<div dir="ltr">On Windows client i will add static route and Set-VpnConnection -Name "VPN" -SplitTunneling 1 -AllUserConnection. All works fine.<div><br></div><div>My server configuration file:</div><div><br></div><div><div>config setup                                                                     </div><div>         uniqueids = no                                                          </div><div>conn %default                                                                    </div><div>        esp = aes-aes256-sha-modp1024,aes256-sha512-modp4096                     </div><div>        ike = aes-aes256-sha-modp1024,aes256-sha512-modp4096                     </div><div>                                                                                 </div><div>        dpdaction = clear                                                        </div><div>        dpddelay = 35s                                                           </div><div>        dpdtimeout = 2000s                                                       </div><div>        fragmentation = yes                                                      </div><div>        rekey = no                                                               </div><div>                                                                                 </div><div>        left = %any                                                              </div><div>        leftfirewall = yes                                                       </div><div>        leftcert = fullchain.pem                                                 </div><div>        leftsendcert = always                                                    </div><div>                                                                                 </div><div>        right = %any                                                             </div><div>        rightsourceip = <a href="http://192.168.103.0/24">192.168.103.0/24</a>                                         </div><div>        rightdns = 8.8.8.8,8.8.4.4                                               </div><div>        eap_identity = %any                                                      </div><div>                                                                                 </div><div>conn IPSec-IKEv2                                                                 </div><div>        keyexchange = ikev2                                                      </div><div>        auto = add                                                               </div><div>                                                                                 </div><div>conn IPSec-IKEv2-EAP                                                             </div><div>        also = "IPSec-IKEv2"                                                     </div><div>        rightauth = eap-radius                                                   </div><div>        leftid = DOMAIN.LTD (on my second white IP)                                                     </div><div>        auto = add                                                               </div><div>        leftsubnet=IP/32                                                         </div><div>                                                                                 </div><div>conn IKEv2-MSCHAPv2-Apple                                                        </div><div>        also = "IPSec-IKEv2"                                                     </div><div>        ike = aes256-sha256-modp1024,3des-sha1-modp1024,aes256-sha1-modp1024!    </div><div>        esp = aes256-sha256,3des-sha1,aes256-sha1!                               </div><div>        rightauth=eap-radius                                                     </div><div>        leftid = DOMAIN.LTD                                                      </div><div>        leftsubnet=IP/32                                                         </div></div><div><br></div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">2017-09-29 13:38 GMT+03:00 Noel Kuntze <span dir="ltr"><<a href="mailto:noel.kuntze+strongswan-users-ml@thermi.consulting" target="_blank">noel.kuntze+strongswan-users-ml@thermi.consulting</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">If I could aware a star for disinformation, this one would get it.<br>
<br>
1) The article about interoperability with Windows explains how to get routes working for crappy Windows clients.<br>
2) As Anvar explained, leftsubnet sets the local traffic selector, which defines which destinations are allowed by the IPsec policies. Set leftsubnet=<a href="http://0.0.0.0/0" rel="noreferrer" target="_blank">0.0.0.0/0</a>.<br>
3) You can not only allow certain protocols through the tunnel without blackholing all other protocols, if the sender uses route basec IPsec.<br>
4) You likely use libipsec. Stop doing that, it sucks. It is likely the cause of Android and other clients working, but not Windows with your wrong configuration, if you tested Android and other clients with leftsubnet=[IP]/32.<br>
<br>
Kind regards<br>
<br>
Noel<br>
<span class=""><br>
On 29.09.2017 12:23, Anvar Kuchkartaev wrote:<br>
> ‎I don't think the windows is able to obtain routes from IKE vpn server. Windows must be using <a href="http://0.0.0.0/0" rel="noreferrer" target="_blank">0.0.0.0/0</a> route to your VPN server and sending all traffic to it but if you configured left=[IP]/32 from VPN server side then all other traffic than that IP not authorised to pass through tunnel. I don't know how to configure VPN routes in windows and I would rather recommended to configure router standing between windows and internet and share the tunnel of router with other devices connected to it.<br>
><br>
> Anvar Kuchkartaev <br>
> <a href="mailto:anvar@anvartay.com">anvar@anvartay.com</a> <br>
</span>> *From: *Aleksey Kravchenko<br>
> *Sent: *viernes, 29 de septiembre de 2017 12:08 p.m.<br>
> *To: *Noel Kuntze; <a href="mailto:users@lists.strongswan.org">users@lists.strongswan.org</a><br>
> *Subject: *Re: [strongSwan] Strongswan. Address definition/Routing.<br>
<span class="">><br>
><br>
> Hello again! I need your help.<br>
><br>
> The problem is that the traffic through VPN is sent only when accessing one specific IP. I pointed this IP to leftsubnet = IP / 32 and everything works well for linux, macos, android, ios. But Windows in this case does not see the Internet and only the address specified in leftsubnet is available to it.<br>
><br>
> And is it still possible to specify specific ports? For example, you can only take http and https through VPN. The protoport option did not help.<br>
> Thank you in advance!<br>
><br>
</span>> 2017-09-25 16:10 GMT+03:00 Aleksey Kravchenko <<a href="mailto:gmkrab@gmail.com">gmkrab@gmail.com</a> <mailto:<a href="mailto:gmkrab@gmail.com">gmkrab@gmail.com</a>>>:<br>
><br>
>     Good.<br>
>     Thank you, Noel.<br>
><br>
>     2017-09-25 16:08 GMT+03:00 Noel Kuntze <noel.kuntze+strongswan-users-<wbr>ml@thermi.consulting <mailto:<a href="mailto:noel.kuntze%2Bstrongswan-users-ml@thermi.consulting">noel.kuntze+<wbr>strongswan-users-ml@thermi.<wbr>consulting</a>>>:<br>
<span class="">><br>
>         Hi,<br>
><br>
>         No. As I previously wrote, this is a system intrinsic problem.<br>
><br>
>         Kind regards<br>
><br>
>         Noel<br>
><br>
>         On 25.09.2017 15:03, Aleksey Kravchenko wrote:<br>
>         > Hello. I managed to solve the problem with routes on windows and macos. For this purpose, a second white IP was used.<br>
>         > p.s. Are there any ways or tricks to solve this problem with the same IP address?<br>
>         ><br>
</span>>         > 2017-09-14 11:03 GMT+03:00 Aleksey Kravchenko <<a href="mailto:gmkrab@gmail.com">gmkrab@gmail.com</a> <mailto:<a href="mailto:gmkrab@gmail.com">gmkrab@gmail.com</a>> <mailto:<a href="mailto:gmkrab@gmail.com">gmkrab@gmail.com</a> <mailto:<a href="mailto:gmkrab@gmail.com">gmkrab@gmail.com</a>>>>:<br>
<span class="">>         ><br>
>         >     Hello, Noel. Thanks for the answer. Unfortunately, there is no way to bypass.As a solution we can use the second white IP for Strongswan, and the web server on the 1st IP.<br>
>         ><br>
</span>>         >     2017-09-13 22:17 GMT+03:00 Noel Kuntze <noel.kuntze+strongswan-users-<wbr>ml@thermi.consulting <mailto:<a href="mailto:noel.kuntze%2Bstrongswan-users-ml@thermi.consulting">noel.kuntze+<wbr>strongswan-users-ml@thermi.<wbr>consulting</a> <mailto:<a href="mailto:noel.kuntze%252Bstrongswan-users-ml@thermi.consulting">noel.kuntze%<wbr>2Bstrongswan-users-ml@thermi.<wbr>consulting</a>>>>:<br>
<div class="HOEnZb"><div class="h5">>         ><br>
>         >         Hi,<br>
>         ><br>
>         >         That is because Windows and MacOS implement crappy route based IPsec which conceptually can not protect traffic to the IKE peer's<br>
>         >         address (unless policy based routing is used, which neither Windows nor MacOS implement).<br>
>         ><br>
>         >         Kind regards<br>
>         ><br>
>         >         Noel<br>
>         ><br>
>         >         On 13.09.2017 17:14, Aleksey Kravchenko wrote:<br>
>         >         > Hello.I need your advice.<br>
>         >         > The work of Strongswan + IKEv2 is configured. Everything works fine (on iOS, macOS, windows, linux), but I noticed strange behavior in VPN's work. There is a server on which Strongswan and Nginx are installed.When you connect to the VPN and go to the site which is located in the same place as the strongswan daemon, the nginx log shows different addresses for connections. For instance:android / linux -> login from the address issued by the VPN  (for example, 192.168.1.2).<br>
>         >         > windows / macos -> login from the usual address (provider address).<br>
>         >         > But if you go to the IP detection server, the result for all devices is the same: you logged in from the VPN server.Maybe you have any thoughts about this? Thank you!<br>
>         ><br>
>         ><br>
>         ><br>
><br>
><br>
><br>
><br>
<br>
</div></div></blockquote></div><br></div>