Outbound policy to force IPSEC outbound from LAN clients over PepVPN not working

What am I missing here?
Have a deployment of a BR1 with a PepVPN via a Cloud hosted Fusionhub.
All remote client traffic is being sent via PepVPN. All client traffic is successfully redirected except IPSEC traffic from a VPN appliance on the LAN using UDP 500 which no matter what is being redirected via Cellular WAN and not PepVPN.

Assumed it was NAT-T service passthrough, but on or off traffic still goes out over cellular…

Ideas?

1 Like

If I use ‘send all traffic to’ UDP 500 is routed correctly over the PepVPN - which is fine and gets me out of the mess but is there a way to configured this with individual outbound polices (which is my preference)?

Can’t check now - but maybe this works if using Expert mode in outbound polciies?

1 Like

This is weird.

  1. Enforce outbound policy used ? If priority used, did the “Terminate Sessions on Link Recovery” enabled ?
  2. Did you try to before reboot the device (after disable/enable NAT-T service passthrough) ? This will make sure all session cleared.
1 Like

Tried Enforced with “Terminate Sessions on link Recovery” then tempoarily disabled the LAN ports and re-enabled them to make sure all sessions had to be rebuilt

.
Couldn’t reboot the device as direct internet access (over wifi) was in use and needed to be available, but did disable LAN ports and re-enable them.

Maybe I just had a peculiar situation at the time. Its in and working now (for 5 months or so ) so no need to change anything for now. If I get the chance to test out of hours I will.

1 Like