Greetings,

I’m trying to set up what should be a simple split tunnel configuration and am 
having issues. The client is on a NAT subnet so I have 
leftsubnet=192.168.1.0/24. I want everything except traffic for the LAN to go 
out the IPsec tunnel so I have rightsubnet=0.0.0.0/0. The tunnel comes up fine 
but _all_ traffic goes out the tunnel, even traffic destined for 
192.168.1.0/24. If I try to ping some other host on the local subnet I can see 
the ICMP request on the VPN server where it shouldn’t be. The VPN server can 
(as expected) send an ICMP to a host on the LAN. I’ve tried both with and 
without lefthostaccess=yes (which I though would basically control split 
tunneling). 

Both servers are Debian Wheezy using the Strongswan 4.X packages. I can try the 
Strongswan 5.X packages from back ports but my impression is that this should 
work just fine. It’s not a complex configuration so I’m kind of stumped as to 
why it’s not working. I’m thinking that if I use ‘setkey -DP’ on the client I 
should see a rule matching 192.168.1.0/24 - 192.168.1.0/24 to keep the local 
traffic out of the tunnel? Or is there some other method I should be checking? 
Any advice would be appreciated. Thanks,

-David Mitchell

On the server:
conn toclient
        keyexchange=ikev2
        left=1.1.1.1
        leftid=1.1.1.1
        leftcert=serverCert.der
        leftsubnet=0.0.0.0/0
        rightcert=clientCert.pem
        right=%any
        # righthostaccess=yes
        rightsubnet=192.168.1.0/24
        auto=add

On the client:
conn toserver
        keyexchange=ikev2
        right=1.1.1.1
        rightcert=serverCert.der
        rightsubnet=0.0.0.0/0
        leftsubnet=192.168.1.0/24
        leftcert=clientCert.pem
        # lefthostaccess=yes
        auto=add


_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to