Figured out pinging 8.8.8.8 was no working because the ovpnc1 route table was routing 8.8.8.8 traffic to WAN as the DNS server
user@RT-AC86U-3640:/tmp/home/root# ip rule
0: from all lookup local
10001: from all lookup ovpnc1
32766: from all lookup main
32767: from all lookup default...
Thanks @eibgrad, the script works great. Your a legend!
I realised I was testing with ping from CMD which is blocked by something somewhere along the line.. not sure where though as im able to ping the internal network on the server side from my PC, but not 8.8.8.8 from my PC while connected to...
The only rules I added were the ones above. I really only wanted to add 1 rule which blocks the any LAN host from accessing WAN in case the vpn goes down. I am hesitant to start deleting other rules as everything else in there is default with the firmware and will be added back after a restart...
So it looks like eth0 is not my wan interface? it is ppp0.
After running
>iptables -I FORWARD -o ppp0 -j REJECT
My PC no longer can ping 8.8.8.8 when connected/disconnected to the VPN, however the web browser on the same PC is still able to access internet on the vpn?!. When accessing...
I am setting up a VPN on my router so I can work remotely from another country without working knowing. I have setup a home VPN and have my ASUS RT-AC86U router as the client. If the VPN drops my computer will connect to the work network and the overseas IP will be logged in Splunk and an alert...