No, that is not correct: my LAN devices use IP addresses in the
172.16.0.0/24 - 172.16.2.0/24 range:
172.16.0.0/24: clients with an IP address in this subnet are routed directly (NO VPN)
172.16.1.0/24: clients with an IP address in this subnet are routed to VPN #1
172.16.2.0/24: clients with an IP address in this subnet are routed to VPN #2
The WAN is in the 192.168.2.0/24 range.
My laptop has an IP address of
172.16.1.50 and is connected via WIFI from the Asus router.
My ISP modem (
192.168.2.254) is connected to the WAN port.
The VPN rule (VPN, source
172.16.0.1/24) makes sure that traffic of my laptop is routed to the VPN client.
The WAN rule (WAN, destination
192.168.2.0/24) makes sure that devices in the WAN is accesible to my laptop (my ISP modem)
When I do a test with ipleak.net, dnsleaktest.com or the VPN provider's test page, I can see that traffic is routed to the VPN tunnel (routing goes well!).
The problem/issue is that the VPN's DNS server is
not used. Instead the DNS server specified in the WAN settings is used.
DNS leak test from VPN provider:
View attachment 25130
ipleak.net:
View attachment 25131
Whatever I select on the VPN client '
Accept DNS Configuration' setting (Strict or Exclusive), the VPN provider's DNS server is never shown when doing a test.
Update:
After a factory reset with this firmware I configured only one VPN client (DNS in 'exclusive' mode, no policy routing). I still have DNS leaks which is not normal.
After downgrading to alpha4, I noticed the same problem.
Then I downgraded to alpha3 and now it is working again:
View attachment 25133