YES. IT WORKS after using -A FORWARD! Thanks a lot.<br><br><div class="gmail_quote">On Fri, Jan 18, 2013 at 6:35 PM, steven liu <span dir="ltr"><<a href="mailto:stevenliu88@gmail.com" target="_blank">stevenliu88@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Thanks. We already tried to set TCP MSS to 1300 by following commands. But we still has the same problem.<br><br><span>iptables -t mangle -A POSTROUTING -p tcp --tcp-flags
SYN,RST SYN -o eth0 -j TCPMSS --set-mss 1300<br><br></span><br><span><span>iptables -t mangle -A POSTROUTING -p tcp --tcp-flags
SYN,RST SYN -o eth0 -j TCPMSS --clamp-mss-to-pmtu</span></span><div class="HOEnZb"><div class="h5"><b><br></b><br><div class="gmail_quote">On Fri, Jan 18, 2013 at 12:09 PM, steven liu <span dir="ltr"><<a href="mailto:stevenliu88@gmail.com" target="_blank">stevenliu88@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Dear All,<br><br>We have set up an ipsec vpn tunnel between an iphone and a strongswan vpn server by following the strong wiki guide. It works if we use iphone to access http website. But iphone cannot access any https website. We also use wireshark to capture packets in the strongswan vpn server. It shows some "TLS Encrypted Alert" packets. Any help much appreciated! <br>
<br>Tks.<br>
</blockquote></div><br>
</div></div></blockquote></div><br>