On Thu, Feb 7, 2013 at 7:51 AM, Martin Willi <[email protected]> wrote:
> Hi,
>
> Please try to keep the discussion on the mailing list, thanks.
>
>> with the patch www.2600.com gets tunnelled.  Expected: it should be
>> tunnelled (not sent via the VPN).
>
>> Unity (ios[2]: 207.99.30.226/32):  192.168.0.2/32 === 207.99.30.226/32 PASS
>
> The bypass policy now looks fine. But as expected, this IP still uses
> the source route, hence the policy does not match. We'd need an
> additional source route for this policy using a higher priority. Did you
> have any success in enforcing 192.168.0.2 as source address for testing?

I'm not sure how to do that.  Can you please give me some pointers?

Thanks.

_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to