Route Transmission traffic to a different interface

  • Hi,

    I've recently upgraded from OMV 4 to OMV 6, and installed Transmission-daemon bare metal to download some Linux ISO's ;) the problem I'm having is to do with my VPN.
    The NAS is at my parent's house ( because close to no network monitoring from ISP's compared to where I live ) and I usually access it through a VPN tunnel, which server is at my house. The NAS connects to the VPN server at startup and is connected 24/7, with replicating tasks implemented daily between the NAS itself and a small server at my home.

    The problem is that ALL the traffic from my NAS goes through my VPN, which I don't want, because of local ISP's...

    I searched the whole day today how I could set up a port-based route or some other way so that my Transmission traffic bypasses the VPN. I know that it can be dangerous with OMV to manipulate the network settings outside of the web interface because of how OMV handles networking.

    "Why don't you run your VPN server on the NAS ?" Because with great ISP's comes CGNAT IP, so I would be unable to connect to it
    "Why don't you Dockerize Transmission ?" AFAIK it would not make a difference regarding my situation, and why run the whole Docker shebang JUST for Transmission ?

    Here's a quick dump of ip route

    Code
    root@homenas:~# ip route
    0.0.0.0/1 via 10.76.45.1 dev tun0
    default via 192.168.0.1 dev eno1 proto dhcp src 192.168.0.100 metric 100
    10.76.45.0/24 dev tun0 proto kernel scope link src 10.76.45.4
    128.0.0.0/1 via 10.76.45.1 dev tun0
    172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1
    192.168.0.0/24 dev eno1 proto kernel scope link src 192.168.0.100
    192.168.0.1 dev eno1 proto dhcp scope link src 192.168.0.100 metric 100

    192.168.0.0 is the NAS's local network, 10.76.45.0 is the VPN network.

    Could it be as simple as deleting all the tun0 routes except the one for the VPN network ?
    I know my way around basic networking stuff, but never got to dive into iptables stuff...

    X79 NAS (OMV6)
    Gigabyte GA-X79-UD3 - Intel Xeon E5-2609 - 8GB DDR3 RAM
    Samsung 850 EVO 250G SSD OS drive - 6x4TB ( mix of WD red & Seagate Ironwolf ) RAID 6 data pool
    Corsair VS550 PSU - Antec P183 case

    Project NAS/Server (OS TBD) :
    Motherboard TBD ( currently MSI B150i Gaming Pro AC ) - CPU TBD ( currently Intel Core i5 6400 ) - 16GB DDR4 RAM
    Samsung 970 Evo 250G SSD OS drive - 4x8TB Seagate Ironwolf PRO RAID 5 data pool
    Seasonic SGX 450 PSU - Cooler Master Elite 130 case

  • crashtest

    Hat das Thema freigeschaltet.
  • After manually removing the 0.0.0.0/1 and 128.0.0.0/1 routes, I can still access the nas from my home using it's VPN IP, so the VPN tunnel is not broken and the Transmission Traffic does not go through the VPN anymore, YAY!
    I need a way to make it permanent ( probably will get it to work as intended when I switch all my setup to use Wireguard ) in the meantime, scheduled tasks at startup should do the trick. I'll dive into my OpenVPN server config files to see if I somehow have enabled the redirect gateway option at the time

    X79 NAS (OMV6)
    Gigabyte GA-X79-UD3 - Intel Xeon E5-2609 - 8GB DDR3 RAM
    Samsung 850 EVO 250G SSD OS drive - 6x4TB ( mix of WD red & Seagate Ironwolf ) RAID 6 data pool
    Corsair VS550 PSU - Antec P183 case

    Project NAS/Server (OS TBD) :
    Motherboard TBD ( currently MSI B150i Gaming Pro AC ) - CPU TBD ( currently Intel Core i5 6400 ) - 16GB DDR4 RAM
    Samsung 970 Evo 250G SSD OS drive - 4x8TB Seagate Ironwolf PRO RAID 5 data pool
    Seasonic SGX 450 PSU - Cooler Master Elite 130 case

    Einmal editiert, zuletzt von Edge ()

  • Yep, that was it... I had redirect-gateway enabled on my VPN server :rolleyes:
    Corrected it, rebooted everything, and all is well and working, without having to set any scheduled tasks.

    X79 NAS (OMV6)
    Gigabyte GA-X79-UD3 - Intel Xeon E5-2609 - 8GB DDR3 RAM
    Samsung 850 EVO 250G SSD OS drive - 6x4TB ( mix of WD red & Seagate Ironwolf ) RAID 6 data pool
    Corsair VS550 PSU - Antec P183 case

    Project NAS/Server (OS TBD) :
    Motherboard TBD ( currently MSI B150i Gaming Pro AC ) - CPU TBD ( currently Intel Core i5 6400 ) - 16GB DDR4 RAM
    Samsung 970 Evo 250G SSD OS drive - 4x8TB Seagate Ironwolf PRO RAID 5 data pool
    Seasonic SGX 450 PSU - Cooler Master Elite 130 case

  • Edge

    Hat das Label gelöst hinzugefügt.
  • Glad you have it sorted out. Quick question for you. Have you verified that the IP address you are exposing when torrenting is not your real IP, but that of the VPN service?

    --
    Google is your friend and Bob's your uncle!


    OMV AMD64 7.x on headless Chenbro NR12000 1U 1x 8m Quad Core E3-1220 3.1GHz 32GB ECC RAM.

  • Yes, I didn't mention it on my original post, but I have another VPN client running on my parent's router ( to some VPN provider my dad has subscribed ). This was the whole reason why I wanted the Transmission traffic to not go through the VPN setup at the NAS.

    X79 NAS (OMV6)
    Gigabyte GA-X79-UD3 - Intel Xeon E5-2609 - 8GB DDR3 RAM
    Samsung 850 EVO 250G SSD OS drive - 6x4TB ( mix of WD red & Seagate Ironwolf ) RAID 6 data pool
    Corsair VS550 PSU - Antec P183 case

    Project NAS/Server (OS TBD) :
    Motherboard TBD ( currently MSI B150i Gaming Pro AC ) - CPU TBD ( currently Intel Core i5 6400 ) - 16GB DDR4 RAM
    Samsung 970 Evo 250G SSD OS drive - 4x8TB Seagate Ironwolf PRO RAID 5 data pool
    Seasonic SGX 450 PSU - Cooler Master Elite 130 case

  • Yes, I didn't mention it on my original post, but I have another VPN client running on my parent's router ( to some VPN provider my dad has subscribed ). This was the whole reason why I wanted the Transmission traffic to not go through the VPN setup at the NAS.

    Doesn't answer my question. Asked another way, what IP address does transmission itself say it is using? And how are you determining this?

    --
    Google is your friend and Bob's your uncle!


    OMV AMD64 7.x on headless Chenbro NR12000 1U 1x 8m Quad Core E3-1220 3.1GHz 32GB ECC RAM.

  • Nothing relative, just saying it. Using qbittorrentvpn, and qbit running THROUGH the vpn, I still had to select, under qbit, the interface from eth0 to tunnel, so that it left the physical interface and used the vpn.

  • gderf ah yes my bad... I'll quickly load a torrent I'm one of not many seeders into another client to see what it reports...

    Yup, it shows the VPN provider IP, my ass is covered.

    fbeye I'm not using Docker and the issue was that I wanted the torrent client to go through the physical interface, as I have a VPN client running on the NAS to connect to it from my home ( the NAS being at my parent's ) and another VPN client from a VPN provider at the router level at my parent's to cover my traffic

    X79 NAS (OMV6)
    Gigabyte GA-X79-UD3 - Intel Xeon E5-2609 - 8GB DDR3 RAM
    Samsung 850 EVO 250G SSD OS drive - 6x4TB ( mix of WD red & Seagate Ironwolf ) RAID 6 data pool
    Corsair VS550 PSU - Antec P183 case

    Project NAS/Server (OS TBD) :
    Motherboard TBD ( currently MSI B150i Gaming Pro AC ) - CPU TBD ( currently Intel Core i5 6400 ) - 16GB DDR4 RAM
    Samsung 970 Evo 250G SSD OS drive - 4x8TB Seagate Ironwolf PRO RAID 5 data pool
    Seasonic SGX 450 PSU - Cooler Master Elite 130 case

Jetzt mitmachen!

Sie haben noch kein Benutzerkonto auf unserer Seite? Registrieren Sie sich kostenlos und nehmen Sie an unserer Community teil!