I'm trying to get a better understanding of the Server / Client Mutual Authentication process in a TLS1.2 mutual authenticated session. My understanding is that the client is able to fully authenticate the server's identity also relying on the FQDN issued to the certificate presented by the server during the handshake negotiation; however, I believe the server is only relying on a valid client cert being presented by the client (that is, a certificate trusted by the PKI locally installed on server's side or generally trusted via OCSP/CRL) but not necessarily on proof of identity from client's side based on the IP / FQDN (if any) contained in the certificate issued by the client
Is there any way to implement client authentication on the server's side based on the IP / FQDN presented by the client ?
I'm asking also because several SSL VPN remote access solutions mention TLS1.2 mutual authentication - but technically I have the feeling that the way server and client are authenticating each other is somehow asymmetrical.