Issue #979
Windows 7+ / Windows Phone RWs with statically assigned IPs
Description
I'm trying to add Windows7+ / Windows Phone Road Warriors with user certificates to our working Strongswan-5.3.0 config (site-to-site tunnels and IOS RWs).
Following your HOWTO https://wiki.strongswan.org/projects/strongswan/wiki/Windows7, tests succeeded with this configuration snippet:
#-----------------------------------------------------------------------------------------------
conn wnp10.1.1.22
keyexchange=ikev2
rightsourceip=10.1.1.22
rightdns=10.1.0.6
leftsubnet=0.0.0.0/0
rightauth=eap-tls
rightsendcert=never
eap_identity="/C=DE/ST=Bremen/L=Bremen/O=BREKOM GmbH/OU=SE/CN=Name1/E=name1@brekom.de"
leftauth=pubkey
leftcert="/etc/ipsec.d/private/gwcert.pem"
auto=add
#-----------------------------------------------------------------------------------------------
This works with a single Windows/Windows Phone Road warrior.
Extending this scheme using identities and statically assigned IPs, I added more RWs:
#-----------------------------------------------------------------------------------------------
conn wnp10.1.1.23
keyexchange=ikev2
rightsourceip=10.1.1.23
rightdns=10.1.0.6
leftsubnet=0.0.0.0/0
rightauth=eap-tls
rightsendcert=never
eap_identity="/C=DE/ST=Bremen/L=Bremen/O=BREKOM GmbH/OU=SE/CN=Name2/E=name2@brekom.de"
leftauth=pubkey
leftcert="/etc/ipsec.d/private/gwcert.pem"
auto=add
#-----------------------------------------------------------------------------------------------
conn wnp10.1.1.24
keyexchange=ikev2
rightsourceip=10.1.1.24
rightdns=10.1.0.6
leftsubnet=0.0.0.0/0
rightauth=eap-tls
rightsendcert=never
eap_identity="/C=DE/ST=Bremen/L=Bremen/O=BREKOM GmbH/OU=SE/CN=Name3/E=name3@brekom.de"
leftauth=pubkey
leftcert="/etc/ipsec.d/private/gwcert.pem"
auto=add
#-----------------------------------------------------------------------------------------------
This is basically the scheme which works for IOS RWs (with IKEv1), but with IKEv2 using EAP-TLS, only one of the configured RWs (possibly the last added) can successfully connect.
The handling of EAP-TLS authentication seems to work completely different from IKE/RSA, as with EAP a matching config is chosen and if the identity doesn't match, no other configs are tried, correct?
I'm seeking for options, which allow multiple, explicitly named RWs with statically assigned IPs. Would EAP-Dynamic help in this case or do I have to use EAP-RADIUS (which makes a RADIUS server necessary)?
Thanks in advance
Sebastian Pfeiffer
Related issues
History
#1 Updated by Tobias Brunner over 10 years ago
- Is duplicate of Issue #628: Windows Phone 8.1 - Certificate Pattern Matching added
#2 Updated by Tobias Brunner about 10 years ago
- Status changed from New to Closed
- Resolution set to Duplicate