I found some discussion on this topic here: http://www.snbforums.com/threads/mu...h-kill-switch-functionality.74557/post-715458
That describes my goal. However, I'm not sure how this is accomplished in conjunction with the killswitch script. I am using the internet killswitch script version: 1.1.2, 20-nov-2021 by @eibgrad. I am not currently enabling the Gui killswitch option.
I'm using firmware version 386.3_2 and the reason I am not using the new built-in killswitch is because I noticed the new built-in killswitch never actually blocked any traffic. I read the explanation given here: http://www.snbforums.com/threads/kill-switch-doesnt-work.74948/post-717509
I interpreted that to mean that the built-in killswitch will not work in my case -- i.e., my router is a DHCP client of my ISP's modem. So, first question, did I understand that correctly?
Assuming I did, what is the right way to implment failover from VPN provider #1 to provider #2 together with killswitch script functionality when the router is a DHCP client of my ISP's modem?
Extra background, if needed:
I use two different openvpn client configurations. (ExpressVPN is currently my main provider, and PureVPN is the secondary.) For each one, I started using the ovpn remote-random config suggested by @eibgrad in this post. Each ovpn config has about 5 different remotes configured.
I'm currently using "Yes (all)" for "redirect internet traffic through tunnel" and I do not have any VPN Director rules at the moment.
In your case, if your intent is to have a "failover" OpenVPN client, you could activate OpenVPN client #1 and #2 w/ identical policy routing rules, but only enable the kill switch for OpenVPN client #2. If OpenVPN client #1 fails (or you intentionally stop it), those same clients simply get rerouted over to OpenVPN client #2. If it fails/stops as well, they get blocked from the WAN.
That describes my goal. However, I'm not sure how this is accomplished in conjunction with the killswitch script. I am using the internet killswitch script version: 1.1.2, 20-nov-2021 by @eibgrad. I am not currently enabling the Gui killswitch option.
I'm using firmware version 386.3_2 and the reason I am not using the new built-in killswitch is because I noticed the new built-in killswitch never actually blocked any traffic. I read the explanation given here: http://www.snbforums.com/threads/kill-switch-doesnt-work.74948/post-717509
Note, this is a particularly important change for anyone who's running Merlin and the OpenVPN client(s) on a secondary router, daisy-chained behind the primary router. Access to the upstream private network of the primary router is normally possible w/ the built-in kill switch since what is actually blocked is the default gateway associated w/ the WAN, NOT the WAN itself. But my script *does* block the WAN, and so access to the upstream private network requires a VPN Director rule to that effect, and this update to the script.
I interpreted that to mean that the built-in killswitch will not work in my case -- i.e., my router is a DHCP client of my ISP's modem. So, first question, did I understand that correctly?
Assuming I did, what is the right way to implment failover from VPN provider #1 to provider #2 together with killswitch script functionality when the router is a DHCP client of my ISP's modem?
Extra background, if needed:
I use two different openvpn client configurations. (ExpressVPN is currently my main provider, and PureVPN is the secondary.) For each one, I started using the ovpn remote-random config suggested by @eibgrad in this post. Each ovpn config has about 5 different remotes configured.
I'm currently using "Yes (all)" for "redirect internet traffic through tunnel" and I do not have any VPN Director rules at the moment.
Last edited: