If "My Identifier" can't be touched, then it must be what the other part is expecting. In this case the RV325 expect it to be the user fqdn "[email protected]".
If I configure the "Secret's ID selector" as "[email protected]" with the corresponding preshared key it won't work at all. I have tried with all kind of prefixes as @@ as per the Strongswan documentation for making it not interpret the string as another ID.
If I configure the "Secret's ID selector" as "%any" with the corresponding preshared key it works as expected, but it prevents me to have more than 1 preshared key for any other IPSec connection I may have.
So, that IKEv1 only supports IP address ID selector is not true. It must support any other ID or the connection would not have been made with "%any". (Tested and all traffic is passed OK from both sides of the VPN.)
If it only supports address ID then it is more than inconvenient as this part of the connection has dynamic IP.
This is the log for the connection if used with "%any"
Tue Oct 13 15:01:52 2020 daemon.info syslog: 09[IKE] sending retransmit 1 of request message ID 0, seq 1
Tue Oct 13 15:01:52 2020 daemon.info syslog: 09[NET] sending packet: from 178.x.x.x[500] to 84.x.x.x[500] (467 bytes)
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[NET] received packet: from 84.x.x.x[500] to 178.x.x.x[500] (444 bytes)
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[ENC] parsed AGGRESSIVE response 0 [ SA KE No ID V NAT-D NAT-D HASH V V ]
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[IKE] received NAT-T (RFC 3947) vendor ID
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[IKE] received Cisco Unity vendor ID
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[IKE] received DPD vendor ID
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[IKE] remote host is behind NAT
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[IKE] IKE_SA RV320[1] established between 178.x.x.x[[email protected]]...84.x.x.x[192.x.x.x]
Tue Oct 13 15:01:53 2020 authpriv.info syslog: 10[IKE] IKE_SA RV320[1] established between 178.x.x.x[[email protected]]...84.x.x.x[192.x.x.x]
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[IKE] scheduling reauthentication in 28584s
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[IKE] maximum IKE_SA lifetime 28764s
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[ENC] generating AGGRESSIVE request 0 [ HASH NAT-D NAT-D ]
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[NET] sending packet: from 178.x.x.x[4500] to 84.x.x.x[4500] (108 bytes)
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[ENC] generating QUICK_MODE request 2136998740 [ HASH SA No KE ID ID ]
Tue Oct 13 15:01:53 2020 daemon.info syslog: 10[NET] sending packet: from 178.x.x.x[4500] to 84.x.x.x[4500] (380 bytes)
Tue Oct 13 15:01:53 2020 daemon.info syslog: 11[NET] received packet: from 84.x.x.x[4500] to 178.x.x.x[4500] (364 bytes)
Tue Oct 13 15:01:53 2020 daemon.info syslog: 11[ENC] parsed QUICK_MODE response 2136998740 [ HASH SA No KE ID ID ]
Tue Oct 13 15:01:54 2020 daemon.info syslog: 11[IKE] CHILD_SA RV320{1} established with SPIs cc0c9f85_i c8a4bd3d_o and TS 192.168.2.0/24 === 192.168.16.0/24
Tue Oct 13 15:01:54 2020 authpriv.info syslog: 11[IKE] CHILD_SA RV320{1} established with SPIs cc0c9f85_i c8a4bd3d_o and TS 192.168.2.0/24 === 192.168.16.0/24
Tue Oct 13 15:01:54 2020 local0.notice vpn: + 192.x.x.x 192.168.16.0/24 == 84.x.x.x -- 178.x.x.x == 192.168.2.0/24
Tue Oct 13 15:01:54 2020 daemon.info syslog: 11[ENC] generating QUICK_MODE request 2136998740 [ HASH ]
Tue Oct 13 15:01:54 2020 daemon.info syslog: 11[NET] sending packet: from 178.x.x.x[4500] to 84.x.x.x[4500] (60 bytes)