How to do routing on IPsec Site-to-Site tunnel

I have successfully established IPsec Site-to-Site tunnel from OpenWRT to VYOS. Can anyone tell me how to do routing on tunnel.
Here is the output of ipsec statusall command.

root@NE-OS:~# ipsec statusall
Status of IKE charon daemon (strongSwan 5.6.3, Linux 4.9.152, mips):
  uptime: 20 minutes, since Mar 30 14:44:06 2020
  worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 2
  loaded plugins: charon aes des sha1 sha2 md5 gmp random nonce hmac stroke kernel-netlink socket-default updown
Listening IP addresses:
  192.168.1.1
  fdee:8e92:3b7a::1
  103.44.110.91
Connections:
   r2-r2_lan:  103.44.110.91...3.130.91.56  IKEv2
   r2-r2_lan:   local:  [bratwurst] uses pre-shared key authentication
   r2-r2_lan:   remote: [3.130.91.56] uses pre-shared key authentication
   r2-r2_lan:   child:  192.168.1.0/24 === 172.31.1.0/24 TUNNEL
Security Associations (1 up, 0 connecting):
   r2-r2_lan[1]: ESTABLISHED 20 minutes ago, 103.44.110.91[bratwurst]...3.130.91.56[3.130.91.56]
   r2-r2_lan[1]: IKEv2 SPIs: f3ff1a8c59b342ca_i* 783573f064d13e30_r, pre-shared key reauthentication in 2 hours
   r2-r2_lan[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
   r2-r2_lan{1}:  INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: c3486c77_i c5e29d71_o
   r2-r2_lan{1}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 26 minutes
   r2-r2_lan{1}:   192.168.1.0/24 === 172.31.1.0/24
root@NE-OS:~#
root@NE-OS:~#

What routing do you want to do? If you ping from a host in 192.168.1.0/24 towards another host in 172.31.1.0/24, won't it reply back?

Are you thinking of a Route-based VPN?

yes i want route based vpn

not getting reply back