The output of command "show vpn ipsec connections" shows the passthrough tunnel as down even though the traffic goes through it, needs to show as up.
vyos@vyos:~$ show vpn ipsec connections Connection State Type Remote address Local TS Remote TS Local id Remote id Proposal --------------------------- ------- ------ ---------------- -------------- -------------- ----------- ----------- ------------------------------------- vpn_01 up IKEv2 10.110.1.52 - - 10.110.2.52 10.110.1.52 AES_CBC/256/HMAC_SHA2_512_256/ECP_256 vpn_01-tunnel-0 up IPsec 10.110.1.52 10.110.10.0/24 10.110.14.0/24 10.110.2.52 10.110.1.52 AES_CBC/128/HMAC_SHA2_512_256/None vpn_02 up IKEv2 10.110.1.52 - - 10.110.2.62 10.110.1.52 AES_CBC/256/HMAC_SHA2_512_256/ECP_256 vpn_02-tunnel-0 up IPsec 10.110.1.52 10.110.10.0/24 10.110.0.0/16 10.110.2.62 10.110.1.52 AES_CBC/128/HMAC_SHA2_512_256/None vpn_02-tunnel-0-passthrough down IPsec 10.110.1.52 10.110.10.0/24 10.110.10.0/24 10.110.2.62 10.110.1.52 -
vyos@vyos:~$ sudo swanctl -L
vpn_01: IKEv2, no reauthentication, rekeying every 10800s, dpd delay 3s
local: 10.110.2.52
remote: 10.110.1.52
local pre-shared key authentication:
id: 10.110.2.52
remote pre-shared key authentication:
id: 10.110.1.52
vpn_01-tunnel-0: TUNNEL, rekeying every 3272s, dpd action is trap
local: 10.110.10.0/24
remote: 10.110.14.0/24
vpn_02: IKEv2, no reauthentication, rekeying every 10800s, dpd delay 3s
local: 10.110.2.62
remote: 10.110.1.52
local pre-shared key authentication:
id: 10.110.2.62
remote pre-shared key authentication:
id: 10.110.1.52
vpn_02-tunnel-0: TUNNEL, rekeying every 3272s, dpd action is trap
local: 10.110.10.0/24
remote: 10.110.0.0/16
vpn_02-tunnel-0-passthrough: PASS, no rekeying, dpd action is none
local: 10.110.10.0/24
remote: 10.110.10.0/24
vyos@vyos:~$ sudo swanctl -l
vpn_01: #22, ESTABLISHED, IKEv2, 3f1de8229d55cfa7_i 0664d5dc1354f279_r*
local '10.110.2.52' @ 10.110.2.52[500]
remote '10.110.1.52' @ 10.110.1.52[500]
AES_CBC-256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_256
established 9290s ago, rekeying in 505s
vpn_01-tunnel-0: #67, reqid 1, INSTALLED, TUNNEL, ESP:AES_CBC-128/HMAC_SHA2_512_256/ECP_256
installed 2806s ago, rekeying in 269s, expires in 794s
in c55bb8ac, 0 bytes, 0 packets
out cb217d75, 0 bytes, 0 packets
local 10.110.10.0/24
remote 10.110.14.0/24
vpn_02: #21, ESTABLISHED, IKEv2, 952d25710a76d3bd_i* 8f25216780f0f4b5_r
local '10.110.2.62' @ 10.110.2.62[500]
remote '10.110.1.52' @ 10.110.1.52[500]
AES_CBC-256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_256
established 9475s ago, rekeying in 384s
vpn_02-tunnel-0: #68, reqid 2, INSTALLED, TUNNEL, ESP:AES_CBC-128/HMAC_SHA2_512_256/ECP_256
installed 2262s ago, rekeying in 787s, expires in 1338s
in c758ec65, 0 bytes, 0 packets
out ce6e495f, 0 bytes, 0 packets
local 10.110.10.0/24
remote 10.110.0.0/16In a recent commit VPN IPsec unexpected passthrough logic was fixed.