net.enc.in.ipsec_filter_mask = 0net.enc.out.ipsec_filter_mask = 0net.inet.ipsec.filtertunnel = 1net.inet6.ipsec6.filtertunnel = 1
net.enc.in.ipsec_filter_mask = 1net.enc.out.ipsec_filter_mask = 1net.inet.ipsec.filtertunnel = 0net.inet6.ipsec6.filtertunnel = 0
Code: [Select]net.enc.in.ipsec_filter_mask = 0net.enc.out.ipsec_filter_mask = 0net.inet.ipsec.filtertunnel = 1net.inet6.ipsec6.filtertunnel = 1= Enable Packet Filtering and NAT on if_ipsec, if_gre, if_vxlan and if_gif= Disable Packet Filtering and NAT on if_enc0 (Shown as IPsec in the GUI)This is the mode that makes VTI IPsec (and more) filtered, but makes policy based IPsec unfiltered.
Route 10.20.20.0/24 via 192.168.200.2 Route 10.99.99.0/24 via 192.168.200.1 10.99.99.0/24 <------> 192.168.200.1/30 <------> 192.168.200.2/30 <------> 10.20.20.0/24 --------------------------------------------------------- IPsec Tunnel Child: Local 0.0.0.0/0 Remote 0.0.0.0/0
0.0.0.0/0[any] 0.0.0.0/0[any] 172.16.0.190->172.16.0.189 99e0e1c1-285e-45cd-b4ef-61dcc914c879 2 esp ::/0[any] ::/0[any] 172.16.0.190->172.16.0.189 99e0e1c1-285e-45cd-b4ef-61dcc914c879 2 esp 0.0.0.0/0[any] 0.0.0.0/0[any] 172.16.0.190->172.16.0.189 99e0e1c1-285e-45cd-b4ef-61dcc914c879 3 esp ::/0[any] ::/0[any] 172.16.0.190->172.16.0.189 99e0e1c1-285e-45cd-b4ef-61dcc914c879 3 esp 0.0.0.0/0[any] 0.0.0.0/0[any] 172.16.0.189->172.16.0.190 99e0e1c1-285e-45cd-b4ef-61dcc914c879 2 esp ::/0[any] ::/0[any] 172.16.0.189->172.16.0.190 99e0e1c1-285e-45cd-b4ef-61dcc914c879 2 esp 0.0.0.0/0[any] 0.0.0.0/0[any] 172.16.0.189->172.16.0.190 99e0e1c1-285e-45cd-b4ef-61dcc914c879 3 esp ::/0[any] ::/0[any] 172.16.0.189->172.16.0.190 99e0e1c1-285e-45cd-b4ef-61dcc914c879 3 esp