Xentrk
Part of the Furniture
Can you clarify the split tunneling? Do you need to route the chromebook to the school's VPN and all other traffic to PIA?Thanks for the thread. I can follow some of this, but have a couple of more questions:
1). I need to use split tunneling so my kids' school Chromebooks play nicely outside the VPN with the school network; currently, I am doing this within the PIA app. Does this mean I cannot set the policy routing to "exclusive"?
a). If this is correct, then how do I set up dnsmasq for Diversion?
2). I also have SkyNet. Does OpenDNS interfere with that in any way?
Thanks...
There is no "exclusive" setting for Policy Rules.
The "Exclusive" setting only applies to the "Accept DNS Configuration" setting. dnsmasq is bypassed when "Accept DNS Configuration" is set to "Exclusive" and Policy Rules are enabled. You are telling the Client to exclusively use the DNS of the VPN provider. Problem does not seem to occur when "Force Internet traffic through tunnel" is set to "Yes". Enabling dnsmasq with Policy Rules is done by setting "Accept DNS Configuration" to either "Relaxed, "Strict" or "Disabled". Use the DNSFilter feature available on the LAN page to configure a custom DNS for each LAN client.
Enabling policy rules is done by configuring "Force Internet traffic through tunnel" to "Policy Rules" or "Policy Rules (Strict)". Forcing all internet traffic to use the VPN Client is done by configuring "Force Internet traffic through tunnel" to "Yes".
The work around I used for a long time was to set Accept DNS Configuration to “Strict”. Then, specify the DNS server for the VPN tunnel to use by adding the dhcp-option DNS command in the Custom Configuration section:
dhcp-option DNS 1.1.1.1
You can specify the DNS of the VPN provider or a public VPN provider. But the ability to customize DNS per LAN device using the DNSFilter option appears to be a better solution from the limited testing I did in the prior posts.
I don't recall a requirement that dnsmasq be enabled when using Skynet.
Last edited: