Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ipsec: what to do with the mobile peer id #2070

Closed
fichtner opened this issue Jan 9, 2018 · 4 comments
Closed

ipsec: what to do with the mobile peer id #2070

fichtner opened this issue Jan 9, 2018 · 4 comments
Assignees
Labels
cleanup Low impact changes
Milestone

Comments

@fichtner
Copy link
Member

fichtner commented Jan 9, 2018

0dd120

via: https://forum.opnsense.org/index.php?topic=6194.0

@fichtner fichtner added the cleanup Low impact changes label Jan 9, 2018
@fichtner fichtner added this to the 18.1 milestone Jan 9, 2018
@fichtner fichtner self-assigned this Jan 9, 2018
@mimugmail
Copy link
Member

Is this only a ike v1 issue? One of the apprentices told me to be bored so I'll set up a test environment.

I also had struggles months ago troubleshooting Mac integrated client .. so this might bei the issue I had too

@fichtner
Copy link
Member Author

fichtner commented Jan 9, 2018

could be. although for macOS I do not recommend v1 at all.

@fichtner fichtner modified the milestones: 18.1, 18.7 Jan 15, 2018
@fichtner fichtner removed this from the 18.7 milestone Feb 27, 2018
@fichtner fichtner added this to the 18.7 milestone Apr 1, 2018
@fichtner
Copy link
Member Author

I'm closing this, again, due to lack of feedback.

@wh0else
Copy link

wh0else commented Nov 10, 2019

Any update on this? IPsec/IKEv2 road warrior VPN with EAP-TLS/Mutual RSA seems to need mobile peer id, at least on clients such as macOS and iOS.
Working in pfSense, as the setting is there

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cleanup Low impact changes
Development

No branches or pull requests

3 participants