[strongSwan] Fwd: Guidance on split-exclude when using Unity plugin
kgardenia42
kgardenia42 at googlemail.com
Thu Feb 7 14:34:06 CET 2013
On Thu, Feb 7, 2013 at 7:51 AM, Martin Willi <martin at strongswan.org> wrote:
> Hi,
>
> Please try to keep the discussion on the mailing list, thanks.
>
>> with the patch www.2600.com gets tunnelled. Expected: it should be
>> tunnelled (not sent via the VPN).
>
>> Unity (ios[2]: 207.99.30.226/32): 192.168.0.2/32 === 207.99.30.226/32 PASS
>
> The bypass policy now looks fine. But as expected, this IP still uses
> the source route, hence the policy does not match. We'd need an
> additional source route for this policy using a higher priority. Did you
> have any success in enforcing 192.168.0.2 as source address for testing?
I'm not sure how to do that. Can you please give me some pointers?
Thanks.
More information about the Users
mailing list