dagadog 5 Posted ... I just noticed a hit on the firewall rule blocking all non-vpn traffic on my DSL router. Checked my syslog server and saw this: Aug 5 20:05:05 192.168.253.254 FIREWALL rule (1 of 20) : Protocol: TCP Src ip: 192.168.253.1 Src port: 51634 Dst ip: 213.152.161.100 Dst port: 89 Chain: forward_level_VPN_Only Rule Id: 5 Action: deny 253.1 is my server's DMZ facing interface, and 213.152.161.100 is the AirVPN node I'm connected to. I can see why the traffic would go outside the tunnel (a host route is installed to ensure my server doesn't try to send OpenVPN via the tunnel interface. Also. I blocked it and and nothing broke so I suspect it's not important. Nontheless, I'd be interested to find out what it was. Any ideas? Quote Share this post Link to post
zhang888 1066 Posted ... When you initiate the Air speedtest, it will try to measure the speed both in and out of the tunnel, to the server you are connected to.This is what you did and what caused this. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
dagadog 5 Posted ... Aha! Thanks for the explanation. Although I haven't ran a speed test since setting the system up, several weeks ago (and if I had it would have failed because I'm blocking the traffic). Quote Share this post Link to post