On 22.11.2016 01:41, Alexander Hill wrote:
> Is there any way of achieving this?
Nope. Credentials are invariable connected to the ID they authenticate the peer
for.
--
Mit freundlichen Grüßen/Kind Regards,
Noel Kuntze
GPG Key ID: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839
Hi list,
I have many effectively identical roadwarrior clients being assigned
dynamic virtual IPs. What I'd like is to have clients use the same
certificate/key, but identify themselves differently (e.g. by their
hostname). Essentially I just want each client to be able to give itself an
I am trying to setup a IkeV2 VPN connection between a StrongSWAN 5.3.5
system and a Dell Sonicwall. In doing so, it seems like the strongswan side
sees the connection as up but sonicwall side does not. Furthermore, the
statusall output shows what looks like a second connection/tunnel trying to
be
2016-11-21 11:10 GMT+01:00 John Brown :
>
>
> 2016-11-21 11:03 GMT+01:00 Tobias Brunner :
>
>> Hi John,
>>
>> > ip address add dev lo 10.2.3.4/32
>> > ...
>> > Nov 17 10:56:43 127 daemon.info charon: 16[KNL] no local address found
>> in traffic
2016-11-21 11:03 GMT+01:00 Tobias Brunner :
> Hi John,
>
> > ip address add dev lo 10.2.3.4/32
> > ...
> > Nov 17 10:56:43 127 daemon.info charon: 16[KNL] no local address found
> in traffic selector 10.2.3.4/32
> > ...
> > I'm using: Linux strongSwan U4.5.2/K3.4.113
>
>
Hi John,
> ip address add dev lo 10.2.3.4/32
> ...
> Nov 17 10:56:43 127 daemon.info charon: 16[KNL] no local address found in
> traffic selector 10.2.3.4/32
> ...
> I'm using: Linux strongSwan U4.5.2/K3.4.113
That's really old. Back then loopback interfaces were not considered.
You need at