Configuring NordVPN Kill Switch & Strict VLAN Isolation
This article outlines the procedure to ensure that a specific VLAN (SecureLAN) remains permanently connected to NordVPN. The configuration prevents "IP leaks" by dropping all traffic when the VPN tunnel disconnects and by ensuring the network cannot communicate with any other local VLANs.
Step 1: Configure VPN Client Auto-Routing
First, ensure the VPN tunnel is established and that the specific network is routed through it.
Step 2: Implement the VPN Kill Switch (Gateway ACL)
Because Omada evaluates virtual VPN interfaces separately from physical WAN interfaces, we can create a "Deny" rule for the physical WAN. This acts as a kill switch: if the VPN tunnel drops, the traffic attempts to hit the WAN directly and is immediately blocked.
Step 3: Enforce Strict VLAN Isolation
To ensure the SecureLAN cannot reach any other internal networks (Main, IoT, Media, etc.), a LAN-to-LAN restriction is required.
Verification & Testing
To verify the "Kill Switch" functionality:
- Connect a device to the SecureLAN.
- Confirm internet access and verify the public IP matches a NordVPN server.
- Navigate to VPN > VPN Client and temporarily toggle the Status of the "NordOpenVPN" profile to Off.
- Attempt to load a webpage on the client device. The connection should fail immediately (timed out), confirming the KS_SecureLAN_Drop ACL is working.
No comments to display
No comments to display