Yeah, I’ve tried that also, but did’t work even tried to move that rule up. I guess I’m missing something here, like correct configuring routing while VPN
Hm, the log says one interesting thing which I cannot decipher:
14:59:47 ipsec TSi in tunnel mode replaced with config address: 192.168.77.0/24
14:59:47 ipsec TSr in tunnel mode replaced with split subnet: 192.168.5.0/24
14:59:47 ipsec canditate selectors: 192.168.5.0/24 <=> 192.168.77.253
So either use of mode-config causes RouterOS to ignore the traffic selectors (policies) suggested by the peer (which has learned them from the RouterOS via mode-config anyway) and to replace them by those locally generated from the split-include data, and due to a bug it only takes into account the first subnet in the list, or the remote peer doesn’t ask for the second subnet in the list. It’s unfortunately not visible from the log whether the client sends any traffic selector list at all and I’m not that deep into how exactly mode-config works (i.e. whether it just delivers the subnet list to the client and the client sends back the selector list like when mode-config is not used or whether the mode-config data are used locally and no selector list from the client is expected to come).
I would suggest to send those files along with supout.rif to support@mikrotik.com.
Maybe it’s not that it only takes the first one but that it doesn’t take the last one, so try to add one bogus subnet to the end of the list and see what happens
I’ve asked support, they said that my client doesn’t support split mode, though it’s obvious that routes was pushed successfully.
But I found a workaround how to deal with it.
split-include=192.168.4.0/22
Don’t know why it doesn’t work with 5.0/23, got an error
value of subnet4 must have all host bits zero, as in 192.168.4.0/23
So 192.168.5.0 is not a subnet address for a /23 mask, for such mask it is a device address in the middle of 192.168.4.0/23 - which in turn does not include 192.168.6.0/24. On the other hand 192.168.4.0/22 covers the range from 192.168.4.0 till 192.168.7.255, and as you have specially asked for 192.168.5.0/24 and 192.168.6.0/24, I ws expecting that 192.168.4.0/24 and 192.168.7.0/24 are used for different purposed on one of the ends of the tunnel and therefore should not be routed into the tunnel.