What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

DomainVPNRouting Domain VPN Routing v3.2.1 ***Release***

There is currently no method of bulk deletion short of deleting the entire policy and creating a new one.
Thank you. That is not a problem. Might I suggest a note in the README to avoid doing what I did and what @js28194 suggested? It seems natural that people will attempt to bulk delete in this manner which will cause problems.
 
I haven't tested this yet, but after bulk delete in the file, I'm not sure what happens if completely delete the corresponding policy_yourpocliyname_domaintoip file. I think the script recreates it basically "cleaning up" the ip addresses albiet in a round about way.
 
So question @Ranger802004 I'm noticing that my GT-AX11000 Pro running your latest beta script and running 3006 codebase firmware is displaying when I run the terminal command liststats -> vpnc_ipset6 ... I don't know what that is ? If I go to my GT-AX11000 running merlin 3004 codebase and your latest beta of the script I don't see vpnc_ipset6 listed when I run liststats in terminal... Is this normal ? Do I need this ?
 

Attachments

  • Screenshot 2025-04-19 at 3.55.36 PM.png
    Screenshot 2025-04-19 at 3.55.36 PM.png
    64.9 KB · Views: 48
  • Screenshot 2025-04-19 at 3.55.03 PM.png
    Screenshot 2025-04-19 at 3.55.03 PM.png
    69.3 KB · Views: 48
So question @Ranger802004 I'm noticing that my GT-AX11000 Pro running your latest beta script and running 3006 codebase firmware is displaying when I run the terminal command liststats -> vpnc_ipset6 ... I don't know what that is ? If I go to my GT-AX11000 running merlin 3004 codebase and your latest beta of the script I don't see vpnc_ipset6 listed when I run liststats in terminal... Is this normal ? Do I need this ?
I’m not sure what is creating this, please open a GitHub issue so we can investigate.
 
***v3.1.1-beta4 has been released to the beta channel***
Review your policies to make sure your DNS servers have not been erroneously added to the policies Domain to IP lists. If they are added use the deleteip function to remove.


Release Notes:
v3.1.1-beta4 - 04/23/2025
Enhancements:
- If DNS-over-TLS is enabled and servers are configured on the system DNS-over-TLS DNS server list, dig will configure use for DNS-over-TLS by randomly selecting a DNS-over-TLS DNS server.
- Python3 and dig are required to be installed for this functionality.
- An existing DNS configuration for the interface in Domain VPN Routing will override this functionality.
- Added debug logging for DNS-over-TLS configuration during querypolicy function execution.

Fixes:
- Fixed an issue with IPv4 unreachable rules being created for VPN interfaces due to a missing default route for the VPN routing table.
- Fixed an issue where restoreasncache was executing when restoring an individual policy, this will still execute when restoring all policies.
- Fixed issues with erroneous data being ingested by dig.
- Fixed an issue with dig applying DNS Server configuration incorrectly and causing unreturned data from queries.
- Minor fixes and optimizations
 
***v3.1.1 has been released to production channel***

Release Notes:

Enhancements:
- If DNS-over-TLS is enabled and servers are configured on the system DNS-over-TLS DNS server list, dig will configure use for DNS-over-TLS by randomly selecting a DNS-over-TLS DNS server.
- Python3 and dig are required to be installed for this functionality.
- An existing DNS configuration for the interface in Domain VPN Routing will override this functionality.
- Added debug logging for DNS-over-TLS configuration during querypolicy function execution.

Fixes:
- Fixed an issue with IPv4 unreachable rules being created for VPN interfaces due to a missing default route for the VPN routing table.
- Fixed an issue where restoreasncache was executing when restoring an individual policy, this will still execute when restoring all policies.
- Fixed issues with erroneous data being ingested by dig.
- Fixed an issue with dig applying DNS Server configuration incorrectly and causing unreturned data from queries.
- Minor fixes and optimizations
 
After updating to the latest firmware, I'm seeing this error:

Code:
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS35995-v4 Interface:  FWMark: 0x7000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for ovpnc4
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS63179-v4 Interface:  FWMark: 0x7000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for ovpnc4
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS13414-v4 Interface:  FWMark: 0x7000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for ovpnc4
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS40027-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS2906-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS23286-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS22604-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS11251-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS398849-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS14618-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS16509-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
Query ASN: AS40027...
domain_vpn_routing: Query ASN - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS40027-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Query ASN - Processing Time: 7 seconds

Is there anything in particular I can do to fix this?
 
After updating to the latest firmware, I'm seeing this error:

Code:
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS35995-v4 Interface:  FWMark: 0x7000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for ovpnc4
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS63179-v4 Interface:  FWMark: 0x7000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for ovpnc4
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS13414-v4 Interface:  FWMark: 0x7000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for ovpnc4
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS40027-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS2906-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS23286-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS22604-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS11251-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS398849-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS14618-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Restore ASN Cache - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS16509-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
Query ASN: AS40027...
domain_vpn_routing: Query ASN - ***Error*** Failed to add IPTables POSTROUTING rule for IPSET: DVR-AS40027-v4 Interface:  FWMark: 0xc000
domain_vpn_routing: Create IP Mark Rules - ***Error*** FWMark not set for wgc3
domain_vpn_routing: Query ASN - Processing Time: 7 seconds

Is there anything in particular I can do to fix this?
Submit a GitHub issue.
 
***v3.2.0-beta1 has been published to the beta channel***

Release Notes:

Enhancements:
- Added custom priority settings for interfaces that can be modified using the configuration menu.
- Enhance Query ASN logic to handle larger ASNs and optimize query time. This requires grep to be installed from Entware.
- Querying policies now can use grep from Entware to efficiently process new IP addresses.
- Enhanced interface state detection logic.
- Showing policies now displays the associated interfaces and the connected state status.
- Minor optimization and performance enhancements.

Fixes:
- Querying policies will now properly delete temporary files generated under /tmp.
- Fixed UI bugs not allowing return in certain menus.
- Fixed configuration menu bug that was not showing Dual WAN DNS Settings when router was configured for Dual WAN.
 
Now that large ASNs are fixed, I decided to write a script to find domains I previously added that I already have in the ASN list. This script will create a bash script you can copy to the router and use to delete domains that should be skipped since they are already handled by ASNs. It works very nicely with domain_vpn_routing. I run the script on my Mac using python.

 
***v3.2.0-beta2 has been released to the beta channel to address some issues with v3.2.0-beta1 as well as another additional enhancement***

Release Notes:

v3.2.0-beta2 - 05/12/2025
Enhancements:
- Added custom priority settings for interfaces that can be modified using the configuration menu.
- Enhance Query ASN logic to handle larger ASNs and optimize query time. This requires grep to be installed from Entware.
- Querying policies now can use grep from Entware to efficiently process new IP addresses.
- Enhanced interface state detection logic.
- Showing policies now displays the associated interfaces and the connected state status.
- Showing ASNs now displays the associated interfaces and the connected state status.
- Minor optimization and performance enhancements.

Fixes:
- Querying policies will now properly delete temporary files generated under /tmp.
- Fixed UI bugs not allowing return in certain menus.
- Fixed configuration menu bug that was not showing Dual WAN DNS Settings when router was configured for Dual WAN.
 
***v3.2.0-beta3 is now available on the beta channel***

Release Notes:
v3.2.0-beta3 - 05/15/2025
Enhancements:
- Interface selection when creating or editing policies or adding ASNs will now allow easier selection by number list instead of manually typing the interface name.
- Enhanced deteection of WireGuard interface information.
- Added custom priority settings for interfaces that can be modified using the configuration menu.
- Enhance Query ASN logic to handle larger ASNs and optimize query time. This requires grep to be installed from Entware.
- Querying policies now can use grep from Entware to efficiently process new IP addresses.
- Enhanced interface state detection logic.
- Showing policies now displays the associated interfaces and the connected state status.
- Showing ASNs now displays the associated interfaces and the connected state status.
- Minor optimization and performance enhancements.

Fixes:
- Querying policies will now properly delete temporary files generated under /tmp.
- Fixed UI bugs not allowing return in certain menus.
- Fixed configuration menu bug that was not showing Dual WAN DNS Settings when router was configured for Dual WAN.
 
***v3.2.0 is now available to production channel***

Release Notes:
Enhancements:
- Interface selection when creating or editing policies or adding ASNs will now allow easier selection by number list instead of manually typing the interface name.
- Enhanced deteection of WireGuard interface information.
- Added custom priority settings for interfaces that can be modified using the configuration menu.
- Enhance Query ASN logic to handle larger ASNs and optimize query time. This requires grep to be installed from Entware.
- Querying policies now can use grep from Entware to efficiently process new IP addresses.
- Enhanced interface state detection logic.
- Showing policies now displays the associated interfaces and the connected state status.
- Showing ASNs now displays the associated interfaces and the connected state status.
- Minor optimization and performance enhancements.

Fixes:
- Querying policies will now properly delete temporary files generated under /tmp.
- Fixed UI bugs not allowing return in certain menus.
- Fixed configuration menu bug that was not showing Dual WAN DNS Settings when router was configured for Dual WAN.
- Minor bug fixes
 
Can this script be used to allow PLEX to be fully accessible from outside my network when my router is working as a Wireguard client using commercial VPN service? If I can use it in that way, then I would really appreciate some guidance on how to achieve this.
 
Can this script be used to allow PLEX to be fully accessible from outside my network when my router is working as a Wireguard client using commercial VPN service? If I can use it in that way, then I would really appreciate some guidance on how to achieve this.
You would likely just need to do with the policy director configuring your plex server to use WAN and then create a port forwarding rule for it as well as firewall.
 
You would likely just need to do with the policy director configuring your plex server to use WAN and then create a port forwarding rule for it as well as firewall.
Many thanks @Ranger802004 for another great script. This is indeed what I have been doing so far but I was hoping to be able to pass all the traffic (apart from Plex) from my server via the VPN tunnel as it is also my main PC.
 
Many thanks @Ranger802004 for another great script. This is indeed what I have been doing so far but I was hoping to be able to pass all the traffic (apart from Plex) from my server via the VPN tunnel as it is also my main PC.
Perhaps you could use Domain VPN Routing to route Plex and the associated CDNs over WAN.
 
***v3.2.1 has been published as a hotfix***

Release Notes:

v3.2.1 - 05/19/2025
Fixes:
- Fixed an issue that was causing duplicate entries in the configuration file for WireGuard and WAN priority settings. Domain VPN Routing will now automatically clean up duplicate lines in the configuration file.
 

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top