{{Box|text= '''Introduction''' {{project_name_gateway_short}} uses the sysctl parameter net.ipv4.conf.*.arp_ignore=2 to prevent network information leaks, such as VPN IP address leaks on the local network.https://github.com/mullvad/mullvadvpn-app/blob/main/audits/2024-12-10-X41-D-Sec.md#mllvd-cr-24-03-virtual-ip-address-of-tunnel-device-leaks-to-network-adjacent-participant-severity-medium This is known to interfere with advanced configurations, such as routing a VPN through {{project_name_gateway_short}} or using a {{project_name_customworkstation_short}}. Therefore, the configuration must be made more lenient for these use cases. Changing arp_ignore=2 to arp_ignore=1 will resolve these issues. Doing so may allow some additional data about {{project_name_gateway_short}}'s network configuration to be leaked to other machines on the local network (or other VMs on the same Qubes OS machine), but it should not allow leaking information such as VPN IP addresses to other machines. To change arp_ignore=2 in {{project_name_gateway_short}} to arp_ignore=1: {{kicksecure_wiki |wikipage=Networking#ARP_sysctl_settings |text=ARP sysctl settings }} '''1.''' Launch a terminal in {{project_name_gateway_short}}. (If using Qubes OS, launch a terminal in the whonix-gateway-17 template.) '''2.''' Run: sudo nano /etc/sysctl.d/99_user.conf '''3.''' Type: {{CodeSelect|code= net.ipv4.conf.*.arp_ignore=1 }} '''4.''' Press Ctrl+S to save, followed by Ctrl+X to exit. '''5.''' Reboot {{project_name_gateway_short}}. (If using Qubes OS, shut down the whonix-gateway-17 template and reboot all qubes based on that template.) '''6.''' Done. The process of changing arp_ignore=2 to arp_ignore=1 in {{project_name_gateway_short}} is complete. }}