-
Notifications
You must be signed in to change notification settings - Fork 747
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VPN: IPsec: Connections: Pools add IP4_DNS and IP6_DNS Configuration Payloads #6864
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@AdSchellevis This works, I'm not sure why though and if it was the right way to do it. :) |
It was unnecessary to create this Field since the existing NetworkField type works just fine.
@AdSchellevis |
fichtner
pushed a commit
that referenced
this pull request
Sep 27, 2023
AdSchellevis
pushed a commit
to opnsense/docs
that referenced
this pull request
Oct 15, 2023
* created ipsec-swanctl-rw-ikev2-eap-mschapv2.rst * Update vpnet.rst Changed the position of Legacy and New > 23.1 Added how-tos/ipsec-swanctl-rw-ikev2-eap-mschapv2 to doctree in New > 23.1 * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst General structure of How-To added * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst Populated Prerequisites * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst Populated IPsec connection settings for roadwarriors * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst Fixed IP address formatting in pools * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst * ipsec-swst Version completedanctl-rw-ikev2-eap-mschapv2.rst - Fir * Update vpnet.rst - Switched Positions for client config * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst - Version 1.0 * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst - Added DNS configuration payload information to pools and clients opnsense/core#6864 - Added hint that ncp client is not affiliated with Deciso B.V. * Update ipsec-swanctl-rw-ikev2-eap-mschapv2.rst - Added Routing hint for Windows RAS Client in Split Tunneling mode.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
#6860
Small explanation what I did:
Local addresses
did it, because I needed the same behavior.IKEAdressField.php
which almost did what I needed, and copied it toPoolsDNSField.php
and changed it a little so it only accepts IP Addresses.pools.dns
todialogPool.xml
to accept the new DNS inputs in the WEB GUI.<dns type=".\PoolsDNSField"/>
to the<Pools>
definition ofSwanctl.xml
At that point it just worked as expected, I can add multiple IPv4 and IPv6 addresses into each individual pool and they get saved as array in the swanctl.conf. On connection, they're pushed to the client as IKE configuration payload.
Screenshots: