- Joined
- Feb 20, 2014
- Messages
- 13 (0.00/day)
System Name | CORSAIR |
---|---|
Processor | Intel(R) Core(TM) i7-4770K CPU @ 3.50GHz OC @ 4.50GHz |
Motherboard | MSI Z87-GD65 Gaming |
Cooling | H100i Extreme Performance CPU Cooler |
Memory | RipjawsX Series 8 GB PC3-12800/17000 Dual Channel DDR3 Kit (2x4GB)/(2x4GB) 16GB |
Video Card(s) | N760 TF 2GBD5/OCN760 TF 2GBD5/OC |
Storage | Samsung SSD 840 Evo 120GB X2 WDC 2TB HDD |
Display(s) | BenQ XL2430T |
Case | Vengeance® C70 Mid-Tower Gaming Case — Arctic White |
Audio Device(s) | Realtek on board |
Power Supply | Corsair |
Software | Windows 10 |
One of my main gripes about using one router in the household to handle everything is that when I want to use the VPN Client all connected devices are then routed through the VPN tunnel Interface.
Now with some help from the torguard website there was a script posted to manage it in such a way where only an IP range of devices would route through the tunnel which is almost great.
I want to be completely confident at all times for those specific devices using the VPN that they will never leak my ISP IP. I have come up with a solution even though my understanding of iptables is definitely inadequate to come up with a proper solution.
In the ipup() function I have added an ACCEPT command along with a DROP command in the ipdown() function. Is this all I have to do? I know there is an -I Insert argument and a -A Append argument. I don't want to keep adding to the iptables as I would rather want to remove the command or even just edit the command. Otherwise wouldn't I just have a bunch of ACCEPT/DROP commands as time goes on?
TL;DR Have I handled the DROP/ACCEPT commands at the end of both functions properly?
Pastebin: http://pastebin.com/QN2uutvw
Now with some help from the torguard website there was a script posted to manage it in such a way where only an IP range of devices would route through the tunnel which is almost great.
I want to be completely confident at all times for those specific devices using the VPN that they will never leak my ISP IP. I have come up with a solution even though my understanding of iptables is definitely inadequate to come up with a proper solution.
In the ipup() function I have added an ACCEPT command along with a DROP command in the ipdown() function. Is this all I have to do? I know there is an -I Insert argument and a -A Append argument. I don't want to keep adding to the iptables as I would rather want to remove the command or even just edit the command. Otherwise wouldn't I just have a bunch of ACCEPT/DROP commands as time goes on?
TL;DR Have I handled the DROP/ACCEPT commands at the end of both functions properly?
Pastebin: http://pastebin.com/QN2uutvw