GL-AR750S-Ext VPN Policies work but kill internet

I have the same problem with 3.105, I’m using ExpressVPN - openVPN. The openwrt-gl-ar750s-fix-policy fixed the problem.

@aelserafy Using the same configuration on my side did not have the problems you described, but you can try the firmware in the link, I made some adjustments

1 Like

This firmware has properly functioning MAC based VPN policy filtering using Wireguard and Mullvad.

1 Like

This firmware seems to be causing my ar750 to lose connection. I’m using strongvpn and wireguard. Turning on the VPN policy seems affect everyone the same regardless if they are on the rules apply/don’t list. I’m pretty disappointed in the level of quality of firmware that is being released. It’s making me realize I probably need to stick to more established manufacturers. I don’t think Cisco or Netgear release firmware that has these types of issues.

I noticed that using this FW, after a period of ~12 hrs, the connection would be very slow. And afterwards, one of 2 scenarios happen:

  1. the router restarts
  2. Or, the connection is restored and local router management is no longer accessible while the router is still manageable via cloud.xyz!

is this fix included in 3.201?

Glad this issue is already adressed. I face the same issue. When (Open)VPN is active and the VPN Policy is set to Domain/IP, my internet connection gets very unstable. When starting a speed test, the speed seems ok at first but then the connection breaks down entirely and the connection gets lost. I have the GL-X750 with Firmware Version 3.104-3105.

Yes this is addressed in 3.201

2 Likes

After 3 days of usage of the 3.201_b2, the issue is back!
It’ll be good if we knew the issue exactly and what was adjusted by @radishman on the 4th of Jan. in 3.105
I’m back to the 3.105 fixed version.

Has benn fixed in 3.201_beta4.

For my (probably related) issue…

(I needed to connect the AR750S to a wireguard VPN, send all traffic through the tunnel, but allow devices on the wifi to connect to VPN themselves, so VPN policy had to allow bypass of the VPN to the VPN server IP only. This wasn’t working in out of the box 3.105.)

… I found that 3.105-104 and 3.201b4 didn’t work. 3.201b4 allowed bypass but only to IPs that were not the wireguard server IP. The only way I found to get this to work was to downgrade to 3.104.

1 Like

Hi, I have the same task. So 3.104 does allow bypass?

Yes.

I bought mine just recently; it came with 3.105. This did not seem to allow IPs defined in Policy to bypass wireguard. I then tried 3.105-104 and 3.201b4. I don’t remember specifics of 3.105-104, but 3.201b4 mentioned above does allow connections to bypass wireguard - as long as it was not the VPN server’s IP. (The opposite of what I needed!)

I found that only by downgrading to 3.104 was I able to get all devices (without clients) to go through the VPN, but devices (with a wireguard client) were able to reach the VPN server directly without going through the wireguard tunnel. I was not able to use the UI to downgrade from 3.201b4 to 3.104, it broke and I had to use the uboot method.

1 Like