GL.iNet GL-AXT1800 for travel. Robust VPN config?

Hello everyone.

I have GL.iNet GL-AXT1800 that I intend to use for travelling around the world. I have wireguard server at home so need the wireguard client aspect of the router to be robust. I'd have about 5 devices connected to the router, all to go through VPN. And if VPN fails, kill switch should NOT let any clients access internet publicly.

Wife's phone will not go through VPN.

Current firmware
image

To set it up, I am to add my 5 devices here.
image

Wife's phone will not be added there as her phone will access publicly.

Have BNVT (block non VPN traffic) option off. This is the global VPN kill switch.
image

wireguard VPN connection also has internal kill switch that cannot be toggled.

Some questions.

  1. I read information on how the global VPN kill switch is handled differently in firmware 4.x. So afaik, i am to keep that off. And just rely on the internal vpn switch?
  2. How do i test that internal kill switch works? afaik i cannot manually disable the vpn. That will just force clients to access publicly and that's by design. So i have to test it by stopping the connection from my wireguard server, so then the clients connected to router cannot access internet. Yea?
  3. is the internal vpn switch robust? robust enough that there will not be any public leaks when I'm travelling around the world?

Thanks everyone

Yes. Pull the Ethernet cable of the vpn server and check. All devices goes to vpn will not have Internet. Your wife's phone should not be affected.

In 4.6.4 it is OK.
When you connect to a public/hotel wifi, you need to authenticate via the login portal. At that short time, it will have leak.

thanks for the fast reply alzhao. I really appreciate it.

  1. can you explain how that'll work? because to connect router to hotel wifi, i can use wifes phone to do the connection. Basically the MAC address clone way.

Once connection is done on phone. I can use the phone MAC address for my router. So now the VPN clients should not have public leaks yea?

  1. is that the best way to avoid leaks? is it better to use sim card dongles like this?

.

These would not require login portal.

which version it's robust? or get another router which is more robust? or what settings do I do to make it robust?

i basically do not want my VPN client list to ever hit internet publicly. Should ALWAYS be through VPN.

While using hotel Wi-Fi for example this isn't possible. During the login on the captive portal there is a short amount of time where tiny leaks are possible.

So it'll be safest to just use USB 4G modem?
is there a page that shows all the settings to use to be the most safe?

Let me say it might depend on your needs. I would say that this short amount of time, where leaks are possible, are mostly acceptable for most users. This might be different if you fear law enforcement or even more bad aggressors.

A single IP package going through a normal ISP instead of VPN won't destroy your privacy - mostly.

Using a 4G modem is, in my opinion, even more problematic because 4G modems are traceable and locatable via cell tower triangulation. This can pinpoint a device's location with relative precision, sometimes down to a few hundred meters, depending on the network's density and the number of nearby cell towers.

Ok so what's the best leak free option then? I thought the whole purpose of these travels routers was that they are 100% leak free. I want all traffic from my chosen client devices to always go through VPN. Never hit any server without the VPN. So if i'm in say japan. I dont want any japan requests going through to my companys websites.

I guess the best would be not take company laptop. I have that option. I can take personal laptop. Since no tracking software, then all company will see if that my public IP is consistent, then its ok?

100% in IT is not really possible. Mostly never. They are pretty leak free, but it depends on different things. Using a repeater in a hotel is one of those things that might leak a few packages, mostly DNS.

Just don't use your companies' laptop to enable the repeater mode and login into the captive portal. If you turn your laptop on after the router is connected to the hotel's Wi-Fi, all will be fine.

See:

ah ok. So that just means that any japan traffic from my phone while setting up the captive portal will go through. That's fine.

But once slate has connected to VPN, then turn on laptop wifi. so all packets from laptop will 100% be through VPN. yes?

I am not comfortable saying 100% - but yes, it should be like that.
Let's go with 99,9% then :wink:

haha no problemo :slight_smile:

so connecting to some hotel wifi is the best way?
you mentioned dont use USB 4G modem, that's riskier.

What about sim card wifi modules?

supports sim cards from 135+ countries. Transmit wifi for the slate to connect to.

Are you just afraid of your company? In that case, 4G is fine.
If you are afraid about the Mossad I would skip 4G for sure :smile:

haha I'm just trying to do whatever I can to keep risk as low as possible. Better safe than sorry i'd say.

am i correct to say the following?

  1. top option is slate connected via ethernet to a overseas router. The safest.
  2. second would be hotel wifi and solus lite devices
  3. last is 4G USB modem

Yup, I would agree to your all-in-all summary.

thank you admon. Any top known wifi devices like solus lite that works well with slate? Tried and tested.

Can't help with that, I am sorry :frowning:

Can I DM you in whatsapp or something?

DM me here on the forum or on the GL.iNet discord :slight_smile:

what is your discord name?

Same as here :smile: