<div dir="ltr">Hello, Noel. Thanks for the answer. Unfortunately, there is no way to bypass.As a solution we can use the second white IP for Strongswan, and the web server on the 1st IP.<br></div><div class="gmail_extra"><br><div class="gmail_quote">2017-09-13 22:17 GMT+03:00 Noel Kuntze <span dir="ltr"><<a href="mailto:noel.kuntze+strongswan-users-ml@thermi.consulting" target="_blank">noel.kuntze+strongswan-users-ml@thermi.consulting</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi,<br>
<br>
That is because Windows and MacOS implement crappy route based IPsec which conceptually can not protect traffic to the IKE peer's<br>
address (unless policy based routing is used, which neither Windows nor MacOS implement).<br>
<br>
Kind regards<br>
<span class="HOEnZb"><font color="#888888"><br>
Noel<br>
</font></span><div class="HOEnZb"><div class="h5"><br>
On 13.09.2017 17:14, Aleksey Kravchenko wrote:<br>
> Hello.I need your advice.<br>
> The work of Strongswan + IKEv2 is configured. Everything works fine (on iOS, macOS, windows, linux), but I noticed strange behavior in VPN's work. There is a server on which Strongswan and Nginx are installed.When you connect to the VPN and go to the site which is located in the same place as the strongswan daemon, the nginx log shows different addresses for connections. For instance:android / linux -> login from the address issued by the VPN (for example, 192.168.1.2).<br>
> windows / macos -> login from the usual address (provider address).<br>
> But if you go to the IP detection server, the result for all devices is the same: you logged in from the VPN server.Maybe you have any thoughts about this? Thank you!<br>
<br>
</div></div></blockquote></div><br></div>