So I have a quick question. I recently subscribed and started using VPN with Private Internet Access running their client software on my PC that I utilize as my Plex Media Server. I can not remotely access PMS through the myPlex web app via internet browser, nor through the Android app.
The PC that runs my PMS is also my web server, my router is connected to a DDNS server that pushes all web traffic to that PC. I can access my PMS remotely by typing in a URL like this:
I mainly started using PIA as I download some content through SS-Plex. If I use XFlac's solution to bypass the VPN tunnel, will it make my SS-Plex traffic visible to prying eyes since it is run through Plex?
Here's a question, do you think I should have the script remove IPs no longer used by plex.tv? I can easily add this, and I think it makes sense to do so, just want to get some feedback before making the change.
I think the change you put forth would be great, more secure, in case plex no longer uses the IP and it is bought and used by someone now to bypass our vpn and spy on us :)
I’ll try to make the changes as soon as possible. In The meantime, u can just run the uninstaller immediately before running the main script, it will have the same effect.
This is most likely going to be the final update as I don't have any other ideas for enhancements, but as always I'm open to suggestions
After this latest update (June 16, 2015), the script now it removes old IP addresses no longer used by plex.tv from being routed past your VPN. So only the current IP addresses used by plex.tv will bypass your VPN and nothing else.
I actually have the gateway hard coded and it’s not working. I notice the list of IPs are stored in the appropriate directory, though I’m not certain what else the script does, how it interacts with Plex. Could it be a permissions issue?
::If gateway is detected incorrectly, override it by uncommenting the below like (delete : and input your correct gateway
set gateway=192.168.1.1
Try running as admin. Add a pause to the end of the script and see of its throwing up an error. Also, check if anything has been added to your routing table (can’t remember the command right now, but should be obvious if u run route /?)
Will this script work if I’m using an Apple AirPort Extreme router? Thanks!
EDIT: Tried it out using the 255.255.255.255 file and it worked fine. Does it matter if I use the .bat or .exe to schedule the task with? How often do you guys set the task to run? Thanks!
The bat is fine but when it runs a cmd window will appear and can be annoying if it runs and interrupts a video or something you happen to be doing. The exe runs invisibly so it won’t be a distraction, otherwise they are identical.
I have mine run every hour, but that’s probably overkill. If I’m out and there happens to be an update to the IP I know I won’t be locked out for more than an hour tops. But I’ve never even experienced that much, doesn’t change that frequently, but still doesn’t hurt. Running the script isnt a strain on resources, not even close, so that’s why I picked every hour.
Hi there,
I got it working for a 1 min by using the 255.255.255.252 file, but then it stoped on my PureVPN! So any hits to go further on? Any commen seeting for the VPN I should be aware of, like use use OpenVPN protocol over the other etc.?!?!
@kbaggen said:
Hi there,
I got it working for a 1 min by using the 255.255.255.252 file, but then it stoped on my PureVPN! So any hits to go further on? Any commen seeting for the VPN I should be aware of, like use use OpenVPN protocol over the other etc.?!?!
I gave up on getting the Flak script to work on my Win10 system and just had my vpn provider open a port for my plex server.
I’ve had my VPN setup for a while and have recently wanted to stream Plex through the VPN (experiment to begin with, but will be looking to do it long term eventually). Problem is, the port (32400) is not reachable through the VPN.
Port forwarding works perfectly fine without the VPN, so I know that’s not the issue. As soon as the VPN kicks in, I lose access. Oddly enough though, the server is accessible via app.plex.tv via a browser but not through the Plex app on multiple phones (iOS & Android).
Router the VPN is setup on is an Asus RT-AC68U. I contacted the VPN provider, who advised it’s not their issue and to contact Plex (which was helpful… not). They have a NAT firewall which has been turned off, yet the ports are still not accessible.
I don’t know whether it’s my router or the VPN preventing access to the PMS.
Any thoughts on what to do from here would be greatly appreciated.
@evakq8r said:
Hi all, first time poster, long time Plex user.
…
Any thoughts on what to do from here would be greatly appreciated.
First off, it is your VPN… It is the whole concept of a VPN to obfuscate your IP… In order to use plex (as it is setup…) you need to route ‘around’ your VPN.
You did not say what firmware you were using on your router, but this is aimed at Tomato/DD-WRT/Merlin/etc. If you can put in a script, you should be able to follow along.
@JasonMeudt said:
You did not say what firmware you were using on your router, but this is aimed at Tomato/DD-WRT/Merlin/etc. If you can put in a script, you should be able to follow along.
Firmware is AdvancedTomato, 2.9.131.
Thanks for the feedback and suggestions, sorry if my first sentence wasn’t to your liking.
XFlak, nice work automating the process. Glad it works for others, not me. Hoping you can point where I am doing wrong:
Nighthawk r8000 using DD-WRT v3.0-r27560M (8/8/15)
DDNS with Hostname, WAN IP: 76.xx.xx.xx, OpenVPN Client to IPVanish, NAT routing 32400 to 192.203.1.xx.
PMS manually ported to 32400.
All works well without VPN.
Turned on OpenVPN client at router level. Connects well. IP now 64.xx.xx.xx. tracert verifies VPN in use.
Ran 255.255.255.255 batch (with mask unchanged, then changed to 255.255.255.0).
Route print verified that persistent routes are present. Tracert verifies that routes go through VPN, not ISP.
I am certain it’s user error, as this networking stuff is new to me, but I learn quickly…any advice is much appreciated. Thanks.