Originally Posted by
Esofor
how did you get internet access on your aws vpn? i seem to have everything in order, but i can't access the internet. skype seems to go through, but that's not what i'm aiming for lol
edit: nvm, it appears that i just needed to uncomment a few lines
edit2: have you tried tehfusion's split tunnelling guide?
http://www.reddit.com/r/PSO2/comment...os_isp/ciysusf
for some reason split tunnelling doesn't work for my instance, even if the vpn itself works
Split tunnelling requires two things. First to not use the VPN's default gateway, this allows all internet traffic to go through your regular internet connection. Second, to manually set the route for certain addresses to go through the VPN.
As an example, I have my VPN connected and it is not using the VPN default gateway. If you run netsh interface ipv4 show route you get something like
Code:
C:\Users\xxx>netsh interface ipv4 show route
Publish Type Met Prefix Idx Gateway/Interface Name
------- -------- --- ------------------------ --- ------------------------
No Manual 256 0.0.0.0/0 3 192.168.0.254
No System 256 127.0.0.0/8 1 Loopback Pseudo-Interface 1
No System 256 127.0.0.1/32 1 Loopback Pseudo-Interface 1
No System 256 127.255.255.255/32 1 Loopback Pseudo-Interface 1
No Manual 1 172.31.0.0/16 27 172.31.0.100
No System 256 172.31.0.105/32 27 VPN Connection
No System 256 192.168.0.0/24 3 Ethernet
No System 256 192.168.0.2/32 3 Ethernet
No System 256 192.168.0.255/32 3 Ethernet
No System 256 224.0.0.0/4 1 Loopback Pseudo-Interface 1
No System 256 224.0.0.0/4 3 Ethernet
No System 256 224.0.0.0/4 5 Bluetooth Network Connection
No System 256 224.0.0.0/4 27 VPN Connection
No System 256 255.255.255.255/32 1 Loopback Pseudo-Interface 1
No System 256 255.255.255.255/32 3 Ethernet
No System 256 255.255.255.255/32 5 Bluetooth Network Connection
No System 256 255.255.255.255/32 27 VPN Connection
The first entry "No Manual 256 0.0.0.0/0 3 192.168.0.254" is the one that routes everything through your regular internet connection. There should be another interface for your VPN connection that is clearly marked. Windows 8.1 names them VPN Connection by default.
For the VPN connection, there are two things to look out for. First is the index of the VPN connection, second is the gateway of the VPN connection. This routing table gives the index of the connection, but the best way to confirm is to run the command netsh interface ipv4 show interfaces, and it will give output similar to:
Code:
C:\Users\xxx>netsh interface ipv4 show interfaces
Idx Met MTU State Name
--- ---------- ---------- ------------ ---------------------------
3 10 1500 connected Ethernet
1 50 4294967295 connected Loopback Pseudo-Interface 1
27 10 1400 connected VPN Connection
5 40 1500 disconnected Bluetooth Network Connection
Now the important interface is the one with the name VPN Connection. Your interface may not be named that, but it should be distinguishable. To the left is the index, in this case 27. This is not a constant value, this changes on a machine to machine basis. Now we have this, we can look at the routing table again for the VPN gateway.
There should be an entry similar to "No Manual 1 172.31.0.0/16 27 172.31.0.100" in the table. The fourth column is the addresses that it will send to the VPN, in this case, all addresses starting with 172.31, the fifth column is the index of your interface, and the last column, in this case 172.31.0.100, is the VPN gateway. This is what you need to set up the split route. If you add entries to the routing table to send certain entries down there instead, you can set it up to only forward the PSO2 IP addresses to the VPN.
So if you now run the command netsh interface ipv4 add route 210.189.0.0/16 <VPN Connection Index> <VPN Gateway> Metric=5 then it will set the PSO2 block to route through the VPN and leave everything else go through your regular connection. So in my case
Code:
netsh interface ipv4 add route 210.189.0.0/16 "VPN Connection" 172.31.0.100 Metric=5
If you then print the routing table
Code:
C:\Users\xxx>netsh interface ipv4 show route
Publish Type Met Prefix Idx Gateway/Interface Name
------- -------- --- ------------------------ --- ------------------------
No Manual 256 0.0.0.0/0 3 192.168.0.254
No System 256 127.0.0.0/8 1 Loopback Pseudo-Interface 1
No System 256 127.0.0.1/32 1 Loopback Pseudo-Interface 1
No System 256 127.255.255.255/32 1 Loopback Pseudo-Interface 1
No Manual 1 172.31.0.0/16 27 172.31.0.100
No System 256 172.31.0.105/32 27 VPN Connection
No System 256 192.168.0.0/24 3 Ethernet
No System 256 192.168.0.2/32 3 Ethernet
No System 256 192.168.0.255/32 3 Ethernet
No Manual 5 210.189.0.0/16 27 172.31.0.100
No System 256 224.0.0.0/4 1 Loopback Pseudo-Interface 1
No System 256 224.0.0.0/4 3 Ethernet
No System 256 224.0.0.0/4 5 Bluetooth Network Connection
No System 256 224.0.0.0/4 27 VPN Connection
No System 256 255.255.255.255/32 1 Loopback Pseudo-Interface 1
No System 256 255.255.255.255/32 3 Ethernet
No System 256 255.255.255.255/32 5 Bluetooth Network Connection
No System 256 255.255.255.255/32 27 VPN Connection
So you can now see the PSO2 block going through the VPN gateway and the metric has to be lower than the regular connection, otherwise it will go through the regular connection.
Connect With Us