd + "C:\Program Files\TacticalAgent\unins000.exe" /VERYSILENT + ``` + +=== ":material-apple: Mac" + + Run: ## Reinstalling Mesh and Reconnecting to TRMM diff --git a/docs/unsupported_proxies.md b/docs/unsupported_proxies.md index d6e1e350..185c485f 100644 --- a/docs/unsupported_proxies.md +++ b/docs/unsupported_proxies.md @@ -787,15 +787,17 @@ See **Note:** Wildcard SSL certs are not supported with MeshCentral. You will need an independent certificate for mesh.{domain} - -Then connect in SSH to your TRMM server to modify the Nginx config of Mesh: +![](images/2023-08-22-00-25-13.png) -```bash -nano /meshcentral/meshcentral-data/config.json -``` +Last thing you have to do, is setup the same certs on NPM and TRMM. -Then modify in this file the `TlsOffload` field to put the local IP address of your NPM, then also modify the `CertUrl` field to put the IP address of your NPM and the port that goes with it. +TRMM cert location: `/etc/letsencrypt/live/{yourdomain}/` -**Note:** The optional `_trustedproxy` setting to CloudFlare is enabled to support their proxy service. +NPM cert location: SSL Certificates tab -``` -{ -"settings": { -"Cert": "${meshdomain}", -"MongoDb": "mongodb://127.0.0.1:27017", -"MongoDbName": "meshcentral", -"WANonly": true, -"Minify": 1, -"Port": 4430, -"AliasPort": 443, -"RedirPort": 800, -"AllowLoginToken": true, -"AllowFraming": true, -"_AgentPing": 60, -"AgentPong": 300, -"AllowHighQualityDesktop": true, -"TlsOffload": "{NPM LAN IP},127.0.0.1,::1", -"_trustedproxy": "CloudFlare", -"agentCoreDump": false, -"Compression": true, -"WsCompression": true, -"AgentWsCompression": true, -"MaxInvalidLogin": { "time": 5, "count": 5, "coolofftime": 30 } -}, -"domains": { -"": { -"Title": "Tactical RMM", -"Title2": "Tactical RMM", -"NewAccounts": false, -"CertUrl": "https://{NPM LAN IP}:443", -"GeoLocation": true, -"CookieIpCheck": false, -"mstsc": true -} -} -} -``` - -Then restart your Mesh: - -```bash -systemctl restart meshcentral.service -``` - -Open TCP port 4430 if using UFW: - -```bash -ufw allow 4430/tcp -ufw reload -``` +Either: Setup SSL certs on NPM (optionally using Cloudflare API). Download and copy certs to TRMM. Then run `./update.sh --force` -At which point agents should be working. Use the "Recover Connection" button if necessary. +OR: Run standard TRMM cert renew process using certbot. Then copy the files and upload: Certificate Key (`privkey.pem`), Certificate (`cert.pem`), and Intermediate Certificate (`chain.pem`) ## Synology NAS Reverse Proxy Portal