@jimp:
That's just how IPsec operates currently. The traffic follows the routing table, so unless you have a route telling it to go "out" the LAN, it will not be sourced from the LAN and will end up going out WAN.
If you want better control over the VPN routing, you'll need to use a routed VPN setup such as OpenVPN or IPsec in transport mode + GRE. OpenVPN is much easier if the other side supports it.
If your WAN has a static IP, you might be able to work around that by adding another IPsec Phase 2 to cover the path from your WAN IP to the 10.10.10.x network on both ends.
Thanks Jim,
I tried to create a 2nd phase 2 on both pfSense Routers without success.
I set the 2nd PH2 to,
Tunnel IPv4 (Also tried to change the Type to WAN Subnet)
Type - Address
xxx.xxx.xxx.xxx / 32 (WAN address)
Nat/BINAt - None
Network - 10.10.1.0 /24 (Tried to set this as the remote router 10.10.1.1 /32
ESP
tried AES, than Blowfish separately. (all on Auto)
Tried with one or several Hashes
PFS 512,1024,2048, OFF
No Luck. Also tried to turn on "Prefer older IPsec SAs"
First PH is solid, First 2nd phase no issue either. ESP 2048, AES256, SHA512
I will try to debug with an ssh shell using racoon -F -d -v -f /var/etc/racoon.conf
Thanks.