Hi there,<br><br>I'm experimenting with Strongswan and have hit a problem.<br><br>I have a setup working using IKEv2, x509 certs, and virtual IP pool. However internet traffic is being routed back out the VPN gateway external interface. I'd like to route the traffic out of a dedicated proxy server instead.<br>
<br>The setup is as follows. <br><br>A. VPN gateway with two interfaces; one external interface facing the internet, one interface on the private subnet (<a href="http://10.0.1.0/24">10.0.1.0/24</a>).<br><br>B. Internal services such as a webserver on the private subnet (<a href="http://10.0.1.0/24">10.0.1.0/24</a>).<br>
<br>C. Proxy server with two interfaces; one external interface facing the internet (different from the VPN gateway), one interface on the private subnet (<a href="http://10.0.1.0/24">10.0.1.0/24</a>).<br><br>VPN clients are placed in the virtual IP pool <a href="http://10.0.2.0/24">10.0.2.0/24</a>.<br>
<br>The idea is all traffic from the clients has to go through the tunnel. As mentioned above I can route clients to the internet popping out from the VPN gateway. I can also route services B through the proxy C successfully. However I'm unable to get VPN clients to route through the proxy in a similar manner. <br>
<br>It seems that the iptables and table 220 rules always route through the interface that the connection comes in on (eth0) rather than to the internal interface (eth1).<br><br>Any ideas how I can correct this? I feel like there should be some static routes or other rules but I want to be able to scale with automatic rules added etc.<br>
<br>Many thanks,<br>7<br>