Lynx
Senior Member
How would I go about separating LAN <> router ingress/egress and WAN (VPN/bypassed) <> router ingress/egress (all presently on br0)?
I believe that one way is to create a veth pair - device veth0 and peer veth1, then add veth1 to br0, and then shift inbound WAN or tunX traffic to veth0 using ip rule / route commands.
If that is the best way, what might appropriate ip rule and route commands look like?
A modification to the above might be rather than divert the WAN traffic to veth0 to instead divert the LAN <> router IP traffic to veth0.
Entirely open to alternative suggestions like creating separate router IP.
The solution should be compatible with the stock routing and VPN Director.
FWIW the goal is to provide a single interface upon which to apply CAKE that sees only wan related traffic (including both tunX traffic and that bypassed to eth0 via PBR). BTW this practice is entirely routine and normal in terms of dealing with VPN PBR to ensure that CAKE instance sees all unencrypted flows with correct source and destinations (including traffic sent through VPN and that which bypasses it). And the beauty of it is that it will work regardless of the VPN settings.
I believe that one way is to create a veth pair - device veth0 and peer veth1, then add veth1 to br0, and then shift inbound WAN or tunX traffic to veth0 using ip rule / route commands.
If that is the best way, what might appropriate ip rule and route commands look like?
A modification to the above might be rather than divert the WAN traffic to veth0 to instead divert the LAN <> router IP traffic to veth0.
Entirely open to alternative suggestions like creating separate router IP.
The solution should be compatible with the stock routing and VPN Director.
FWIW the goal is to provide a single interface upon which to apply CAKE that sees only wan related traffic (including both tunX traffic and that bypassed to eth0 via PBR). BTW this practice is entirely routine and normal in terms of dealing with VPN PBR to ensure that CAKE instance sees all unencrypted flows with correct source and destinations (including traffic sent through VPN and that which bypasses it). And the beauty of it is that it will work regardless of the VPN settings.
Last edited: