I’ve read the articles/docs on VPN setups and I’m still confused. I thought I had it working and found my WAN IP being reported instead of the VPN IP, so I didn’t have it right. I’m probably just a bit slow and missing something simple. I want to route all traffic for a device or group through a VPN and ensure that no traffic is leaking in/out through the WAN to that device. In an ideal situation I could have a few VPN connections it may use, but never the primary WAN.
I’ve seen examples of just turning it on in the device/group settings, using a Route to force all traffic through the VPN, doing it through the VPN client settings, and I can’t remember if I’ve seen an example blocking traffic to primary WAN through a rule or something else. What’s the proper way to pass all traffic through the VPN and also make sure the primary WAN is not used without the VPN?
Here’s the questions I haven’t been able to determine from the docs/examples:
- Will turning the VPN connection on in the device/group settings force all traffic through the VPN?
- Will that setting drop traffic if the VPN connection fails?
- If a Route should be used with Static, does the same VPN connection also need to be on in the device/group page? (I had this without that and was getting my WAN IP)
- Is there a way to enable multiple VPN connections so it will use one of the available ones?
- Is there a way to guarantee no traffic will go through the primary WAN, through a Rule or otherwise?
- Does port forwarding affect the interface traffic will flow through and possibly allow leaking to primary WAN?
- Should any rules be used to allow traffic (specifically the VPN)? If so, should it be Outbound Only or Bi-directional?
I feel like I’m really over complicating this, but it’s important in this case and I want to make sure I get it right. Thanks!