AMomchilov
New Around Here
I committed the cardinal sin of updating my RT-AC68U's firmware (to 386.4) without backing up the configuration. (I do have a backup, but it's a few months old, and I'd rather just roll-forward with a fix than roll-back.)
I only noticed and learned about the VPN Director after seeing my Pi-hole's DNS stop working. According to this thread, the old configuration should have been migrated via some auto-generated VPN director rules. This doesn't seem to have happened for me.
My Pi-hole was set up on a free-teir Google Cloud VM using these instructions. The Pi-hole's DNS server is not exposed publicly, instead, my router connects to a VPN server on the Pi-hole, and accesses its DNS server privately.
My router's subnet is
My Pi-hole's VPN server assigned the Pi-hole itself to
On my router, I had
Here is my VPN client page. The only thing I changed after the update was "Redirect Internet traffic through tunnel" from "No" to "VPN Director (policy rules)", which I figured would be necessary to use the routing rules that I would need. A crispier image is available here:
Interestingly, note that it says "Connected (Local: 10.8.0.2 - Public: unknown)". Is that "unknown" indicative of a root cause, or just another symptom of being unable to connect to
I tried my hand at making my own VPN director rule. Here's what I currently have:
I tried my best from what I could pick up from the wiki and various forum threads, but I haven't really found any end-user documentation. From what I can tell, most of these things were written with network professionals in mind. My best guess so far is that:
Attempts to
Clearly I'm doing something wrong, could somebody please point me in the right direction?
I only noticed and learned about the VPN Director after seeing my Pi-hole's DNS stop working. According to this thread, the old configuration should have been migrated via some auto-generated VPN director rules. This doesn't seem to have happened for me.
My Pi-hole was set up on a free-teir Google Cloud VM using these instructions. The Pi-hole's DNS server is not exposed publicly, instead, my router connects to a VPN server on the Pi-hole, and accesses its DNS server privately.
My router's subnet is
10.0.0.0/16
.My Pi-hole's VPN server assigned the Pi-hole itself to
10.8.0.1
, and my router to 10.8.0.2
.On my router, I had
10.8.0.1
configured as the sole DNS server:Here is my VPN client page. The only thing I changed after the update was "Redirect Internet traffic through tunnel" from "No" to "VPN Director (policy rules)", which I figured would be necessary to use the routing rules that I would need. A crispier image is available here:
Interestingly, note that it says "Connected (Local: 10.8.0.2 - Public: unknown)". Is that "unknown" indicative of a root cause, or just another symptom of being unable to connect to
10.8.0.1
? I've confirmed from my OpenVPN server's logs that the client is connecting and hand-shaking successfully.I tried my hand at making my own VPN director rule. Here's what I currently have:
I tried my best from what I could pick up from the wiki and various forum threads, but I haven't really found any end-user documentation. From what I can tell, most of these things were written with network professionals in mind. My best guess so far is that:
- If a particular IP (or range of IPs) is set as "Local IP", then all egress traffic from those gets routed via the listed interface (e.g. the VPN tunnel).
- If a particular IP (or range of IPs) is set as "Remote IP", then attempts to connect *to* those IPs happens by first routing via the listed interface (e.g. the VPN tunnel).
10.8.0.1
as the Remote IP, so that any device on my network can connect to 10.8.0.1 by going over OVPN1.Attempts to
ping 10.8.0.1
from my computer (or directly from my router) just time out.Clearly I'm doing something wrong, could somebody please point me in the right direction?