On 09/04/2026, Tobias Heider wrote:
> On Thu, Apr 09, 2026 at 12:20:05AM +0300, Alex Mihajlov wrote:
> > On 08/04/2026, Tobias Heider wrote:
> > > 
> You can simply put multiple ikev2 blocks into your server iked.conf.
> It could look sth like:
> 
> user 'user' 'password'
> ikev2 'responder_eap' passive esp \
>         from any to dynamic \
>         local X.X.X.X peer any \
>         srcid server1-eap \
>         eap "mschap-v2" \
>       config address 10.0.5.0/24 \
>         config name-server 192.0.2.1
> 
> ikev2 'responder_psk' passive esp \
>         from any to dynamic \
>         local X.X.X.X peer any \
>         srcid server1-psk \
>         psk preshared123! \
>       config address 10.0.5.0/24 \
>         config name-server 192.0.2.1

Thanks for your attention!
I tried using a similar configuration:

ikev2 'responder_eap' passive ipcomp esp \
        from 0.0.0.0/0 to dynamic \
        peer any \
        srcid myhostname.org \
        eap "mschap-v2" \
        config address 172.24.24.0/24 \
        config name-server 172.24.24.1 \
        tag "$name-$id" tap enc0

ikev2 'responder_rsa' passive esp \
        from 0.0.0.0/0 to dynamic \
        peer any \
        srcid myhostname.org \
        config address 172.24.24.0/24 \
        config name-server 172.24.24.1 \
        tag "ROADW"

And when I added responder_rsa, all users, 
including those who were supposed to log in via mschap-v2, 
were caught by the responder_rsa policy and couldn't log in.

They come from the internet, and I can't specify anything 
in the "from" parameter other than 0.0.0.0/0. 
What should I do to ensure that only users 
using rsa are included in responder_rsa? 
Should I specify a different srcid?

Reply via email to