Followed this tutorial to get my SurfShark IPSec VPN handling all outbound traffic, but want my outbound SSL VPN traffic for work to go straight out my ISP.
I've read a bunch of bypass VPN for Netflix and such articles and came up with...
Added a new default route with a routing-Mark and a Mangle based on destination IP and/or destination port with a new-routing-mark, but everything still going to SurfShark.
Now I am just trying to get all HTTP & HTTPS traffic to bypass SurfShark since it is easiest to test and can't even make that work. All the traffic is hitting the Mangle, but still going in the tunnel!!!???!!!??? Any help appreciated.
/ip route
add distance=1 gateway=96.38.160.1 routing-mark=BypassVPN
/ip firewall mangle
add action=mark-routing chain=prerouting dst-port=80,443 new-routing-mark=\
BypassVPN passthrough=no protocol=tcp src-address=10.236.1.0/24
Other relevant config...
/ip firewall address-list
add address=10.236.1.0/24 list=local4VPN
/ip firewall nat
add action=masquerade chain=srcnat out-interface-list=WAN
/ip ipsec mode-config
add name=USSFO responder=no src-address-list=local4VPN
/ip ipsec policy group
add name=USSFO
/ip ipsec profile
add name=USSFO
/ip ipsec peer
add address=us-sfo.prod.surfshark.com exchange-mode=ike2 name=USSFO profile=\
USSFO
/ip ipsec proposal
add name=USSFO pfs-group=none
/ip ipsec identity
add auth-method=eap certificate=surfshark_ikev2.crt_0 eap-methods=\
eap-mschapv2 generate-policy=port-strict mode-config=USSFO password=\
******************** peer=USSFO policy-template-group=USSFO username=\
********************/ip ipsec policy
add dst-address=0.0.0.0/0 group=USSFO proposal=USSFO src-address=0.0.0.0/0 \
template=yes