Ok, So I’ve got a PPTP client hooked up on the routerboard and am attempting to push traffic from only one device in a subnet over the VPN.
So, Here is my poorly drawn diagram: http://i.imgur.com/2ClFv.png
The device in this case is an xbox and eth0 is the WAN.
I’ve got 2 subnets now and am blocking communication between them by dropping connections originating from either subnet bound for the other subnet (is there a better way to do this?). So, for VPN configuration I’ve got the PPTP client configured and set up a route to push traffic through when tagged with the routing mark “vpn”. In firewall mangle tagging on both output and prerouting for all traffic destined from the static IP of the device (i tried with MAC but it wasn’t working?) It works great for web traffic, which I tested by using my computers IP in place of the Xbox IP and I can tag the traffic as “vpn” and it gets re-routed. Now, the problem is that not all traffic is being captured. So I’ve got torch open watching the IP of the xbox and can see connections being made on the local (non vpn) network. When I disconnect from the VPN these are staying open. How can I ensure that all traffic is being tunneled through the VPN? I thought I had dropped all traffic not tagged vpn in the firewall that was headed towards the IP but I had it on “reject” (which should be similar anyway?).
I’m guessing I may not be doing the best job explaining this so if I need to export some settings to help better understand just let me know.