I'm seeing remote clients on the far-end of an IPSec tunnel appear to my PC as coming from my LAN IP of our Untangle NG (i.e. the LAN IP that is also the default gateway of my PC).
However, when I look at the sessions on the NG itself, it correctly shows the endpoint IPs on either end of the session.
Is there a way that I can stop the remote source IPs from being NAT'd by my LAN when they come across the tunnel?
Here's an example of what I see on my PC's netstat:
Here's a screenshot of the sessions shown on Untangle:Code:TCP 192.168.131.204:445 192.168.131.2:51594 ESTABLISHED 4 TCP 192.168.131.204:445 192.168.131.2:53939 ESTABLISHED 4
NG Sessions.png