-
Notifications
You must be signed in to change notification settings - Fork 909
Description
Important notices
Before you add a new report, we ask you kindly to acknowledge the following:
- [Y] I have read the contributing guide lines at https://github.com/opnsense/core/blob/master/CONTRIBUTING.md
- [Y] I am convinced that my issue is new after having checked both open and closed issues at https://github.com/opnsense/core/issues?q=is%3Aissue
Is your feature request related to a problem? Please describe.
A clear and concise description of what the problem is including your motivation for the request,
i.e. "For the purpose of [...] I am missing a solution that will [...]."
Opnsense currently uses Strongswan as it's IKEv2 VPN provider, which supports the IKEv2 fragmentation feature (RFC 7383) via the 'fragmentation = yes' configuration directive in swanctl.conf, however this is not implemented in the UI. IKEv2 fragmentation is an important feature to overcome MTU issues caused by additional ESP encapsulation overheads when using IPSec.
Describe the solution you like
A clear and concise description of what you want to happen.
(e.g. I would like an input field in the /ui/firewall/alias which would add .... to ....)
Implement the Strongswan IKEv2 fragmentation feature in the UI. Currently fragmentation is working if we add "fragmentation = yes" to the connection properties in /usr/local/etc/swanctl/swanctl.conf but it is overwritten on upgrade and if the connection properties are changed from the UI.
Describe alternatives you considered
A clear and concise description of any alternative solutions or features you considered.
Manual configuration, via cronjob etc to keep the configuration persistent.
Additional context
Add any other context or screenshots about the feature request here or links to relevant forum thread or similar