Under the OpenVPN Client tab you can change the DNS mode to exclusive (vs strict) which I think should allow you to allow certain devices to bypass the VPN
but I don't know where to set the devices.
Ah okay! Thank you!Incorrect...setting the DNS mode does not allow you to specify the selective routing of devices via the VPN or WAN.
Select 'Policy Rules'
View attachment 8928
Defaults to WAN....@Martineau If you don't configure a rule for a device, what does it default to? WAN or VPN?
@Martineau If you don't configure a rule for a device, what does it default to? WAN or VPN?
Roku 192.168.1.xxx 0.0.0.0 VPN
Everything 192.168.1.0/24 0.0.0.0 VPN
Roku 192.168.1.xxx 0.0.0.0 WAN
Thanks everyone!Defaults to WAN....
If you have both a VPN rule and WAN rule for the same address, the WAN rule takes precedence (for example a CIDR range to route through the VPN, then an exclusion for a particular address).
Well the clue is in the name 'Selective routing' and also in the GUI
'Rules for routing client traffic through the tunnel (Max Limit : 100)'
So if the table is empty then everything by default is routed via the WAN as is the case expected by 99% of users.
Clearly in my example screenshot, you would think that the two WAN entries are redundant...well they are, but the firmware (used) to force the use of the ISP DNS rather than use the VPN DNS.
1% of users want the meaning of the table entries to be reversed, i.e. everything goes via the VPN, except for those entries in the table that explicitly have a target WAN destination.
Thank God my provider is able to circumvent that issue. It makes my life here that much better.Thanks for the responses, this answers the question.
I fired up my new vpn service last night and Netflix (of course) immediately gave me the infamous proxy message. I really prefer to have my router route everything vpn except the roku. I'll exclude it, I can live with that.
Thank God my provider is able to circumvent that issue. It makes my life here that much better.
BTW, I used to work for the blue oval in Dearborn for 22 years.
Well the clue is in the name 'Selective routing' and also in the GUI
'Rules for routing client traffic through the tunnel (Max Limit : 100)'
So if the table is empty then everything by default is routed via the WAN as is the case expected by 99% of users.
e.g. Everything will use the WAN except the Roku
Code:Roku 192.168.1.xxx 0.0.0.0 VPN
Clearly in my example screenshot, you would think that the two WAN entries are redundant...well technically they are, but for such 'illogical' entries, the firmware (used) to explicity force the use of the ISP DNS rather than use the VPN DNS?
P.S. for the 1% of users that want the meaning of the table entries to be reversed, i.e. everything goes via the VPN, except for those entries in the table that explicitly have a target WAN destination, they will also need an explicit VPN rule for the LAN otherwise the table is not reversed!
e.g. Everything will use the VPN except the Roku
Code:Everything 192.168.1.0/24 0.0.0.0 VPN Roku 192.168.1.xxx 0.0.0.0 WAN
Well the clue is in the name 'Selective routing' and also in the GUI
'Rules for routing client traffic through the tunnel (Max Limit : 100)'
So if the table is empty then everything by default is routed via the WAN as is the case expected by 99% of users.
e.g. Everything will use the WAN except the Roku
Code:Roku 192.168.1.xxx 0.0.0.0 VPN
Clearly in my example screenshot, you would think that the two WAN entries are redundant...well technically they are, but for such 'illogical' entries, the firmware (used) to explicity force the use of the ISP DNS rather than use the VPN DNS?
P.S. for the 1% of users that want the meaning of the table entries to be reversed, i.e. everything goes via the VPN, except for those entries in the table that explicitly have a target WAN destination, they will also need an explicit VPN rule for the LAN otherwise the table is not reversed!
e.g. Everything will use the VPN except the Roku
Code:Everything 192.168.1.0/24 0.0.0.0 VPN Roku 192.168.1.xxx 0.0.0.0 WAN
May 10 13:12:58 openvpn-routing: Configuring policy rules for client 1
May 10 13:12:58 openvpn-routing: Creating VPN routing table
May 10 13:12:59 openvpn-routing: Removing route for 10.55.13.1 to tun11 from main routing table
May 10 13:12:59 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
May 10 13:12:59 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
May 10 13:12:59 openvpn-routing: Removing rule 10001 from routing policy
May 10 13:12:59 openvpn-routing: Removing rule 10101 from routing policy
May 10 13:12:59 openvpn-routing: Adding route for 192.168.1.113 to 0.0.0.0 through WAN
May 10 13:12:59 openvpn-routing: Adding route for 192.168.1.0/24 to 0.0.0.0 through VPN client 1
May 10 13:12:59 openvpn-routing: Tunnel re-established, restoring WAN access to clients
May 10 13:12:59 openvpn-routing: Completed routing policy configuration for client 1
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!