domuhe
New Around Here
Advice would be appreciated on an unorthodox (I think) openvpn setup!
We have an unorthodox network layout here: The office LAN has a public address range (e.g. 14.9.2.0/24) and although the office LAN if firewalled to the outside there is no NAT. We also have an instrument LAN with a private address subnet (10.0.0.0/24). Also, I have no control of the external router as we are tenants in the building.
Still, I would like to setup an OpenVPN for 3 types of users
1) staff; full tunnel, full access to office LAN and instruments on intrument LAN
2) developers; split tunnel, access to instruments on instrument LAN
3) guests; split tunnel, access to certain FileServers on office LAN
So I can't configure anything on the external router, but I'm thinking I can achieve this by configuring the VPNrouter (RT-AC87U) for TUN and:
for 1) enable forwarding and NAT for VPN clients on 10.1.0.0/24
for 2) enable forwarding for 10.2.0.0/25 and add static route on instrument router and file servers pointing to the VPN router
for 3) enable forwarding for 10.2.0.128/25 and add static route on relevant file servers pointing to the VPN router
So, is there anything wrong with this setup (is it secure)? And am I right in thinking that even if clients ignore the split tunnel, they could not force a full tunnel, as their VPNclient LAN is not NATed at the VPN router and therefore the external router should drop any packets going out, even if they guess and set a default gw?
Cheers!
We have an unorthodox network layout here: The office LAN has a public address range (e.g. 14.9.2.0/24) and although the office LAN if firewalled to the outside there is no NAT. We also have an instrument LAN with a private address subnet (10.0.0.0/24). Also, I have no control of the external router as we are tenants in the building.
Still, I would like to setup an OpenVPN for 3 types of users
1) staff; full tunnel, full access to office LAN and instruments on intrument LAN
2) developers; split tunnel, access to instruments on instrument LAN
3) guests; split tunnel, access to certain FileServers on office LAN
Code:
14.9.3.1
external router
(x) 14.9.2.10
| 14.9.2.1 FileServer
| | office LAN 14.9.2.0/24
------------------------------------------------------------------
| |
| | 14.9.2.7
14.9.2.6 | | VPNclient (x) Instrument
VPN (x)---------| LAN2 | router
router | | 10.2.0.0/24 |
| --------------
---------------- Instrument LAN
VPNclient LAN1 10.0.0.0/24
10.1.0.0/24
So I can't configure anything on the external router, but I'm thinking I can achieve this by configuring the VPNrouter (RT-AC87U) for TUN and:
for 1) enable forwarding and NAT for VPN clients on 10.1.0.0/24
for 2) enable forwarding for 10.2.0.0/25 and add static route on instrument router and file servers pointing to the VPN router
for 3) enable forwarding for 10.2.0.128/25 and add static route on relevant file servers pointing to the VPN router
So, is there anything wrong with this setup (is it secure)? And am I right in thinking that even if clients ignore the split tunnel, they could not force a full tunnel, as their VPNclient LAN is not NATed at the VPN router and therefore the external router should drop any packets going out, even if they guess and set a default gw?
Cheers!