Set up strongswan server

This results in a set of firewall rules, part of which is equivalent to

iptables -A INPUT -s 192.168.2.0/24 -j ACCEPT

The rule applies to both VPN and non-VPN traffic, no matter what the zone's name suggests.
Since the IP source address could be spoofed, this is not secure.

I tried to improve it with the following options:

        option extra_src '-m policy --dir in --pol ipsec --proto esp'
        option extra_dest '-m policy --dir out --pol ipsec --proto esp'

Together with an IPsec configuration for ESP tunnel mode, the IP addresses are known to be authenticated and can be relied upon for filtering.

Further, I would add

        option mtu_fix '1'                                

to the VPN zone. It might obviate the need for the kernel-netlink settings, but I haven't done any rigorous testing.

With some more extra_src and extra_dest options it is also possible to lift the zone ordering requirement. See my previous post for details.