-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature request] VPN IPsec Mobile Clients: Radius: Assign specific virtual IP range to users in specific groups #3295
Comments
|
Currently this only works with OpenVPN. For IPSec you can only use one Pool / Policy. |
|
The above config example will create three policies (three phase 1 with four phase 2). So yes, one virtual IP pool (rightsourceip) per policy. Maybe the output of ipsec statusall makes it a little bit clearer... (redacted...) |
|
When you search the closed issues you will find one of me asking the same. There are some problems when mixing auth types. I know it's technically easy to implement via CLI but quite a lot of rewrite for the UI part. |
Very true! That is why I wanted to suggest a "Advanced Configuration" Text Box. I am sure that my requirement is very specific and not worth implementing/maintaining it in the GUI. But currently any reconfiguration/restart of the IPsec will break my configuration from the command line and I have no backup/version management of it. That is why I was asking if a PR for a "Advanced Configuration" Text Box would stand a chance. |
|
So we created a PR for that then... |
|
So this actually works for us. It is not as nice as PR #3298 since there is no config backup and no config sync to the HA backup system. |
|
This issue has been automatically timed-out (after 180 days of inactivity). For more information about the policies for this repository, If someone wants to step up and work on this issue, |
|
Since 23.1 swanctl.conf is used and ipsec.conf has been abolished. @AdSchellevis Any chance a PR for this would be accepted? |
|
@stumbaumr if it's not too large, I'm certainly willing to take a look. is there any downside in always adding "class_group = yes" in strongswan? |
|
Just remembered there was this "Synchronize groups" checkbox in the Radius server setup - I would base it on that. |
|
To get class_group working this needs to be added: It looks like |
|
So here is the PR for this... #6826 I left the fix for #6824 out of it since @AdSchellevis assigned it to himself already... |
|
@stumbaumr It was total coincidence that I was led on the same path with the eap_id. Hope it didn't complicate things for you. |
|
@Monviech At least it puts more eyes on the issue and hopefully speeds up the resolution... |
|
@AdSchellevis , do I need to reopen this issue so the PR #6826 related to it is not forgotten? I see no option here in the issue to reopen it - should I create a new issue? |
|
@stumbaumr this this wasn't closed because of a shipped feature I've reopened and tagged it accordingly |
|
@stumbaumr a variation of your request has been merged in 928d2f8. thanks! |
|
@AdSchellevis It looks like you are not adding the selected group into the remote section. So the first available section is assigned to every user... which in my case is the admin group... bummer... Parameter groups is missing there... compare with #3295 (comment) |
|
ok, I do seem to inject the wrong payload (gid), but on my end there certainly is something when selected. |
|
Ok, I think I found the mistake - I applied just the patch to the current 23.7.9 - obviously there is a lot missing to the 24.1 ... |
|
Might just be af46866 which came in after the fact :) |
|
So I installed the development version on a test system today and tested it. Seems all ok! Thanks so much!!! |
Is your feature request related to a problem? Please describe.
I would like to assign IPsec mobile users into separate virtual IP pools. I require this to allow/prohibit access to users in certain groups to specific network resources.
Example: Three groups (Admins, Developers, Users) have separate virtual IP pools. These network ranges are then used in firewall rules on the current IPsec peer or even on another firewall behind a IPsec tunnel in a different location.
The groups and users are configured on a remote Radius server.
Describe the solution you'd like
I would like to use the "Group Selection" feature described here:
https://wiki.strongswan.org/projects/strongswan/wiki/EAPRadius
I understand that this is a very specific setup. So maybe it would be best to have a text field "Advanced Configuration" where the content is saved into
/usr/local/etc/ipsec.advanced.confand aninclude ipsec.advanced.confstatement in ipsec.conf. Almost same as OpenVPN has it.For strongswan.conf the only requirement is to add
class_group = yesto the eap-radius section. It seems it does not hurt in case it is set and no class is passed back from the Radius server.Describe alternatives you've considered
As far as I understand there is currently no functionality that allows users to be assigned into specific virtual IP ranges.
And from my searches it seems I am not the first person to ask.
Here is my tested configuration I would like in ipsec.advanced.conf
Do you think there is a chance of a PR for this being accepted?
The text was updated successfully, but these errors were encountered: