I think I’ve hit a brick wall. I have my VPN client setup and connected successfully. My provider is Private Internet Access. The problem I’m having is I cannot get my laptop to connect to the internet via the VPN tunnel. I configured a split-tunnel with my Primary LAN on 192.168.0.0/22.
Note: This is a new router and hasn’t been fully deployed yet. It’s currently connected to my production router (Ubiquiti Edge Router Pro) which is acting as the WAN gateway (subnet: 192.168.10.0/24) until I can get everything setup on this Mikrotik (Cloud Core Router).
I have a VPN Address list called: VPN_Addresses
I setup the mangle rules, NAT, and firewall rules and have debugged all of them without any success. I tried allowing all traffic through the firewall and didn’t see any improvements.
I’ve run the following commands on my laptop:
ping 8.8.8.8 - timeouts
traceroute google.com - I get only to the router hop 192.168.0.1
nslookup google.com - timeout
Please let me know if I’m missing some details to provide on my configuration.
ovpn client settings:
DHCP-Server info (Note: please ignore the DNS settings for m Guest and Management LAN those are set to my eventual internal DNS server - which isn’t acessible yet):
Flags: D - dynamic
0 ;;; Primary LAN DHCP Network Config
address=192.168.0.0/22 gateway=192.168.0.1 dns-server=8.8.8.8,8.8.4.4 wins-server="" ntp-server="" caps-manager="" domain="local" dhcp-option=""
1 ;;; Guest LAN DHCP Network Config
address=192.168.5.0/24 gateway=192.168.5.1 dns-server=192.168.1.97 wins-server="" ntp-server="" caps-manager="" dhcp-option=""
2 ;;; Management LAN DHCP Network Config
address=192.168.99.0/24 gateway=192.168.99.1 dns-server=192.168.1.97 wins-server="" ntp-server="" caps-manager="" dhcp-option=""
Ovpn status:
;;; OpenVPN Client for Split Tunnel
status: connected
uptime: 2m5s
encoding: AES-128-CBC/SHA1
mtu: 1500
local-address: 10.25.112.53
This is the output of my ovpn-client:
Flags: X - disabled; R - running; H - hw-crypto; Ta - tls-auth; Tc - tls-crypt
0 RH ;;; OpenVPN Client for Split Tunnel
name="ovpn-pia" mac-address=02:D5:B2:93:AE:54 max-mtu=1500 connect-to=us-california.privacy.network port=1198 mode=ip protocol=udp user="XXXX" password="XXXX"
profile=pia-ovpn-profile certificate=none verify-server-certificate=yes tls-version=only-1.2 auth=sha1 cipher=aes128-cbc use-peer-dns=no add-default-route=no route-nopull=yes
disconnect-notify=yes
A list of my routes:
Flags: D - dynamic; X - disabled, I - inactive, A - active; c - connect, s - static, r - rip, b - bgp, o - ospf, i - is-is, d - dhcp, v - vpn, m - modem, y - bgp-mpls-vpn; H - hw-offloaded;
+ - ecmp
DAd dst-address=0.0.0.0/0 routing-table=main gateway=192.168.10.1 immediate-gw=192.168.10.1%sfp28-1 check-gateway=ping distance=1 scope=30 target-scope=10 vrf-interface=sfp28-1
DAc dst-address=10.2.112.0/24 routing-table=main gateway=ovpn-pia immediate-gw=ovpn-pia distance=0 scope=10 target-scope=5 local-address=10.2.112.151%ovpn-pia
DAc dst-address=192.168.0.0/22 routing-table=main gateway=VLAN1-PrimaryLAN immediate-gw=VLAN1-PrimaryLAN distance=0 scope=10 target-scope=5 local-address=192.168.0.1%VLAN1-PrimaryLAN
DAc dst-address=192.168.5.0/24 routing-table=main gateway=VLAN5-Guest immediate-gw=VLAN5-Guest distance=0 scope=10 target-scope=5 local-address=192.168.5.1%VLAN5-Guest
DAc dst-address=192.168.10.0/24 routing-table=main gateway=sfp28-1 immediate-gw=sfp28-1 distance=0 scope=10 target-scope=5 local-address=192.168.10.10%sfp28-1
DAc dst-address=192.168.99.0/24 routing-table=main gateway=VLAN99-Mgmt immediate-gw=VLAN99-Mgmt distance=0 scope=10 target-scope=5 local-address=192.168.99.1%VLAN99-Mgmt
0 As ;;; Default route for VPN-marked traffic in custom table
dst-address=0.0.0.0/0 routing-table=vpn-routing-table gateway=ovpn-pia immediate-gw=ovpn-pia distance=1 scope=30 target-scope=10
My mangle rules:
Flags: X - disabled, I - invalid; D - dynamic
0 ;;; Mark connections from VPN_Addresses for VPN
chain=prerouting action=mark-connection new-connection-mark=vpn-connection passthrough=yes src-address-list=VPN_Addresses log=no log-prefix=""
1 ;;; Mark packets of VPN connections for VPN routing
chain=prerouting action=mark-routing new-routing-mark=vpn-routing-table passthrough=yes connection-mark=vpn-connection
2 ;;; Mark TCP connections to VPN_Ports for VPN
chain=prerouting action=mark-connection new-connection-mark=vpn-connection passthrough=yes protocol=tcp dst-port=16881,6881-6999
3 ;;; Mark UDP connections to VPN_Ports for VPN
chain=prerouting action=mark-connection new-connection-mark=vpn-connection passthrough=yes protocol=udp dst-port=16881,6881-6999
My NAT rules:
Flags: X - disabled, I - invalid; D - dynamic
0 ;;; NAT for Primary Internet Access
chain=srcnat action=masquerade routing-mark=!vpn-routing-table out-interface=sfp28-1
1 ;;; NAT for Secondary Internet Access
chain=srcnat action=masquerade routing-mark=!vpn-routing-table out-interface=sfp28-2
2 ;;; NAT for VPN traffic
chain=srcnat action=masquerade out-interface=ovpn-pia
My DNS settings:
servers: 8.8.8.8
8.8.4.4
dynamic-servers: 8.8.8.8
use-doh-server:
verify-doh-cert: no
doh-max-server-connections: 5
doh-max-concurrent-queries: 50
doh-timeout: 5s
allow-remote-requests: yes
max-udp-packet-size: 4096
query-server-timeout: 2s
query-total-timeout: 10s
max-concurrent-queries: 100
max-concurrent-tcp-sessions: 20
cache-size: 2048KiB
cache-max-ttl: 1w
address-list-extra-time: 0s
vrf: main
mdns-repeat-ifaces:
cache-used: 450KiB
All my firewall rules attached
firewall-list.txt (29.0 KB)