Beryl VPN Killswitch redundancy?

Hi All, using beryl to wireguard to Brume at home. Knowing that VPN killswitches are never 100% is there anything I can add on the beryl side for reduncy? Assume I cant add anything on the client itself but can add more devices between client and beryl

GL.iNet’s built-in VPN kill switch for Wireguard is actually very reliable and its separate code base. I trust their implementation WAY more than Tailscale’s for example which is their own code base.

If you’re still worried, I would be focused more on making sure IPv6 doesn’t give you DNS leaks.

How do you prevent the DNS leaks?

There are none. Because I have IPv6 turned off on the GL.iNet router and my work laptop doesn’t even have IPv6 enabled.

If your client computer does have IPv6 enabled and you can’t turn it off, then just enable IPv6 on the GL.iNet router and let it pass IPv6 traffic through the tunnel back to your home router even if your home ISP doesn’t even give a public IPv6 address.

u/NationalOwl9561 do we turn on any specific option on server (wireguard) to enabled ipv6 tunnelling? currently, when I turn on the vpn on my phone and use LTE, I only see ipv4 and no ipv6. I would like to tunnel both. Can you advise please?

Whats a quick check on the laptop to see if ipv6 is enabled

GL.iNet routers don’t support IPv6 for VPN tunnels currently.

Do you know how to Google? I don’t know what OS you even have

You can hit https://test-ipv6.com/

so will it cause any leaks? if my isp provides ipv6 and if it doesn’t tunnel?

If you enable IPv6 on the GL.iNet router then yes leaks are possible.

It tells you this on the dialog box.

got it, if ipv6 is disabled, then it simply won’t pass and I will only have ipv4. Right?