Dual VPN clients has always been supported. There is nothing new there. The fix was specific to policy routing.
Sent from my Nexus 9 using Tapatalk
What will happen if there are conflicts in the two routing policy rules and both tunnels are up? eg policy ruleset of both openvpn clients has same IP going through tunnel.
ip rule
0: from all lookup local
1200: from 10.88.8.142 lookup vpn2
1201: from 10.88.8.142 lookup hma
30000: from all fwmark 0x1 lookup hma
30000: from all fwmark 0x2 lookup vpn2
30001: from all iif wl1.3 lookup hma
30001: from all iif wl0.3 lookup hma
32766: from all lookup main
32767: from all lookup default
Client 1 rules use a PRIO of 1000 to 1399 (first 200 are for WAN, next ones are for tunnel), and client 2 rules are 1400 to 1799 (same order).
ASUS apparently reserves PRIO 100,200 and 400 for Dual WAN which seemingly limits the number of any higher priority rules to PRIO 1-99? although clearly as they define multiple rules for each PRIO group it appears that having individual PRIO values for your rules isn't necessary? i.e. you could (to match your routing tables identifiers) simply designate PRIO 10000 as WAN, 11100 as VPN1 and 11200 as VPN2 ?
From what I read in the iproute2 documentation, each rule must have a unique PRIO (even tho the userspace tool seem to allow you to define multiple rules on the same PRIO).
I have no problem in bumping my rules to the 10000 range. However I don't want to change Asus's own, because that would require me to constantly monitor any future changes to ensure they remain in-sync. This would make it too difficult for me to deal with future GPL merges.
Both ASUS and yourself own your proprietary code, so wannabe scripters like myself have to work around your designs, and I know I couldn't perform the tedious GPL merges that you undertake with each of your firmware releases - 6x20mins compile time only to find you missed something can't be fun but is appreciated by the community.
One final suggestion/request, do you think default fwmark RPDB entries for 111/112 (as shown in my post #6) is a good idea?
This would certainly simplify advanced selective routing based on src/dest/port criteria which currently isn't (yet! ) available via the VPN GUI by taking advantage of your selective routing design.
Great to hear about the future support for 5 VPN clients - I could definately use that. I need it to get around geoblocking - not for security.
would it be possible to save changes to policy routing (while the client is connected) without forcing the client to go through the connection process again?
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!