Skip to content

Commit c65d443

Browse files
authored
Merge pull request #4382 from c-po/ipsec-ios-profile-fixes
ipsec: T7225: fix IKE DiffieHellmanGroup and ExtendedAuthEnabled in iOS profile
2 parents 4a5fbf5 + c31df5a commit c65d443

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

data/templates/ipsec/ios_profile.j2

+2-4
Original file line numberDiff line numberDiff line change
@@ -55,11 +55,9 @@
5555
<!-- The server is authenticated using a certificate -->
5656
<key>AuthenticationMethod</key>
5757
<string>Certificate</string>
58-
{% if authentication.client_mode is vyos_defined and authentication.client_mode.startswith("eap") %}
5958
<!-- The client uses EAP to authenticate -->
6059
<key>ExtendedAuthEnabled</key>
6160
<integer>1</integer>
62-
{% endif %}
6361
<!-- The next two dictionaries are optional (as are the keys in them), but it is recommended to specify them as the default is to use 3DES.
6462
IMPORTANT: Because only one proposal is sent (even if nothing is configured here) it must match the server configuration -->
6563
<key>IKESecurityAssociationParameters</key>
@@ -80,9 +78,9 @@
8078
<string>{{ esp_encryption.encryption }}</string>
8179
<key>IntegrityAlgorithm</key>
8280
<string>{{ esp_encryption.hash }}</string>
83-
{% if esp_encryption.pfs is vyos_defined %}
81+
{% if ike_encryption.dh_group is vyos_defined %}
8482
<key>DiffieHellmanGroup</key>
85-
<integer>{{ esp_encryption.pfs }}</integer>
83+
<integer>{{ ike_encryption.dh_group }}</integer>
8684
{% endif %}
8785
</dict>
8886
<!-- Controls whether the client offers Perfect Forward Secrecy (PFS). This should be set to match the server. -->

0 commit comments

Comments
 (0)