Closed mimugmail closed 7 years ago
I think this check dates back to IKEv1, it should not apply to IKEv2?
hrm, can you try this as multi-phase 2, but on phase 1 set: Tunnelisolation
Tunnelisolation would work, but you need to separate the conf in P1 with a unique identifier. Otherwise every spoke must have the same PSK (like it was with IKEv1)
With this approach you can set a different PSK for every connection
I was just trying to get out of the work... ;)
I think we should only reject if this is IKEv1.
The trick here is when you have 0.0.0.0 as remote gateway you can have multiple backup lines with a tracking setup. In my lab here I have a leased line with static IP, a ADSL with dynamic IP and a LTE fallback. So no matter when leased and ADSL fails it switches to LTE and you have around 10 pings lost (already tested here with cheap cisco spokes)
@fichtner Thanks! Really, this would enable OPN to do real enterprise VPN. I already run setups like this with Cisco ASA, 100 site-2-sites and automatic failovers.
# opnsense-patch 738f998
Wonderful!
That's why I love this project so much 👍
splendid, thanks for pushing forward! :)
Thank you for implementing this feature. I just had a need for the same thing when moving from a Watchguard firewall.
However, I could only find this info by Googling my way to this GitHub issue. Could this perhaps be documented somewhere in the user interface?
For reference, here's a screenshot of the IKEv2 remote gateway setting from a Watchguard firewall:
Is it possible that the feature will be implemented for IKEv1 as well?
Hi,
I'm trying to replace a huge hub and spoke network based on Cisco, IKEv2, endpoints with dynamic IPs. With Cisco I create a dynamic crypto map and then multiple connections differentiated by FQDN.
Within OPN I can do this when remote gateway is set to 0.0.0.0 and the via the FQDN the correct config is chosen. The problem I have is, that when I duplicate P1, edit the FQDN to a different type I'm getting an error that the remote IP is already in used:
https://github.com/opnsense/core/blob/master/src/www/vpn_ipsec_phase1.php#L235
Is there a way to extend this check with some !isset remoteip 0.0.0.0?
I duplicated the conn /usr/local/etc/ipsec.conf and restarted ipsec by hand. It works great so far: