<div dir="ltr">Hi Sridhar,<div>Yes, remote currently acts as a road warrior. If there's any good solutions that require my network to have another topology - feel free to suggest your thoughts :) Note that a remote has the same IP address all the time and is always connected.</div><div>I have a similar idea about a GRE tunnel. For example, make a GRE tunnel within a dedicated network namespace and include the process to this namespace. However, maybe there's something more elegant? For example, using iptables to mark packets and make custom routes.</div></div><div class="gmail_extra"><br><div class="gmail_quote">2016-06-26 21:04 GMT+03:00 pothuganti sridhar <span dir="ltr"><<a href="mailto:pothuganti.sridhar@gmail.com" target="_blank">pothuganti.sridhar@gmail.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div><div><div><div>Hi,<br><br></div>I have one Q. Is your deployment is like Server <-> Road warrior Client? OR normal site to site?<br></div>But as per your explanation, your remote looks like to be a road warrior client. In this deployment, only the traffic destined to VIP of road warrior client is encrypted and will be sent to the remote. If you want to route your internet traffic through remote road warrior client, you need to establish one more tunnel like GRE in the IPSec tunnel. You need to encapsulate your IP traffic into the GRE and then into the IPSec tunnel. This might be a probable option foe your case.<br><br></div>Regards,<br></div>Sridhar<br></div><div class="gmail_extra"><br><div class="gmail_quote"><div><div class="h5">On Sun, Jun 26, 2016 at 9:14 PM, Artyom Aleksyuk <span dir="ltr"><<a href="mailto:artyom.h31@gmail.com" target="_blank">artyom.h31@gmail.com</a>></span> wrote:<br></div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class="h5"><div dir="ltr">Hello.<div>I have an IPsec server running strongSwan which allows several remote machines to access a local network (via FARP and DHCP plugins).</div><div>Also I have a remote machine with an IPsec client (strongSwan too).</div><div>I want to force one of the processes running on the IPsec server machine to route all it's traffic through the IPsec client. It's still allowed to access other machines in the LAN, but Internet traffic should go only through the client.</div><div>How can I do this? A server runs Linux kernel version 3.10.</div></div>
<br></div></div>_______________________________________________<br>
Users mailing list<br>
<a href="mailto:Users@lists.strongswan.org" target="_blank">Users@lists.strongswan.org</a><br>
<a href="https://lists.strongswan.org/mailman/listinfo/users" rel="noreferrer" target="_blank">https://lists.strongswan.org/mailman/listinfo/users</a><br></blockquote></div><br></div>
</blockquote></div><br></div>