Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Gateway groups are ignored if you use policy based routing in combination with an OpenVPN connection #7536

Open
2 tasks done
RichardEb opened this issue Jun 18, 2024 · 0 comments
Labels
support Community support

Comments

@RichardEb
Copy link

RichardEb commented Jun 18, 2024

Important notices

Before you add a new report, we ask you kindly to acknowledge the following:

Describe the bug

Gateway groups are ignored if you use policy based routing (firewall rule) in combination with an OpenVPN connection. I want to route all of my internet traffic via an VPN-Provider (e.g. Surfshark, ProtonVpn, ...): I have two VPN connections (legacy client) with the "Don't pull routes" option checked. If I use them individually in a firewall rule the traffic is sent via the VPN, but if I group them together in a gateway group and use that group in the firewall rule, the traffic seems to be routed via the WAN interface and not via any of the OpenVPN connections.
I found serveral reports of this issue on the internet, but unfortunately no explanation or solution.

To Reproduce

Steps to reproduce the behavior:

  1. Create a legacy OpenVPN client connection to a VPN provider (e.g. Surfshark)
  2. Check the "Don't pull routes" option
  3. Manually create the Outbound NAT rules for this OpenVPN connection
  4. Create a Gateway group with the VPN-Connection as Tire 1 and WAN as Never
  5. Create a firewall rule that should route the traffic via the GW-Group
  6. Check your public IP address. It's the WAN IP instead of the VPN-IP

Expected behavior

Data is routed via the GW-Group via the VPN.

Environment

OPNsense 24.1.8-amd64
FreeBSD 13.2-RELEASE-p11
OpenSSL 3.0.13

@AdSchellevis AdSchellevis added the support Community support label Jun 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
support Community support
Development

No branches or pull requests

2 participants