--- Quoting Daniel Eyholzer on 2005/08/24 at 08:33 +0200:

> Yes, I have tried to filter on VPN client ip addresses on the enc0
> interface. This works, but the problem is that not all users should be
> allowed to do the same things. Since the VPN client ip address can be
> chosen arbitrary on the VPN client, the user can chose an ip address that
> is allowed to do what he wants to do. Therefore it is not secured, the user
> has just to know which ip address has full access, and he can access all he
> wants on all vlans.

You definitely want to setup a policy then and to use x509 certs for
client authentication. Create a policy that delegates to sub policies
for each client. The "licensees" of each sub policy should match the
distinguished name of the client's key. Specify the appropriate
remote_filter/local_filter options in the policy as well. Obviously this
doesn't scale so well for large numbers of users.

Check out the isakmpd.policy(5) man page for all the details.




.joel

Reply via email to