Strongswan clients access rightsStrongSwan - windows double password promptstrongSwan ipsec setup, couple of questionsEAP password prompt in strongSwanSSH not working over IPSec tunnel (Strongswan)Windows 7/8 Strongswan IKEv2 Wrong GatewayDocker container can not access hosts behind VPNTwo users behind same NAT (PSK or EAP) - strongswanStrongswan: Connecting PSK & EAP at a timeOpen ports to only to VPN clients connected via IKEv2 (strongswan)Strongswan + FreeRADIUS and Windows 10 clients without internet accessStrongswan with letsencrypt certificates (IKEv2-EAP)

What does ゆーか mean?

"Whatever a Russian does, they end up making the Kalashnikov gun"? Are there any similar proverbs in English?

Phrase for the opposite of "foolproof"

How to stop co-workers from teasing me because I know Russian?

Pulling the rope with one hand is as heavy as with two hands?

Rivers without rain

How to write a column outside the braces in a matrix?

Was there a shared-world project before "Thieves World"?

Why was the Spitfire's elliptical wing almost uncopied by other aircraft of World War 2?

What happens to Mjolnir (Thor's hammer) at the end of Endgame?

Is there any official lore on the Far Realm?

Can an Area of Effect spell cast outside a Prismatic Wall extend inside it?

a sore throat vs a strep throat vs strep throat

How can Republicans who favour free markets, consistently express anger when they don't like the outcome of that choice?

As an international instructor, should I openly talk about my accent?

Like totally amazing interchangeable sister outfits II: The Revenge

Pre-plastic human skin alternative

Why must Chinese maps be obfuscated?

What makes accurate emulation of old systems a difficult task?

How much cash can I safely carry into the USA and avoid civil forfeiture?

Does tea made with boiling water cool faster than tea made with boiled (but still hot) water?

What are the steps to solving this definite integral?

What are the characteristics of a typeless programming language?

"The cow" OR "a cow" OR "cows" in this context



Strongswan clients access rights


StrongSwan - windows double password promptstrongSwan ipsec setup, couple of questionsEAP password prompt in strongSwanSSH not working over IPSec tunnel (Strongswan)Windows 7/8 Strongswan IKEv2 Wrong GatewayDocker container can not access hosts behind VPNTwo users behind same NAT (PSK or EAP) - strongswanStrongswan: Connecting PSK & EAP at a timeOpen ports to only to VPN clients connected via IKEv2 (strongswan)Strongswan + FreeRADIUS and Windows 10 clients without internet accessStrongswan with letsencrypt certificates (IKEv2-EAP)






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I am beginner with strongswan so I apologize for this beginner’s query. I have created Debian server with strongswan. To this server are connected three networks
network_1: 192.168.10.0/24, network_2: 192.168.20.0/24 and network_3 192.168.30.0/24 via Mikrotik LTE routers and IKEv2-PSK protocol. Together with these network to this server can be connected windows, iOS, OSX and Android clients via IKEv2 protocol and MSCHAP-EAP authentication. All is working without problems and for every connected client are accessible all IPs in all these three networks.



At this moment I would like assign some of the following access rights for MSCHAP-EAP clients – for example:



Client Bob/password1 should be able to access only IPs in network2 and no other IPs
Client Alice/password2 should be able to access only IP address range 192.168.20.100 – 150 in second network and no other IPs
Client John/password3 should be able to acces only IP address ranges 192.168.30.10 – 50 and 192.168.10.150 -200 and IP address 192.168.20.44



Could anybody be so kind and help me solve it? Ideally with reference to any example of solution…



Thank you in advance



Petr










share|improve this question




























    0















    I am beginner with strongswan so I apologize for this beginner’s query. I have created Debian server with strongswan. To this server are connected three networks
    network_1: 192.168.10.0/24, network_2: 192.168.20.0/24 and network_3 192.168.30.0/24 via Mikrotik LTE routers and IKEv2-PSK protocol. Together with these network to this server can be connected windows, iOS, OSX and Android clients via IKEv2 protocol and MSCHAP-EAP authentication. All is working without problems and for every connected client are accessible all IPs in all these three networks.



    At this moment I would like assign some of the following access rights for MSCHAP-EAP clients – for example:



    Client Bob/password1 should be able to access only IPs in network2 and no other IPs
    Client Alice/password2 should be able to access only IP address range 192.168.20.100 – 150 in second network and no other IPs
    Client John/password3 should be able to acces only IP address ranges 192.168.30.10 – 50 and 192.168.10.150 -200 and IP address 192.168.20.44



    Could anybody be so kind and help me solve it? Ideally with reference to any example of solution…



    Thank you in advance



    Petr










    share|improve this question
























      0












      0








      0








      I am beginner with strongswan so I apologize for this beginner’s query. I have created Debian server with strongswan. To this server are connected three networks
      network_1: 192.168.10.0/24, network_2: 192.168.20.0/24 and network_3 192.168.30.0/24 via Mikrotik LTE routers and IKEv2-PSK protocol. Together with these network to this server can be connected windows, iOS, OSX and Android clients via IKEv2 protocol and MSCHAP-EAP authentication. All is working without problems and for every connected client are accessible all IPs in all these three networks.



      At this moment I would like assign some of the following access rights for MSCHAP-EAP clients – for example:



      Client Bob/password1 should be able to access only IPs in network2 and no other IPs
      Client Alice/password2 should be able to access only IP address range 192.168.20.100 – 150 in second network and no other IPs
      Client John/password3 should be able to acces only IP address ranges 192.168.30.10 – 50 and 192.168.10.150 -200 and IP address 192.168.20.44



      Could anybody be so kind and help me solve it? Ideally with reference to any example of solution…



      Thank you in advance



      Petr










      share|improve this question














      I am beginner with strongswan so I apologize for this beginner’s query. I have created Debian server with strongswan. To this server are connected three networks
      network_1: 192.168.10.0/24, network_2: 192.168.20.0/24 and network_3 192.168.30.0/24 via Mikrotik LTE routers and IKEv2-PSK protocol. Together with these network to this server can be connected windows, iOS, OSX and Android clients via IKEv2 protocol and MSCHAP-EAP authentication. All is working without problems and for every connected client are accessible all IPs in all these three networks.



      At this moment I would like assign some of the following access rights for MSCHAP-EAP clients – for example:



      Client Bob/password1 should be able to access only IPs in network2 and no other IPs
      Client Alice/password2 should be able to access only IP address range 192.168.20.100 – 150 in second network and no other IPs
      Client John/password3 should be able to acces only IP address ranges 192.168.30.10 – 50 and 192.168.10.150 -200 and IP address 192.168.20.44



      Could anybody be so kind and help me solve it? Ideally with reference to any example of solution…



      Thank you in advance



      Petr







      strongswan






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Apr 17 '18 at 19:14









      Petr W.Petr W.

      33




      33




















          2 Answers
          2






          active

          oldest

          votes


















          0














          A possible way to do this is using EAP-RADIUS. The radius server can return Class attributes that can be matched against configs (rightgroups in ipsec.conf, or groups in swanctl.conf). Then you can define different local traffic selectors for each of these groups. The ikev2/rw-eap-md5-class-radius strongSwan test scenario illustrates this.



          If you don't want to or can't use EAP-RADIUS there is a way to match individual EAP identities but it's a bit tricky because strongSwan does not fully support connection switching based on such identities.
          To do this a dummy connection with a fake group has to be used. This is how it could look like in ipsec.conf:



          conn eap-shared
          # options shared by all clients e.g.
          leftcert=...
          # or
          rightsourceip=...
          # or
          rightauth=eap-mschapv2

          conn eap-init
          also=eap-shared
          # this config is used to do the EAP-Identity exchange and the
          # authentication of client and server
          eap_identity=%identity
          # the following is used to force a connection switch after
          # the authentication completed
          rightgroups=<any string that is not used as group/class>
          auto=add

          conn eap-bob
          also=eap-shared
          eap_identity=bob@strongswan.org
          # any options that only apply to this user follow here e.g.
          leftsubnet=192.168.20.0/24
          auto=add

          conn eap-alice
          also=eap-shared
          eap_identity=alice@strongswan.org
          # any options that only apply to this user follow here e.g.
          # (note that ipsec.conf does not support ranges, and most kernel
          # interfaces do neither, so a range might be converted to a larger
          # subnet when installing IPsec policies, so deaggregating the range
          # is the most accurate way to do this currently)
          leftsubnet=192.168.20.100/30,192.168.20.104/29,192.168.20.112/28,192.168.20.128/28,192.168.20.144/30,192.168.20.148/31,192.168.20.150/32
          auto=add

          conn eap-john
          also=eap-shared
          eap_identity=john@strongswan.org
          # any options that only apply to this user follow here e.g.
          # (see above)
          leftsubnet=192.168.30.10/31,192.168.30.12/30,192.168.30.16/28,192.168.30.32/28,192.168.30.48/31,192.168.30.50/32,192.168.10.150/31,192.168.10.152/29,192.168.10.160/27,192.168.10.192/29,192.168.10.200/32,192.168.20.44/32
          auto=add


          With EAP-RADIUS the config would look quite similarly but you wouldn't need the eap-init connection (instead you'd add eap_identity=%identity to eap-shared) and instead of defining eap_identity in each individual connection you'd set rightgroups to the groups (i.e. EAP-RADIUS Class attribute values) for which that connection should be used (i.e. this allows using the same conn section for multiple users).






          share|improve this answer






























            0














            Thank you very much for your answer. I will test it. My first idea was change the mschap-eap authentication to eap-tls and use different client's certificates and conn section for each group but I don't know if it would be the right way.






            share|improve this answer























            • Sorry, didn't see this before. Did you mean to add this as a comment to my answer? Anyway, EAP-TLS wouldn't make much of a difference as there again is the problem that switching based on EAP identities isn't fully supported (and different client implementations may use different forms of EAP identities when using certificates). Using plain certificate authentication may be an alternative as that allows matching configs via subject DN (even with wildcards), however, the identities sent might still depend on the client (some send the full subject DN, others the CN, or a SAN).

              – ecdsa
              Apr 20 '18 at 11:31











            • Hm, my idea with certificates was not good. I'll have to solve it with RADIUS server.

              – Petr W.
              Apr 23 '18 at 14:27











            • ecdsa, thank you very much for your help once more. Strongswan server is now working together with FreeRADIUS + MySQL without problems and a lot of users in usergroups that have access rights via EAP-MSCHAP to the appropriate ranges in appropriate networks:-)

              – Petr W.
              May 5 '18 at 19:25











            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "2"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f908098%2fstrongswan-clients-access-rights%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0














            A possible way to do this is using EAP-RADIUS. The radius server can return Class attributes that can be matched against configs (rightgroups in ipsec.conf, or groups in swanctl.conf). Then you can define different local traffic selectors for each of these groups. The ikev2/rw-eap-md5-class-radius strongSwan test scenario illustrates this.



            If you don't want to or can't use EAP-RADIUS there is a way to match individual EAP identities but it's a bit tricky because strongSwan does not fully support connection switching based on such identities.
            To do this a dummy connection with a fake group has to be used. This is how it could look like in ipsec.conf:



            conn eap-shared
            # options shared by all clients e.g.
            leftcert=...
            # or
            rightsourceip=...
            # or
            rightauth=eap-mschapv2

            conn eap-init
            also=eap-shared
            # this config is used to do the EAP-Identity exchange and the
            # authentication of client and server
            eap_identity=%identity
            # the following is used to force a connection switch after
            # the authentication completed
            rightgroups=<any string that is not used as group/class>
            auto=add

            conn eap-bob
            also=eap-shared
            eap_identity=bob@strongswan.org
            # any options that only apply to this user follow here e.g.
            leftsubnet=192.168.20.0/24
            auto=add

            conn eap-alice
            also=eap-shared
            eap_identity=alice@strongswan.org
            # any options that only apply to this user follow here e.g.
            # (note that ipsec.conf does not support ranges, and most kernel
            # interfaces do neither, so a range might be converted to a larger
            # subnet when installing IPsec policies, so deaggregating the range
            # is the most accurate way to do this currently)
            leftsubnet=192.168.20.100/30,192.168.20.104/29,192.168.20.112/28,192.168.20.128/28,192.168.20.144/30,192.168.20.148/31,192.168.20.150/32
            auto=add

            conn eap-john
            also=eap-shared
            eap_identity=john@strongswan.org
            # any options that only apply to this user follow here e.g.
            # (see above)
            leftsubnet=192.168.30.10/31,192.168.30.12/30,192.168.30.16/28,192.168.30.32/28,192.168.30.48/31,192.168.30.50/32,192.168.10.150/31,192.168.10.152/29,192.168.10.160/27,192.168.10.192/29,192.168.10.200/32,192.168.20.44/32
            auto=add


            With EAP-RADIUS the config would look quite similarly but you wouldn't need the eap-init connection (instead you'd add eap_identity=%identity to eap-shared) and instead of defining eap_identity in each individual connection you'd set rightgroups to the groups (i.e. EAP-RADIUS Class attribute values) for which that connection should be used (i.e. this allows using the same conn section for multiple users).






            share|improve this answer



























              0














              A possible way to do this is using EAP-RADIUS. The radius server can return Class attributes that can be matched against configs (rightgroups in ipsec.conf, or groups in swanctl.conf). Then you can define different local traffic selectors for each of these groups. The ikev2/rw-eap-md5-class-radius strongSwan test scenario illustrates this.



              If you don't want to or can't use EAP-RADIUS there is a way to match individual EAP identities but it's a bit tricky because strongSwan does not fully support connection switching based on such identities.
              To do this a dummy connection with a fake group has to be used. This is how it could look like in ipsec.conf:



              conn eap-shared
              # options shared by all clients e.g.
              leftcert=...
              # or
              rightsourceip=...
              # or
              rightauth=eap-mschapv2

              conn eap-init
              also=eap-shared
              # this config is used to do the EAP-Identity exchange and the
              # authentication of client and server
              eap_identity=%identity
              # the following is used to force a connection switch after
              # the authentication completed
              rightgroups=<any string that is not used as group/class>
              auto=add

              conn eap-bob
              also=eap-shared
              eap_identity=bob@strongswan.org
              # any options that only apply to this user follow here e.g.
              leftsubnet=192.168.20.0/24
              auto=add

              conn eap-alice
              also=eap-shared
              eap_identity=alice@strongswan.org
              # any options that only apply to this user follow here e.g.
              # (note that ipsec.conf does not support ranges, and most kernel
              # interfaces do neither, so a range might be converted to a larger
              # subnet when installing IPsec policies, so deaggregating the range
              # is the most accurate way to do this currently)
              leftsubnet=192.168.20.100/30,192.168.20.104/29,192.168.20.112/28,192.168.20.128/28,192.168.20.144/30,192.168.20.148/31,192.168.20.150/32
              auto=add

              conn eap-john
              also=eap-shared
              eap_identity=john@strongswan.org
              # any options that only apply to this user follow here e.g.
              # (see above)
              leftsubnet=192.168.30.10/31,192.168.30.12/30,192.168.30.16/28,192.168.30.32/28,192.168.30.48/31,192.168.30.50/32,192.168.10.150/31,192.168.10.152/29,192.168.10.160/27,192.168.10.192/29,192.168.10.200/32,192.168.20.44/32
              auto=add


              With EAP-RADIUS the config would look quite similarly but you wouldn't need the eap-init connection (instead you'd add eap_identity=%identity to eap-shared) and instead of defining eap_identity in each individual connection you'd set rightgroups to the groups (i.e. EAP-RADIUS Class attribute values) for which that connection should be used (i.e. this allows using the same conn section for multiple users).






              share|improve this answer

























                0












                0








                0







                A possible way to do this is using EAP-RADIUS. The radius server can return Class attributes that can be matched against configs (rightgroups in ipsec.conf, or groups in swanctl.conf). Then you can define different local traffic selectors for each of these groups. The ikev2/rw-eap-md5-class-radius strongSwan test scenario illustrates this.



                If you don't want to or can't use EAP-RADIUS there is a way to match individual EAP identities but it's a bit tricky because strongSwan does not fully support connection switching based on such identities.
                To do this a dummy connection with a fake group has to be used. This is how it could look like in ipsec.conf:



                conn eap-shared
                # options shared by all clients e.g.
                leftcert=...
                # or
                rightsourceip=...
                # or
                rightauth=eap-mschapv2

                conn eap-init
                also=eap-shared
                # this config is used to do the EAP-Identity exchange and the
                # authentication of client and server
                eap_identity=%identity
                # the following is used to force a connection switch after
                # the authentication completed
                rightgroups=<any string that is not used as group/class>
                auto=add

                conn eap-bob
                also=eap-shared
                eap_identity=bob@strongswan.org
                # any options that only apply to this user follow here e.g.
                leftsubnet=192.168.20.0/24
                auto=add

                conn eap-alice
                also=eap-shared
                eap_identity=alice@strongswan.org
                # any options that only apply to this user follow here e.g.
                # (note that ipsec.conf does not support ranges, and most kernel
                # interfaces do neither, so a range might be converted to a larger
                # subnet when installing IPsec policies, so deaggregating the range
                # is the most accurate way to do this currently)
                leftsubnet=192.168.20.100/30,192.168.20.104/29,192.168.20.112/28,192.168.20.128/28,192.168.20.144/30,192.168.20.148/31,192.168.20.150/32
                auto=add

                conn eap-john
                also=eap-shared
                eap_identity=john@strongswan.org
                # any options that only apply to this user follow here e.g.
                # (see above)
                leftsubnet=192.168.30.10/31,192.168.30.12/30,192.168.30.16/28,192.168.30.32/28,192.168.30.48/31,192.168.30.50/32,192.168.10.150/31,192.168.10.152/29,192.168.10.160/27,192.168.10.192/29,192.168.10.200/32,192.168.20.44/32
                auto=add


                With EAP-RADIUS the config would look quite similarly but you wouldn't need the eap-init connection (instead you'd add eap_identity=%identity to eap-shared) and instead of defining eap_identity in each individual connection you'd set rightgroups to the groups (i.e. EAP-RADIUS Class attribute values) for which that connection should be used (i.e. this allows using the same conn section for multiple users).






                share|improve this answer













                A possible way to do this is using EAP-RADIUS. The radius server can return Class attributes that can be matched against configs (rightgroups in ipsec.conf, or groups in swanctl.conf). Then you can define different local traffic selectors for each of these groups. The ikev2/rw-eap-md5-class-radius strongSwan test scenario illustrates this.



                If you don't want to or can't use EAP-RADIUS there is a way to match individual EAP identities but it's a bit tricky because strongSwan does not fully support connection switching based on such identities.
                To do this a dummy connection with a fake group has to be used. This is how it could look like in ipsec.conf:



                conn eap-shared
                # options shared by all clients e.g.
                leftcert=...
                # or
                rightsourceip=...
                # or
                rightauth=eap-mschapv2

                conn eap-init
                also=eap-shared
                # this config is used to do the EAP-Identity exchange and the
                # authentication of client and server
                eap_identity=%identity
                # the following is used to force a connection switch after
                # the authentication completed
                rightgroups=<any string that is not used as group/class>
                auto=add

                conn eap-bob
                also=eap-shared
                eap_identity=bob@strongswan.org
                # any options that only apply to this user follow here e.g.
                leftsubnet=192.168.20.0/24
                auto=add

                conn eap-alice
                also=eap-shared
                eap_identity=alice@strongswan.org
                # any options that only apply to this user follow here e.g.
                # (note that ipsec.conf does not support ranges, and most kernel
                # interfaces do neither, so a range might be converted to a larger
                # subnet when installing IPsec policies, so deaggregating the range
                # is the most accurate way to do this currently)
                leftsubnet=192.168.20.100/30,192.168.20.104/29,192.168.20.112/28,192.168.20.128/28,192.168.20.144/30,192.168.20.148/31,192.168.20.150/32
                auto=add

                conn eap-john
                also=eap-shared
                eap_identity=john@strongswan.org
                # any options that only apply to this user follow here e.g.
                # (see above)
                leftsubnet=192.168.30.10/31,192.168.30.12/30,192.168.30.16/28,192.168.30.32/28,192.168.30.48/31,192.168.30.50/32,192.168.10.150/31,192.168.10.152/29,192.168.10.160/27,192.168.10.192/29,192.168.10.200/32,192.168.20.44/32
                auto=add


                With EAP-RADIUS the config would look quite similarly but you wouldn't need the eap-init connection (instead you'd add eap_identity=%identity to eap-shared) and instead of defining eap_identity in each individual connection you'd set rightgroups to the groups (i.e. EAP-RADIUS Class attribute values) for which that connection should be used (i.e. this allows using the same conn section for multiple users).







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Apr 18 '18 at 8:48









                ecdsaecdsa

                2,042915




                2,042915























                    0














                    Thank you very much for your answer. I will test it. My first idea was change the mschap-eap authentication to eap-tls and use different client's certificates and conn section for each group but I don't know if it would be the right way.






                    share|improve this answer























                    • Sorry, didn't see this before. Did you mean to add this as a comment to my answer? Anyway, EAP-TLS wouldn't make much of a difference as there again is the problem that switching based on EAP identities isn't fully supported (and different client implementations may use different forms of EAP identities when using certificates). Using plain certificate authentication may be an alternative as that allows matching configs via subject DN (even with wildcards), however, the identities sent might still depend on the client (some send the full subject DN, others the CN, or a SAN).

                      – ecdsa
                      Apr 20 '18 at 11:31











                    • Hm, my idea with certificates was not good. I'll have to solve it with RADIUS server.

                      – Petr W.
                      Apr 23 '18 at 14:27











                    • ecdsa, thank you very much for your help once more. Strongswan server is now working together with FreeRADIUS + MySQL without problems and a lot of users in usergroups that have access rights via EAP-MSCHAP to the appropriate ranges in appropriate networks:-)

                      – Petr W.
                      May 5 '18 at 19:25















                    0














                    Thank you very much for your answer. I will test it. My first idea was change the mschap-eap authentication to eap-tls and use different client's certificates and conn section for each group but I don't know if it would be the right way.






                    share|improve this answer























                    • Sorry, didn't see this before. Did you mean to add this as a comment to my answer? Anyway, EAP-TLS wouldn't make much of a difference as there again is the problem that switching based on EAP identities isn't fully supported (and different client implementations may use different forms of EAP identities when using certificates). Using plain certificate authentication may be an alternative as that allows matching configs via subject DN (even with wildcards), however, the identities sent might still depend on the client (some send the full subject DN, others the CN, or a SAN).

                      – ecdsa
                      Apr 20 '18 at 11:31











                    • Hm, my idea with certificates was not good. I'll have to solve it with RADIUS server.

                      – Petr W.
                      Apr 23 '18 at 14:27











                    • ecdsa, thank you very much for your help once more. Strongswan server is now working together with FreeRADIUS + MySQL without problems and a lot of users in usergroups that have access rights via EAP-MSCHAP to the appropriate ranges in appropriate networks:-)

                      – Petr W.
                      May 5 '18 at 19:25













                    0












                    0








                    0







                    Thank you very much for your answer. I will test it. My first idea was change the mschap-eap authentication to eap-tls and use different client's certificates and conn section for each group but I don't know if it would be the right way.






                    share|improve this answer













                    Thank you very much for your answer. I will test it. My first idea was change the mschap-eap authentication to eap-tls and use different client's certificates and conn section for each group but I don't know if it would be the right way.







                    share|improve this answer












                    share|improve this answer



                    share|improve this answer










                    answered Apr 18 '18 at 17:26









                    Petr W.Petr W.

                    33




                    33












                    • Sorry, didn't see this before. Did you mean to add this as a comment to my answer? Anyway, EAP-TLS wouldn't make much of a difference as there again is the problem that switching based on EAP identities isn't fully supported (and different client implementations may use different forms of EAP identities when using certificates). Using plain certificate authentication may be an alternative as that allows matching configs via subject DN (even with wildcards), however, the identities sent might still depend on the client (some send the full subject DN, others the CN, or a SAN).

                      – ecdsa
                      Apr 20 '18 at 11:31











                    • Hm, my idea with certificates was not good. I'll have to solve it with RADIUS server.

                      – Petr W.
                      Apr 23 '18 at 14:27











                    • ecdsa, thank you very much for your help once more. Strongswan server is now working together with FreeRADIUS + MySQL without problems and a lot of users in usergroups that have access rights via EAP-MSCHAP to the appropriate ranges in appropriate networks:-)

                      – Petr W.
                      May 5 '18 at 19:25

















                    • Sorry, didn't see this before. Did you mean to add this as a comment to my answer? Anyway, EAP-TLS wouldn't make much of a difference as there again is the problem that switching based on EAP identities isn't fully supported (and different client implementations may use different forms of EAP identities when using certificates). Using plain certificate authentication may be an alternative as that allows matching configs via subject DN (even with wildcards), however, the identities sent might still depend on the client (some send the full subject DN, others the CN, or a SAN).

                      – ecdsa
                      Apr 20 '18 at 11:31











                    • Hm, my idea with certificates was not good. I'll have to solve it with RADIUS server.

                      – Petr W.
                      Apr 23 '18 at 14:27











                    • ecdsa, thank you very much for your help once more. Strongswan server is now working together with FreeRADIUS + MySQL without problems and a lot of users in usergroups that have access rights via EAP-MSCHAP to the appropriate ranges in appropriate networks:-)

                      – Petr W.
                      May 5 '18 at 19:25
















                    Sorry, didn't see this before. Did you mean to add this as a comment to my answer? Anyway, EAP-TLS wouldn't make much of a difference as there again is the problem that switching based on EAP identities isn't fully supported (and different client implementations may use different forms of EAP identities when using certificates). Using plain certificate authentication may be an alternative as that allows matching configs via subject DN (even with wildcards), however, the identities sent might still depend on the client (some send the full subject DN, others the CN, or a SAN).

                    – ecdsa
                    Apr 20 '18 at 11:31





                    Sorry, didn't see this before. Did you mean to add this as a comment to my answer? Anyway, EAP-TLS wouldn't make much of a difference as there again is the problem that switching based on EAP identities isn't fully supported (and different client implementations may use different forms of EAP identities when using certificates). Using plain certificate authentication may be an alternative as that allows matching configs via subject DN (even with wildcards), however, the identities sent might still depend on the client (some send the full subject DN, others the CN, or a SAN).

                    – ecdsa
                    Apr 20 '18 at 11:31













                    Hm, my idea with certificates was not good. I'll have to solve it with RADIUS server.

                    – Petr W.
                    Apr 23 '18 at 14:27





                    Hm, my idea with certificates was not good. I'll have to solve it with RADIUS server.

                    – Petr W.
                    Apr 23 '18 at 14:27













                    ecdsa, thank you very much for your help once more. Strongswan server is now working together with FreeRADIUS + MySQL without problems and a lot of users in usergroups that have access rights via EAP-MSCHAP to the appropriate ranges in appropriate networks:-)

                    – Petr W.
                    May 5 '18 at 19:25





                    ecdsa, thank you very much for your help once more. Strongswan server is now working together with FreeRADIUS + MySQL without problems and a lot of users in usergroups that have access rights via EAP-MSCHAP to the appropriate ranges in appropriate networks:-)

                    – Petr W.
                    May 5 '18 at 19:25

















                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Server Fault!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f908098%2fstrongswan-clients-access-rights%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

                    Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

                    Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020