wl0.1 vpn-usa 2.4GHz Guest 1 (192.168.102.0/24) routed through tunnel VPN Client 2 (***ERROR VPN is DOWN) is MISSING a valid DNS entry in '-t nat DNSVPN2' via bridge:br2
Yes......you need a script to create a VLAN and then map this VLAN port to the VPNThanks for sending the script, Martineau, and everything seems to work quite well!
I'm wondering if there is a way to link a specific ethernet port to a vpn?
./GS108.sh status
IoT vlan30 ACTIVE devices (ARP only accurate within 60secs?)
============================================================
Internet vlan40 ACTIVE devices (ARP only accurate within 60secs?)
=================================================================
10.88.40.15 xx:xx:xx:xx:xx:xx Samsung-TV (?)
VPN (vlan50) br1 ACTIVE devices (ARP only accurate within 60secs?)
==================================================================
10.88.101.16 xx:xx:xx:xx:xx N/A (HP-DM1.martineau.lan)
./VLANSwitch.sh 50 status verbose
VPN vlan50 Bridge Status
========================
br1 8000.ac9e177ee4a0 no wl0.3
vlan50
br1 Link encap:Ethernet HWaddr XX:XX:XX:XX:XX:XX
inet addr:10.88.101.1 Bcast:10.88.101.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:71215 errors:0 dropped:0 overruns:0 frame:0
TX packets:131234 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:5609552 (5.3 MiB) TX bytes:163299414 (155.7 MiB)
Apologies, it is actually a poorly worded (aka reused ) Warning message informing you that you are not using 'Accept DNS Configuration=EXCLUSIVE' so you are open to DNS leaks as discussed earlier in the thread.Also, I'm getting this error, even though the vpn bridge with the guest network is working:
Code:wl0.1 vpn-usa 2.4GHz Guest 1 (192.168.102.0/24) routed through tunnel VPN Client 2 (***ERROR VPN is DOWN) is MISSING a valid DNS entry in '-t nat DNSVPN2' via bridge:br2
EDIT: Looks like things aren't set up quite right after all, maybe related to the error above.
When I have used with WiFiVPN to set up a guest network to connect via VPN, and then connect to my regular (non-guest) WiFi network, my ip address still shows I'm connected through the VPN.
Yes......you need a script to create a VLAN and then map this VLAN port to the VPN
e.g...
Have you enabled Selective Routing?
...
or have you simply started the VPN Cient and routed ALL traffic via the tunnel?
NOTE: You may omit the 'DummyVPN2' entry but without it (or a real LAN IP address explicitly routed via the tunnel) you won't be able to get rid of the Warning message.
The clue is hiding in post #64I think I've found enough to create a script that creates a VLAN, here. But then mapping that port to the VPN, I'm stumped.
./VLANSwitch.sh 50 status verbose
VPN vlan50 Bridge Status
========================
br1 8000.xxxxxxxxxxxx no wl0.3
vlan50
#============================================================= © 2016-2018 Martineau 'Router-on-a-stick'
#
# Configure RT-AC68U LAN Port X as VLAN Trunk for tagged VLAN nnn to downstream switch(s) on separate subnet using '/etc/dnsmasq.conf'
#
#
# Usage: VLANSwitch ['help'|'-h'] | [ [vlan_id] [switch_port] ]
# [ ['status' ['verbose']] ['del'] ['vpn'[n]] ['vlanfw'] ['nodnsmasq'] ['autodnsmasq'] [alias='vlan_alias'] [debug]
#
# VLANSwitch 200
# Switch port 4 will have vlan200 tagged to it
# VLANSwitch 200 del
# Switch port 4 will have vlan200 removed
# VLANSwitch 50 status
# Show the connected VLAN devices (or Bridge if VLAN is enslaved to one)
# VLANSwitch 50 status verbose
# Show the vlan configuration and statistics etc.
# VLANSwitch 20 3 vpn2 alias=NewYork
# Switch port 3 will have vlan20 tagged to it and will be forced via the VPN Client 2 (on bridge br2)
# and will have alias "NewYork" assigned in the config - assuming VPN Client 2 is via USA! ;-)
# VLANSwitch 20 3 vpn2
# Switch port 3 will have vlan20 tagged to it and will be forced via the VPN Client 2 (on bridge br2)
# and the VPN Client 'description' field in the GUI will be used if available (Firmware >v380.xx) or 'ovpncX' as the alias
# VLANSwitch 30 vpn1 vlanfw
# Switch port 4 will have vlan30 tagged to it and will be forced via the VPN Client 1 (on bridge br1)
# Firewall rules will explicitly use vlan30 rather than vlan+
# VLANSwitch 101 nodnsmasq
# Switch port 4 will have vlan101 tagged to it, and vlan101 does not need to exist in /etc/dnsmasq.conf
# VLANSwitch 101 autodnsmasq
# Switch port 4 will have vlan101 tagged to it, and /jffs/configs/dnsmasq.conf.add will be modified
# NOTE: dnsmasq will be auto-restarted.
i.e. you simply need to add the VLAN to the appropriate bridge (created by WiFiVPN.sh) rather than 'br0', so both interfaces route their traffic via the VPN.
robocfg vlan 1 ports "1 2 3 8t"
robocfg vlan 10 ports "4 8t"
vconfig add eth0 10
ifconfig vlan10 up
brctl addif br3 vlan10
I have sent you a link via PM.Martineau
Can you please be so kind to share with me the wifivpn script mentioned in this thread ?
I have exactly the same problem and this will save me a lot of time and hassle
I have N66U with firmware version 380.65_2
Thanks in advance for your help
I don't think you want to do Step 5.5) Create one 5Ghz Guest SSID with "Access Intranet" set to On
I don't think you want to do Step 5.
i.e. why would you need to allow Intranet (LAN) access when you have the other WiFi SSIDs already configured with LAN access?
NOTE: Whilst use of nat-start was originally recommended, during the boot sequence, this will unfortunately ignore the GUI 'Start with WAN=NO' directive, as the script would always attempt to start the VPN Client - potentially against the admins' wishes.
Consequently it is advisable to call WiFiVPN.sh asynchronously from the openvpn-event vpnclientX-route-up script.
The use case for step 5 is to allow all devices regardless of which SSID they are connected to continue to communicate locally. For instance, if I have an Apple TV on the SSID mapped to VPN, and an iPhone or iPad on and SSID mapped to standard Wan internet, they could still communicate via technologies like Airplay. I'm assuming this would only be possible if I enable allow intranet on the SSID mapped to VPN?
So should Step 11 be: Add appropriate statement(s) to the 'vpnclientX-route-up' script using text editor.
No idea - never owned any Apple kit, but since Selective Routing is implemented, then I doubt it will work without custom changes.
I suggest you get the script working first, but I advise you to use nat-start rather than risk breaking the VPN start up.
I figured out what the problem was. After rebooting, my VLAN script tried to add vlan10 to br3 but Martineau's WiFiVPN.sh script hadn't yet been called, so there was no br3 yet.Unfortunately, this script only works until I reboot.
brctl addif br3 vlan10
Any idea howto do it?
/jffs/scripts/WiFiVPN.sh MYWIFI_Guest1_VPN1 1
/jffs/scripts/WiFiVPN.sh MYWIFI_Guest1_VPN2 2
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!