dynamic selectors, each having a potentially different protocol/port definition.
Access readwrite
Status current
Type DisplayString
Range 1 - 255
OID 1.3.6.1.4.1.16177.1.400.1.1.1003.2.1.1.5
6.1.20 cfgVpnIpsecLeftId
IPsec Left ID
leftid = id
How the left/local participant should be identified for authentication; defaults to left or the subject of
the certificate configured with leftcert. If leftcert is configured, the identity has to be confirmed by
the certificate, that is, it has to match the full subject DN or one of the subjectAltName extensions
contained in the certificate.
Can be an IP address, a fully-qualified domain name, an email address or a Distinguished Name for
which the ID type is determined automatically and the string is converted to the appropriate encoding.
The rules for this conversion are described on IdentityParsing (see https://wiki.strongswan.org/projects/strongswan/wiki/IdentityParsing).
In certain special situations the identity parsing above might be inadequate or produce the wrong
result. Examples are the need to encode a FQDN as KEY_ID or the string parser being unable to
produce the correct binary ASN.1 encoding of a certificate’s DN. For these situations it is possible to
enforce a specific identity type and to provide the binary encoding of the identity. To do this a prefix
may be used, followed by a colon (:). If the number sign (#) follows the colon, the remaining data is
interpreted as hex encoding, otherwise the string is used as is as the identification data. Note: The
latter implies that no conversion is performed for non-string identities. For example, ipv4:10.0.0.1 does
not create a valid ID_IPV4_ADDR IKE identity, as it does not get converted to binary 0x0a000001.
Instead, one could use ipv4:#0a000001 to get a valid identity, but just using the implicit type with
automatic conversion is usually simpler. The same applies to the ASN.1 encoded types.
The following prefixes are known: ipv4, ipv6, rfc822, email, userfqdn, fqdn, dns, asn1dn, asn1gn and
keyid.
Custom type prefixes may be specified by surrounding the numerical type value with curly brackets.
rightid for IKEv2 connections optionally takes a % as prefix in front of the identity. If given it prevents
the daemon from sending IDr in its IKE_AUTH request and will allow it to verify the configured identity
against the subject and subjectAltNames contained in the responder’s certificate (otherwise, it is
only compared with the IDr returned by the responder). The IDr sent by the initiator might otherwise
prevent the responder from finding a config if it has configured a different value for leftid.
18 of 40