@kncar77:
Voila, all was working and the traffic was routed through the new VPN by default but how? Under System Information -> Routing it says WAN is default, something I'd expect I guess as otherwise how would the VPN client be able to connect?
The existing Firewall rule was just allow all to all from all * * * basically..
I guess you get the default route pushed from the vpn server. This can be checked in Diagnostic > Routes while the vpn client is connected.
@kncar77:
So does it come back to the order of the NAT outbound rules?
But the top NAT rule is the WAN and immediately below is the VPN rule and still the VPN is the default?
Does it read from bottom up and first hit becomes the rule? Or vice versa, the last becomes default?
The outbound NAT rules are checked for matching their constraints from the top to bottom likewise the firewall rules. But the WAN rules don't match for vpn traffic, because it's going out the vpn interface, since it's routed to the vpn server by the default route mentioned above.