Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create a GUI-Element to control stongswans reuse_ikesa option #3990

Closed
JuergenGarbe-GH opened this issue Mar 18, 2020 · 2 comments
Closed

Create a GUI-Element to control stongswans reuse_ikesa option #3990

JuergenGarbe-GH opened this issue Mar 18, 2020 · 2 comments
Labels
help wanted Contributor missing / timeout

Comments

@JuergenGarbe-GH
Copy link

Related and tested OPNsense version: 20.1 (production).
As descriped in https://forum.opnsense.org/index.php?topic=16218.new;topicseen#new
there is an issue trying to connect to an ASA 5540 using IPSec with more than 1 Phase 2 definitions.
This issue can be solved by setting strongswans option "reuse_ikesa=no".
In the test case that was done by creating a file /usr/local/etc/strongswan.opnsense.d/noreuse_ikesa.conf with a line
charon { reuse_ikesa=no }
and restarting ipsec.
Because I was not the only one who had this problem (which was my luck: I got this solution offered!), I think it would be a good idea to create a GUI Element to be able to enable or disable the "reuse_ikesa" option.

@fichtner fichtner self-assigned this Mar 18, 2020
@fichtner fichtner added the feature Adding new functionality label Mar 18, 2020
@fichtner fichtner added this to the 20.7 milestone Mar 18, 2020
@fichtner fichtner modified the milestones: 20.7, 21.1 Jul 30, 2020
@fichtner fichtner removed their assignment Jan 10, 2021
@fichtner fichtner added help wanted Contributor missing / timeout and removed feature Adding new functionality labels Jan 10, 2021
@fichtner fichtner removed this from the 21.1 milestone Jan 10, 2021
@OPNsense-bot
Copy link

This issue has been automatically timed-out (after 180 days of inactivity).

For more information about the policies for this repository,
please read https://github.com/opnsense/core/blob/master/CONTRIBUTING.md for further details.

If someone wants to step up and work on this issue,
just let us know, so we can reopen the issue and assign an owner to it.

@oyvellef
Copy link

oyvellef commented Jul 8, 2024

Still an issue that is very hard to troubleshoot, Palo Alto firewalls need this setting for IPSec tunnels to be stable and rekey without downtime.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Contributor missing / timeout
Development

No branches or pull requests

4 participants