What's new

Release Asuswrt-Merlin 386.3 is now available

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Status
Not open for further replies.
Hello,
is it possible to switch from 384.18 directly to 386.3 ??

Thanks

(i know about the new 386 codebase it should be necessary to wait until 1 hour after first boot)
 
Just updated my AX11000 to latest 386.3 fw and all is working flawlessy to include the x3mRouting (option 3) & vpnmgr scripts. My 2 policy rules using PIA VPN were created automatically and no issues after router rebooted from the upgrade!!!. I like the simplicity of VPN Director. Awesome job RMerlin!!! Thanks for this update!!!!
 
I think the question is why in routing table there are no routes from VPN server to VPN client. After upgrade firmware, routes came, it's working, but in routing table there are no routes. VPN server pushed through the PUSH parameter. VPN server and clients on RMerlin's firmware 386.3.
Works for me. I have my server push a route for 10.9.0.0, and that route properly gets added to my client's routing table.
 
Clean install on a RT-AX3000 earlier today, working well and really like the new VPN Director, many thanks.
 
@RMerlin - Possible Bug/ Issue in VPN Server settings.

Using the Asus Router as a VPN Server
VPN Server -> IPSec VPN settings.
Setup the Asus Router as a IKEv2 server, no issues in setting up. I have setup my clients as IKEV2 clients and everything connects fine.

I then realised that I needed to change the allocated IP addresses for my clients, so I select
VPN Details -> Advanced Settings
And I changed the IP address range to 192.168.100.x
Hit apply... All saved successfully.


I then reconnect my clients, connection goes through successfully, clients connect - however the new IP address range is not reflected by the clients, they are still on the original range.

Did a bit of digging...

I then checked the ipsec.conf files and it seems that the change of IP address range is only reflected in the ikev1 section. The ikev2 section still reflects the old address range.
I am referring to the line

Code:
rightsourceip=

Hope you are able to replicate the issue with the above details...

Router: ASUS RT-AX88U, running version 386.3, no add-ons, no USB, jffs scripts enabled.
@RMerlin
It appears that the line rightsourceip=10.10.10.0/24 is hardcoded for the ikev2 section.
The value of rightsourceip in ikev1 section changes accordingly, but the same value in ikev2 section does not change from 10.10.10.0/24.

Redacted contents of ipsec.conf
Code:
conn %default
  keyexchange=ikev1
  authby=secret
  ike=aes256-sha1-modp1024
#Host-to-NET[prof#0]:4>Host-to-Net>null>null>wan>>1>SharedSecretKey>null>null>null>null>null>1>192.168.100>null>1>null>null>0>null>null>null>1>>>eap-md5>1>500>4500>10>1>null>null>null>null><<<<>1


conn Host-to-Net
  keyexchange=ikev1
  left=92.92.92.213
.......
.......
  rightsourceip=192.168.100.0/24
  rightdns=192.168.1.1
.......

#Host-to-NET[prof#1]:4>Host-to-Netv2>null>null>wan>>0>null>null>null>null>null>null>1>10.10.10>null>2>null>null>0>@guru.myddns.me>null>null>0>>>eap-mschapv2>1>500>4500>10>1>null>null>null>null><<<<>1>pubkey>svrCert.pem>always>svrKey.pem>%identity


conn Host-to-Netv2
  keyexchange=ikev2
  left=92.92.92.213
 .......
  leftid=@my.domain.name
....... 
 rightsourceip=10.10.10.0/24
 rightdns=192.168.1.1
 
This release is fantastic. Everything works better then expected. Gotta love VPN Director because it makes everything so much easier.
Thanks Merlin, great software that is actually worth paying for and I intend to do just that.
One question. How do I test the kill switch. I now know turning off the vpn client also turns off the kill switch so that I still have access to wan. Previous version when turning off vpn client activated the kill switch and prevented internet access.
I just want to make sure if the tunnel goes down the kill switch will block internet access.
Thank You
 
This release is fantastic. Everything works better then expected. Gotta love VPN Director because it makes everything so much easier.
Thanks Merlin, great software that is actually worth paying for and I intend to do just that.
One question. How do I test the kill switch. I now know turning off the vpn client also turns off the kill switch so that I still have access to wan. Previous version when turning off vpn client activated the kill switch and prevented internet access.
I just want to make sure if the tunnel goes down the kill switch will block internet access.
Thank You
Already answered in this thread - use search function ;).
Here's the answer ...
 
Dirty upgrade from 386.2_6 on AX3000 (same firmware than AX58U) went smooth. Everything looks OK.

Thanks Rmerlin !
 
Upgrade from 386.2_6 to 386.3 on AC86U went ok, however my VPN routing setup is not working anymore.

In my scenario I have a list of hostnames. I need to route all traffic to these hosts via a openvpn tunnel tun11. All the rest traffic should be routed normally via wan.
I was not able to use the "Policy Routing" feature on 386.2_6 firmware, since it only allows to specify ip addresses or subnets. Instead I had "Force Internet traffic through tunnel" in my openvpn client configuration set to "No" and used custom "openvpn-event" script to read the list of hosts, resolve their IPs and add routes to resolved IPs via tun11. Another script set to be run periodically did ip resolution for the hosts from the list and checked if traffic was routed to resolved IPs via tun11. If that was not the case for some "freshly resolved" IP address, the script corrected routes to match the IP changes.
That was a pretty simple but effective setup and it worked for me perfectly.
After upgrade to 386.3 all my scripts are run as expected, routes are added correctly, but all traffic continues to go via wan. "ip route get <dest-ip>" returns the route via wan, despite the routing table contains the route for the <dest-ip> via the tun11.

I read in the changelog: "Rewrote OpenVPN routing handling. The firmware will now handle route creation itself rather than letting the openvpn client create/remove routes." and suspect this is the reason. Could anyone please advice if my setup is possible with the new firmware at all? Is it possible to adapt my scripts to these changes in routing handling?
So far I had to revert back to 386.2_6 and routing is working for me again.

Thanks in advance for any insights.
 
The Wifi-radar does not work for me. User error?

Most likely. Did you press

sA22R0Y.png


on the 'Configure' page before returning to the WiFi Radar Home page and wait a few seconds before it populated the graphs?
 
@RMerlin I’ll have to check this, but it’s always worked up until 386.3.
The server is an RT-AC68U running Merlin 386.3 just as the RT-AX88U is.
@RMerlin
When I use OpenVPN to connect from my phone to the RT-AC68U, I can access the 68’s subnet and configure page however, when I connect to it using my RT-AX88U’s VPN client with the exact same config file, it doesn’t allow access to the subnet.
Do I need to do something in the client config to see the 68’s subnet that I wouldn’t have needed to do before?

I also connect to an RT-AC86U that’s running 386.2_6 from the X88U and I can access the 86U’s subnet, so I’m not 100% sure it’s the client config?
Thanks for your help.
 
@RMerlin
When I use OpenVPN to connect from my phone to the RT-AC68U, I can access the 68’s subnet and configure page however, when I connect to it using my RT-AX88U’s VPN client with the exact same config file, it doesn’t allow access to the subnet.
Do I need to do something in the client config to see the 68’s subnet that I wouldn’t have needed to do before?

I also connect to an RT-AC86U that’s running 386.2_6 from the X88U and I can access the 86U’s subnet, so I’m not 100% sure it’s the client config?
Thanks for your help.
Hi,

Please, do you have active scripts (i.e.: up/ down) actiive on custom configuration?

10q,
amplatfus
 
Did a complete reset on my RT-AC68U. Previous version of my VPN Client worked fine, with this one the VPN does not connect.

I have received help from the VPN provider support but nothing seems to work.

Before the VPN status tab would show connection details and status, including a public IP address as well as a local IP.

After installing the firmware and reinstalling the VPN client, the public IP is described as "unknown".

There are no rules in VPN director, so all traffic is routed through VPN Client 1 when turned on.

Any ideas?
 
@RMerlin - Possible Bug/ Issue in VPN Server settings.

Using the Asus Router as a VPN Server
VPN Server -> IPSec VPN settings.
Setup the Asus Router as a IKEv2 server, no issues in setting up. I have setup my clients as IKEV2 clients and everything connects fine.

I then realised that I needed to change the allocated IP addresses for my clients, so I select
VPN Details -> Advanced Settings
And I changed the IP address range to 192.168.100.x
Hit apply... All saved successfully.


I then reconnect my clients, connection goes through successfully, clients connect - however the new IP address range is not reflected by the clients, they are still on the original range.

Did a bit of digging...

I then checked the ipsec.conf files and it seems that the change of IP address range is only reflected in the ikev1 section. The ikev2 section still reflects the old address range.
I am referring to the line

Code:
rightsourceip=

Hope you are able to replicate the issue with the above details...

Router: ASUS RT-AX88U, running version 386.3, no add-ons, no USB, jffs scripts enabled.

@RMerlin
It appears that the line rightsourceip=10.10.10.0/24 is hardcoded for the ikev2 section.
The value of rightsourceip in ikev1 section changes accordingly, but the same value in ikev2 section does not change from 10.10.10.0/24.

Redacted contents of ipsec.conf
Code:
conn %default
  keyexchange=ikev1
  authby=secret
  ike=aes256-sha1-modp1024
#Host-to-NET[prof#0]:4>Host-to-Net>null>null>wan>>1>SharedSecretKey>null>null>null>null>null>1>192.168.100>null>1>null>null>0>null>null>null>1>>>eap-md5>1>500>4500>10>1>null>null>null>null><<<<>1


conn Host-to-Net
  keyexchange=ikev1
  left=92.92.92.213
.......
.......
  rightsourceip=192.168.100.0/24
  rightdns=192.168.1.1
.......

#Host-to-NET[prof#1]:4>Host-to-Netv2>null>null>wan>>0>null>null>null>null>null>null>1>10.10.10>null>2>null>null>0>@guru.myddns.me>null>null>0>>>eap-mschapv2>1>500>4500>10>1>null>null>null>null><<<<>1>pubkey>svrCert.pem>always>svrKey.pem>%identity


conn Host-to-Netv2
  keyexchange=ikev2
  left=92.92.92.213
.......
  leftid=@my.domain.name
.......
rightsourceip=10.10.10.0/24
rightdns=192.168.1.1
That is because you are only able to adjust the settings for the IPK1, the settings for the IPK2 are set by instant guard which was added by asus(closed source)
 
Status
Not open for further replies.

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top