Hello,
I'm experiencing an issue with my IoT devices connected to Beryl AX running Firmware 4.7.0-op24 (09/Dec/2024). When the VPN Client (Surfshark) is enabled, the devices frequently switch between online and offline. I believe the solution is to bypass the VPN based on domain, but the current firmware does not support wildcards. Could you please consider adding wildcard support for domain-based VPN bypass in a future firmware update?
Note: as office has multiple ISP connection, it has done some special split by different WAN IP, and only focuses on whether there are hops. If there are hops, it will go to the router's WAN, and if the hop * * *, it will go to the router's VPN.
(The ICMP package is actually accessing the walk to VPN interface. There is no hop because there is a known problem with the VPN client software design, which is known and is expected may to improve on v4.8.)
As you can see, the coolkit.cc is on the policy above, but it's resulting in "Request Timeout" as Google (that isn't in the list), so both are going to VPN.
Can you confirm that your device is using the router as DNS server? AGH isn't allowed to handle client requests directly in this scenario, for example.
have you flushed dns with ipconfig /flushdns, is ipv6 off?
also a very sneaky one is this i observed with chromium browsers:
If the browser runs 'secure dns', even if set to follow up OS dns settings, and in windows you have explicity disabled DoH/DoT.
Chromium still goes on with a hardcoded list and prefers DoH on 'known resolvers', if DoH was not present it uses DoT, best is to fully disable secure dns.
So the dns overridable setting often in the gl ui gets ignored due to the evasion of the browser, even in unexpected terms if set to follow system dns.