Hey everyone,
I’m dealing with a frustrating issue, and I can’t seem to find a solution. I’m using Avast SecureLine VPN on Windows, but I need to make sure that my ZeroTier traffic (172.16.0.100) always bypasses the VPN and uses my ISP’s public IP instead.
My server is a Windows machine. My client, for example, is a tablet from another network. I’ve tried adding rules on my server.
The Problem:
- When I connect to Avast VPN, for about 1.5 minutes, everything works fine—ZeroTier traffic goes through my normal public IP (ISP), bypassing the VPN).
- Then, after that time, the VPN forces ZeroTier traffic through the VPN tunnel, overriding my routing rules.
- I’ve tried adding static routes on Windows and on my router, but they don’t seem to make a difference—ZeroTier still gets pushed into the VPN tunnel.
- Avast SecureLine VPN does NOT have split tunneling on Windows, only on Android.
- My router (TP-Link Archer C6) does NOT have a built-in VPN client, so all VPN routing happens on my PC.
What I’ve Tried So Far:
route -p add 172.16.0.100 mask 255.255.255.255 192.168.0.1 metric 5
Goal: Force ZeroTier traffic to bypass VPN and go through my default network.
My network:
192.168.0.1 - router
192.168.0.100 - server
172.16.0.100 - server ZeroTier address
VPN adding in routing table:
0.0.0.0 128.0.0.0 On-link 100.126.5.134 5
84.17.46.158 255.255.255.255 192.168.0.1 192.168.0.100 25
100.126.5.134 255.255.255.255 On-link 100.126.5.134 256
127.255.255.255 255.255.255.255 On-link 100.126.5.134 256
128.0.0.0 128.0.0.0 On-link 100.126.5.134 5
224.0.0.0 240.0.0.0 On-link 100.126.5.134 256
255.255.255.255 255.255.255.255 On-link 100.126.5.134 256
full routing on server: without vpnNetwork Destination Netmask Gateway Interface - Pastebin.com