Hi, Please try to keep the discussion on the mailing list, thanks.
> with the patch www.2600.com gets tunnelled. Expected: it should be > tunnelled (not sent via the VPN). > Unity (ios[2]: 207.99.30.226/32): 192.168.0.2/32 === 207.99.30.226/32 PASS The bypass policy now looks fine. But as expected, this IP still uses the source route, hence the policy does not match. We'd need an additional source route for this policy using a higher priority. Did you have any success in enforcing 192.168.0.2 as source address for testing? Regards Martin _______________________________________________ Users mailing list [email protected] https://lists.strongswan.org/mailman/listinfo/users
