Hi All,
I'm testing MOBIKE feature with CISCO GW and strongswan client. Please find
below the test set-up details.
Strongswan-->CISCO GW
85.1.96.13385.1.96.205
85.1.96.159
I've configured two interfaces on the client side in the 85 VLAN and
testing the
Hi Michael,
> I'm trying to configure StrongSwan on a Linux platform that has three
> interfaces (for simplicity, I'll call them a, b, and c). I only want to
> do IPsec on interface a and I want interfaces b and c to be unaffected.
> In the strongswan.conf file I added the line interfaces_ignore
Hi Brian,
> Fred : EAP "1234567"
>
> fred : XAUTH "deadbeef1234567"
>
> Please note the different capitalisation of the letter f for the two
> different
> usernames.
Matching these identities is not case sensitive (simple names are parsed
as FQDN). So both secrets can be used by both
I have the XAuth EAP Plugin enabled in my IPsec VPN responder, along
with a number of eap plugins. I did not build this version of strongSwan
(5.2.1) but downloaded it from a Raspberry Pi repository.
My /etc/ipsec.secrets file contains entries similar to:
Fred : EAP "1234567"
fred :