summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniil Baturin <daniil@baturin.org>2020-10-31 11:54:27 +0100
committerDaniil Baturin <daniil@baturin.org>2020-10-31 11:55:03 +0100
commit1d77c17944cb72cfc360e88d0f43f60f52c41b8a (patch)
tree3b8ed1059665afb02a65cfbfadd710efc3124fc1
parentad6d2ddfe6717fba912bcf957f19d8c89817a1ae (diff)
downloadvyatta-cfg-vpn-1d77c17944cb72cfc360e88d0f43f60f52c41b8a.tar.gz
vyatta-cfg-vpn-1d77c17944cb72cfc360e88d0f43f60f52c41b8a.zip
T3035: allow mixed protocol IPsec (IPv4 over IPv6 and vice versa).
-rwxr-xr-xscripts/vpn-config.pl9
1 files changed, 0 insertions, 9 deletions
diff --git a/scripts/vpn-config.pl b/scripts/vpn-config.pl
index a70b89b..86fbd05 100755
--- a/scripts/vpn-config.pl
+++ b/scripts/vpn-config.pl
@@ -547,15 +547,6 @@ if ($vcVPN->exists('ipsec')) {
vpn_die(["vpn", "ipsec", "site-to-site", "peer", $peer, "tunnel", $tunnel],"$vpn_cfg_err The 'remote prefix' and 'local prefix' protocols "."do not match");
}
- # Check remote/local and peer protocol consistency
- # IPv6 over IPv6 scenario is actually supported by StrongS/WAN,
- # we do not allow it in this version because of design and QA issues.
- if (($conn_proto != 6) && ($leftsubnet_proto == 6)) {
- vpn_die(["vpn", "ipsec", "site-to-site", "peer", $peer, "tunnel", $tunnel],"$vpn_cfg_err IPv6 over IPv4 IPsec is not supported");
- } elsif (($conn_proto == 6) && ($leftsubnet_proto != 6)) {
- vpn_die(["vpn", "ipsec", "site-to-site", "peer", $peer, "tunnel", $tunnel],"$vpn_cfg_err IPv4 over IPv6 IPsec is not supported");
- }
-
my $rightsubnet;
my $allow_nat_networks = $vcVPN->returnValue("ipsec site-to-site peer $peer $tunKeyword allow-nat-networks");
my $allow_public_networks = $vcVPN->returnValue("ipsec site-to-site peer $peer $tunKeyword allow-public-networks");