# cat /etc/iked.conf
ikev2 "rathaus" active esp \
from 192.168.0.0/24 to any \
from dynamic to 192.168.0.0/24 \
peer vpn.example.com \
srcid o2@rathaus \
psk "will-change-to-certs-if-testing-is-finished" \
request address any \
iface lo1
I discovered that
peer
Hello,
I want to integrate a remote OpenBSD 7.2 machine into my local network.
So it will be reachable via a local IPv4 address like 192.168.0.206. My
local router and IPSec server is a LANCOM 1781EW+.
The setup works already, but only if iked uses IPv4 and not IPv6. (I
have a working IPv6 s
Hello,
I am struggeling with understanding OpenBSD's implementation of ipsec (v2)
fully.
So as far as I have wrapped my head around I have understood the following.
When a packets destination and origin matches an IPsec flow it is being stolen
from iked and passed through the tunnel. It does not
Hello misc@
Found. The ping request generated by the first client get a ping reply
routed by iked to the second host.
Reversing the flow selector in iked.conf do the job correctly.
inet from y.y.y.y/24 to 0.0.0.0/0, where y.y.y.y/24 is the range of the
internal LAN.
Thanks a lot for your help.
Hello @misc
I've set up a remote access with iked on OpenBSD 5.7-stable and several
MS clients. When a second client connects the remote access, the flow of
the first one is dropped (something like 1 packet of 100 comes to enc0).
Clients are on windows 8.1 with the default VPN client.
Any idea on
5 matches
Mail list logo