eibgrad
Part of the Furniture
Hi @eibgrad and @ZebMcKayhan. Thank you both for your replies, I think it is fair to say that I am moving from 'did not know that I did not know' to 'knowing that I do not know' but I am still new to this (and v confused).
If I have understood anything it is that using outgoing-interface in Unbound works as far as determining how the DNS requests are sent, but in order to have the replies via the VPN/avoid the WAN there need to be specific routing instructions. If this is correct then it is a matter of how would I determine what these instructions would be and how / where would they go.
There would seem to be at least 3 ways of approaching this - adding rules in VPN director, adding static routes in LAN or editing directly, but I need some guidance on what, how and where. For instance in the wgm link @ZebMcKayhan discusses adding
and above
but what would be the analogous rules in VPN director (assuming this would be the right place. Currently my sole rule is
View attachment 39775
and would the order be relevant.
With regard to my current routes (from ip route)
@eibgrad mentioned in #130 above thatCode:default via 176.253.204.1 dev eth0 10.8.0.0/24 dev tun15 proto kernel scope link src 10.8.0.4 10.5.6.0/24 dev br0 proto kernel scope link src 10.5.6.1 10.88.0.0/24 dev tun21 proto kernel scope link src 10.88.0.1 127.0.0.0/8 dev lo scope link 176.253.204.0/22 dev eth0 proto kernel scope link src 176.253.204.143 176.253.204.1 dev eth0 proto kernel scope link 192.168.2.0/24 dev eth0 proto kernel scope link src 192.168.2.2
For clarity, there is no double NAT. I am connected to my ISP via a Vigor 130 VDSL2 modem (not a router) I have added
to allow me to check its status from the LAN.Code:#!/bin/sh if [ "$2" = "connected" ]; then ifconfig $(nvram get wan"$1"_ifname):1 192.168.2.2 fi
Thanks for the clarification about the 192.168.2.0/24 network. As it turns out, it's not significant to the problem. But when you're trying to diagnose things, stuff like this becomes a mystery.
So now I see you multihomed the WAN w/ that wan-start script.
Given you already did this, I suppose one thing you could do is multihome it again, say as 192.168.3.1 255.255.255.255 ...
Code:
if [ "$2" = "connected" ]; then
ifconfig $(nvram get wan"$1"_ifname):1 192.168.2.2
ifconfig br0:1 192.168.3.1 netmask 255.255.255.255
fi
... then bind Unbound *outbound* to that IP instead, and finally create a routing rule to route 192.168.3.1 over the VPN.
Code:
<192.168.3.1> <blank> OVPN5
Last edited: