<div dir="ltr">Thanks you for your input Noel. it is really appreciated. <div>So you mean i delete leftsubnet parameter thats is sufficient and tunnel will work.</div><div><br></div><div>Thanks,</div><div>Yousuf</div></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Mar 16, 2017 at 10:36 PM, Noel Kuntze <span dir="ltr"><<a href="mailto:noel@familie-kuntze.de" target="_blank">noel@familie-kuntze.de</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On 16.03.2017 07:29, Muhammad Yousuf Khan wrote:<br>
><br>
> There is a requriment from our client that we need a ipsec tunnel for communication.<br>
> as per our experience with Openvpn we can do that very easily however IPsec works very differently therefore i need your assistence.<br>
<br>
</span>Policy based IPsec (which is used by default with strongswan) doesn't require special network devices.<br>
Traffic is protected transparently on the physical interface. There's no problem with routing.<br>
<span class=""><br>
> now here is the confusion part leftsubnet is technically called encryption domain in Cisco.<br>
> so how come my public IP of a cloud VM can be in both role as remote peer and encryption domain? this is very confusing part.<br>
<br>
</span>IKE packets are excepted from IPsec processing. Anything else is subject to it. It works without adding special routes<br>
to the routing table(s).<br>
<span class="HOEnZb"><font color="#888888"><br>
<br>
--<br>
<br>
Mit freundlichen Grüßen/Kind Regards,<br>
Noel Kuntze<br>
<br>
GPG Key ID: 0x63EC6658<br>
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658<br>
<br>
<br>
</font></span></blockquote></div><br></div>