diff options
author | Daniil Baturin <daniil@baturin.org> | 2020-10-31 11:54:27 +0100 |
---|---|---|
committer | Daniil Baturin <daniil@baturin.org> | 2020-10-31 11:55:03 +0100 |
commit | 1d77c17944cb72cfc360e88d0f43f60f52c41b8a (patch) | |
tree | 3b8ed1059665afb02a65cfbfadd710efc3124fc1 | |
parent | ad6d2ddfe6717fba912bcf957f19d8c89817a1ae (diff) | |
download | vyatta-cfg-vpn-1d77c17944cb72cfc360e88d0f43f60f52c41b8a.tar.gz vyatta-cfg-vpn-1d77c17944cb72cfc360e88d0f43f60f52c41b8a.zip |
T3035: allow mixed protocol IPsec (IPv4 over IPv6 and vice versa).
-rwxr-xr-x | scripts/vpn-config.pl | 9 |
1 files changed, 0 insertions, 9 deletions
diff --git a/scripts/vpn-config.pl b/scripts/vpn-config.pl index a70b89b..86fbd05 100755 --- a/scripts/vpn-config.pl +++ b/scripts/vpn-config.pl @@ -547,15 +547,6 @@ if ($vcVPN->exists('ipsec')) { vpn_die(["vpn", "ipsec", "site-to-site", "peer", $peer, "tunnel", $tunnel],"$vpn_cfg_err The 'remote prefix' and 'local prefix' protocols "."do not match"); } - # Check remote/local and peer protocol consistency - # IPv6 over IPv6 scenario is actually supported by StrongS/WAN, - # we do not allow it in this version because of design and QA issues. - if (($conn_proto != 6) && ($leftsubnet_proto == 6)) { - vpn_die(["vpn", "ipsec", "site-to-site", "peer", $peer, "tunnel", $tunnel],"$vpn_cfg_err IPv6 over IPv4 IPsec is not supported"); - } elsif (($conn_proto == 6) && ($leftsubnet_proto != 6)) { - vpn_die(["vpn", "ipsec", "site-to-site", "peer", $peer, "tunnel", $tunnel],"$vpn_cfg_err IPv4 over IPv6 IPsec is not supported"); - } - my $rightsubnet; my $allow_nat_networks = $vcVPN->returnValue("ipsec site-to-site peer $peer $tunKeyword allow-nat-networks"); my $allow_public_networks = $vcVPN->returnValue("ipsec site-to-site peer $peer $tunKeyword allow-public-networks"); |