Feature #12407
closed
- Status changed from New to Pull Request Review
- Status changed from Pull Request Review to Feedback
- % Done changed from 0 to 100
Applied in changeset commit:7aaa20d95a345c4688e8786c755c7d0433451688.
- Target version changed from CE-Next to 2.6.0
- Plus Target Version changed from Plus-Next to 22.01
- Status changed from Feedback to New
The commit for this, commit:7aaa20d95a345c4688e8786c755c7d0433451688 , broke static IP address assignments from RADIUS.
- Target version changed from 2.6.0 to CE-Next
- Plus Target Version changed from 22.01 to 22.05
Commit reverted. We can revisit this in the next release.
- Status changed from New to Feedback
Applied in changeset commit:1f3baf61c1647ffcfbc6b6e26132d3ce56abeb96.
- Status changed from Feedback to New
- Status changed from New to Pull Request Review
Marcos Mendoza wrote in #note-10:
New MR, see: https://redmine.pfsense.org/issues/12267#note-16
Tested this with 22.01 and verified it resolved traffic passing between client 1 and the firewall.
Mar 29 22:38:42 firewall openvpn[56228]: 123.45.67.89:45804 [username] Peer Connection Initiated with [AF_INET]123.45.67.89:45804
Mar 29 22:38:42 firewall openvpn[45546]: user 'username' authenticated
Mar 29 22:38:42 firewall openvpn[56228]: username/123.45.67.89:45804 MULTI_sva: pool returned IPv4=10.199.1.3, IPv6=(Not enabled)
Mar 29 22:38:42 firewall openvpn[46638]: openvpn server 'ovpns2' user 'username' address '123.45.67.89:45804' - connecting
Mar 29 22:38:42 firewall openvpn[50146]: openvpn server 'ovpns2' user 'username' address '123.45.67.89:45804' - connected
- Status changed from Pull Request Review to Feedback
- Target version changed from CE-Next to 2.7.0
- Status changed from Feedback to Resolved
This has been back in place for a while. No problems with auth that I've seen, local or RADIUS.
Also available in: Atom
PDF