Cannot Get Split-tunneling to Work Properly
Posted: Mon Feb 20, 2017 5:37 am
What I am ultimately trying to do is setup split-tunneling so that all of my traffic goes through my public IP by default, but applications bound to the VPN interface will use that instead. More precisely, I am trying to use the OpenVPN Client to access Private Internet Access (PIA) servers. The reason for this is that the PIA client forces all traffic through the VPN and I have not been able to get split-tunneling to work at all with their client. With the OpenVPN client I can get connected using the provided configuration files from PIA and it works fine, however, all traffic is routed through the VPN (with the exceptions being the routes I have entered in via cmd, unlike with the PIA client). In attempt to keep my traffic from being hijacked by the VPN, I added in "route-nopull" to the configuration file and reconnected. Once reconnected, I then no longer have all of my traffic being routed through the VPN, but I also do not have any internet connection on the VPN interface. I am not familiar with OpenVPN and the available parameters so despite what research I have done, I still cannot figure out what is going wrong.
This is the current configuration that I am using from PIA:
Can someone tell me what I am doing wrong? I'm banging my head against the wall over here.
- With the PIA client, "ipconfig /all" shows a default gateway, DNS, and DHCP addresses.
- When running "ipconfig /all" before turning on the OpenVPN client, the adapter shows it is disconnected.
- With the OpenVPN client turned on without the "route-nopull", I have DNS and DHCP addresses for the VPN interface, but no default gateway.
- With "route-nopull" in use, "ipconfig /all" only shows the DHCP server address, no DNS or default gateway addresses.
This is the current configuration that I am using from PIA:
Test Config
client
dev tun
proto udp
remote ca-toronto.privateinternetaccess.com 1198
resolv-retry infinite
nobind
persist-key
persist-tun
cipher aes-128-cbc
auth sha256
tls-client
remote-cert-tls server
auth-user-pass
comp-lzo
verb 1
reneg-sec 0
crl-verify crl.rsa.2048.pem
ca ca.rsa.2048.crt
disable-occ
dev tun
proto udp
remote ca-toronto.privateinternetaccess.com 1198
resolv-retry infinite
nobind
persist-key
persist-tun
cipher aes-128-cbc
auth sha256
tls-client
remote-cert-tls server
auth-user-pass
comp-lzo
verb 1
reneg-sec 0
crl-verify crl.rsa.2048.pem
ca ca.rsa.2048.crt
disable-occ