I have created a PPPoE client to interface with my ISP - therefor my internet facing address is the one assigned to the PPPoE client by my ISPs DHCP server, lets say it is 45.67.89.123
The normal wireless AP [SSID PPP] connects to the 192.168.88.0/24 network on the LAN side of the router and is SRCNAT routed to my ISP via the PPPoE client and then on to the internet.
There is a router rule 0.0.0.0/0 gateway PPPoE1
I have also created a PPTP client to a VPNbook server.which creates me a second route out to the internet.
I have a virtual AP [SSID vpn) with a DHCP serve. Using a mangle rule I can mark packets from wpn_ap to go out via the PPTP client. This works for external addresses except for my PPPoE client address (my router’s WAN address)
So if I connect a device to the PPP ap and do a trace route to say 8.8.8.8, then I can see the route going via my ISP
If I connect the device to the VPN ap and do the same trace route I can see a completely different route going via the VPN server.
Assuming my ISP has a pool of addresses eg 45.67.89.0/24 then, while connected to the VPN ap I can trace route to 45.67.89.122 and the route goes via the VPN server.
However if while connected to the VPN ap I try and do a traceroute to my REAL internet address - 45.67.89.123 (PPPoE interface address) - I do not get the same behavior. I assume that this is because packets then end up in the input chain rather than the forward chain.
I think there may be things I can do with mangle rules IF all addresses were assigned statically ie both ends of the PPPoE and PPTP tunnels had static addresses. If that were the case then it looks like I might be able to write an INPUT rule that redirects traffic from the VPN ap aimed at my PPPoE external address to go via another address (I haven’t tried this - and I am not an expert!)
HOWEVER I can not assume the addresses are static (and I cant ask for static either other than my own PPPoE WAN address). So is there anyway of forcing traffic from the VPN Wireless access point that is aimed at my routers PPPoE WAN address to be FORWARDED by the router via the PPTP tunnel.
Why do it? I want to use Kalilinux tools to test the vunerability of my external facing firewall and the DMZ that I have. I also want to be able to test the webserver I run behind the firewall from the internet by using the VPN tunnel to first get out onto the internet.
Any ideas?