Firewalla OpenVPN Split Tunneling Config not respected
Hello,
It seems that Firewalla doesn't take into account the split tunnel config in .ovpn config files.
When importing the same profile on other devices, i.e., iOS and Windows, split tunneling works as expected.
Goal:
I would like for internet traffic not to go through the Client VPN Connection on Firewalla.
Behavior:
While I can remotely access devices over VPN, Internet traffic is still being routed to OpenVPN.
Configuration:
client
dev tun
remote ap-southeast.gw.openvpn.cloud 1194 udp
remote ap-southeast.gw.openvpn.cloud 1194 udp
remote ap-southeast.gw.openvpn.cloud 443 tcp
remote ap-southeast.gw.openvpn.cloud 1194 udp
remote ap-southeast.gw.openvpn.cloud 1194 udp
remote ap-southeast.gw.openvpn.cloud 1194 udp
remote ap-southeast.gw.openvpn.cloud 1194 udp
remote ap-southeast.gw.openvpn.cloud 1194 udp
remote-cert-tls server
cipher AES-256-CBC
auth SHA256
persist-tun
nobind
verb 3
socket-flags TCP_NODELAY
route-nopull
route 10.10.1.0 255.255.255.192 # Remote site subnet
route 10.10.2.0 255.255.255.192 # Remote site subnet
route 10.10.3.0 255.255.255.192 # Remote site subnet
What else must I change for it to work?
-
you have to change some settings via the command line inside of redis-cli. I had to have Firewalla login and apply the settings. I captured the setting incase I needed to readjust but don't want to post it here as it can cause some problems if not used properly. You'll have to submit a ticket to Firewalla to have them log in and adjust.
Please sign in to leave a comment.
Comments
5 comments