eibgrad
Part of the Furniture
ASUS RT-AC68U - 386.14
I'm trying to help the OP w/ the following problem.
One approach I was considering is to add route directives to the custom config field of the OpenVPN client to route the following domains through the WAN rather than the VPN.
I wasn't sure if it would work because I can recall from prior discussions regarding the behavior of the VPN Director, that sometimes the router chooses to strip out routes, be they route directives like the above, or even static routes defined in the main routing table.
To my surprise, I discovered that static routes *do* get copied into the OpenVPN client routing table (e.g., ovpnc1). Not sure if and when this changed, or whether it was always this way and I'm just having a false memory.
Anyway, I approached this use of route directives w/ the same skepticism, and sure enough, this time the routes did NOT show up in the OpenVPN client's routing table. Initially I chalked it up to the router stripping these routes out intentionally. But then I checked the syslog and got the following.
It appears the router attempted to add the routes, but used the wrong network interface! tun11 is the tunnel, while my intention w/ the net_gateway option was the WAN (192.168.63.1), which is actually eth0. No wonder it didn't work.
Thinking maybe this was intentional, I changed from using the VPN Director to Yes (all). At least now the router shouldn't interfere w/ my choice to route whatever I want, wherever I want. NOPE. Same result. Even using No didn't work!
Because the OpenVPN client config file is using the route-exec directive w/ all "Redirect internet gateway through tunnel" options, it's clear the route directives are *always* being managed by the ovpn-* processes under the /tmp/etc/openvpn/client1 directory. I'd be interested in what these are doing, and whether it's intentional or just a bug, but they're binary, NOT text (scripts).
As I said, I could imagine such manipulation being intentional for the VPN Director, but NOT Yes (all), and certainly NOT for No. It just appears to be a bug. And it might just be an oversight in believing that route directives would/could only be routed over the VPN, when that isn't always the case. You can use either vpn_gateway (the default) or net_gateway to route either through the VPN or WAN, respectively.
I suspect few ppl have noticed this issue since the VPN Director is, by far, the most common method for managing routing between the VPN and WAN. But as illustrated in the link above, there are situations where the use of route directives comes in handy, esp. when you need/want to use domain names rather than explicit public IPs (a limitation of the VPN Director).
I'm trying to help the OP w/ the following problem.
VPN Director Question
In the VPN director page, is it possible to add a rule to direct access to a domain to WAN? The reason why I am attempting that is to allow Voice over Wifi (VoWifi) to work together with VPN. I have discovered that in order for VoWifi to work on a phone which is directed through VPN, I need...
www.snbforums.com
One approach I was considering is to add route directives to the custom config field of the OpenVPN client to route the following domains through the WAN rather than the VPN.
Code:
route epdg.epc.mnc001.mcc505.pub.3gppnetwork.org 255.255.255.255 net_gateway
route epdg.epc.mnc071.mcc505.pub.3gppnetwork.org 255.255.255.255 net_gateway
I wasn't sure if it would work because I can recall from prior discussions regarding the behavior of the VPN Director, that sometimes the router chooses to strip out routes, be they route directives like the above, or even static routes defined in the main routing table.
To my surprise, I discovered that static routes *do* get copied into the OpenVPN client routing table (e.g., ovpnc1). Not sure if and when this changed, or whether it was always this way and I'm just having a false memory.
Anyway, I approached this use of route directives w/ the same skepticism, and sure enough, this time the routes did NOT show up in the OpenVPN client's routing table. Initially I chalked it up to the router stripping these routes out intentionally. But then I checked the syslog and got the following.
Code:
Aug 2 16:01:05 ovpn-client1[2760]: ovpn-up 1 client tun11 1500 0 10.80.0.110 10.80.0.109 init
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 149.135.226.11/255.255.255.255 via 192.168.63.1 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 149.135.233.3/255.255.255.255 via 192.168.63.1 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 149.135.224.26/255.255.255.255 via 192.168.63.1 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 149.135.232.3/255.255.255.255 via 192.168.63.1 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 101.168.246.65/255.255.255.255 via 192.168.63.1 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 101.168.246.193/255.255.255.255 via 192.168.63.1 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 149.135.224.24/255.255.255.255 via 192.168.63.1 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 149.135.226.9/255.255.255.255 via 192.168.63.1 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Add pushed route: /usr/sbin/ip route add 10.80.0.1/255.255.255.255 via 10.80.0.109 dev tun11 table ovpnc1
Aug 2 16:01:06 openvpn-routing: Setting client 1 routing table's default route through the tunnel
It appears the router attempted to add the routes, but used the wrong network interface! tun11 is the tunnel, while my intention w/ the net_gateway option was the WAN (192.168.63.1), which is actually eth0. No wonder it didn't work.
Thinking maybe this was intentional, I changed from using the VPN Director to Yes (all). At least now the router shouldn't interfere w/ my choice to route whatever I want, wherever I want. NOPE. Same result. Even using No didn't work!
Because the OpenVPN client config file is using the route-exec directive w/ all "Redirect internet gateway through tunnel" options, it's clear the route directives are *always* being managed by the ovpn-* processes under the /tmp/etc/openvpn/client1 directory. I'd be interested in what these are doing, and whether it's intentional or just a bug, but they're binary, NOT text (scripts).
As I said, I could imagine such manipulation being intentional for the VPN Director, but NOT Yes (all), and certainly NOT for No. It just appears to be a bug. And it might just be an oversight in believing that route directives would/could only be routed over the VPN, when that isn't always the case. You can use either vpn_gateway (the default) or net_gateway to route either through the VPN or WAN, respectively.
I suspect few ppl have noticed this issue since the VPN Director is, by far, the most common method for managing routing between the VPN and WAN. But as illustrated in the link above, there are situations where the use of route directives comes in handy, esp. when you need/want to use domain names rather than explicit public IPs (a limitation of the VPN Director).
Last edited: