On Thu, Feb 7, 2013 at 7:51 AM, Martin Willi <[email protected]> wrote: > Hi, > > Please try to keep the discussion on the mailing list, thanks. > >> with the patch www.2600.com gets tunnelled. Expected: it should be >> tunnelled (not sent via the VPN). > >> Unity (ios[2]: 207.99.30.226/32): 192.168.0.2/32 === 207.99.30.226/32 PASS > > The bypass policy now looks fine. But as expected, this IP still uses > the source route, hence the policy does not match. We'd need an > additional source route for this policy using a higher priority. Did you > have any success in enforcing 192.168.0.2 as source address for testing?
I'm not sure how to do that. Can you please give me some pointers? Thanks. _______________________________________________ Users mailing list [email protected] https://lists.strongswan.org/mailman/listinfo/users
