Hi
Small business user here. I have an office LAN that is behind a couple of firewalls:
DSL modem -> router/firewall -> linux iptables gateway -> Switch -> LAN
.................192.168.0.1 192.168.0.2 / 192.168.1.1 192.168.1.*
The router has firewall rules to block all incoming ports except a few services (mail, web, sip and a few others). All inbound and outbound traffic has to go through the linux gateway which has a redundant iptables setup to really make sure nothing is getting through. The gateway is also running as a transparent proxy on outbound port 80 to redirect web traffic through squid (caching and site blocking).
I am thinking of getting a new router that supports VPN, so that I can do road warrior type connections from Mac OSX, Windows Vista/7, Androids or IPhones. I see that there are several protocols out there (PPTP, IPSec, L2TP/IPSec, SSL). It also seems like each router provides a different level of support for each of these protocols. So much for standards! Anyway, I have a couple of questions about how all of this works.
1) What protocol has the least hassles? Or put another way, what protocols should I stay away from? I hear that PPTP is old and insecure. I have read the SSL has the least number of problems in terms of getting from the client to the server (usually no problems getting through firewalls/nat etc). It looks like L2tp/IPSec has good native support. Is it possible to make a definitive recommendation that one protocol is the best trade-off for simplicity and security for road warrior use?
2) What would be the best protocol to support if I don't want to have to mess with proprietary client access software? I know that Mac supports L2TP/IPSec out of the box, and I think IPhone does also. I don't know about Android or Windows. Is this the way to go? How good are the SSL clients and where do I get them from?
3) I was looking at the D-LINK DSR-500N router that seems to support all of these protocols, plus the release notes say that the latest firmware supports OpenVPN. I have not been able to find a review of this router any where. I am reluctant to purchase without hearing from someone (anyone!) about their experience. Will it work seamlessly with IPhone and Android clients? Has anyone got a DSR-500N and can vouch for it?
4) How will the VPN router work with my linux gateway? Right now only a few ports are allowed in to the LAN. I assume that the VPN tunnel will want connect directly to the LAN, not to the outside of the gateway.
Like this?
.....................192.168.0.1 192.168.0.2 / 192.168.1.1 192.168.1.*
dsl model -> VPN router/firewall -> linux iptables gateway -> Switch -> LAN
................................\
.................................192.168.2.* ---------------> Switch -> LAN
How will machines on the LAN figure out the routing?
I don't understand how this can work. Should I put another interface card in to the linux gateway for VPN connections, and set up VLAN's on the router to keep the traffic separate like this:
.....................192.168.0.1 192.168.0.2 / 192.168.1.1 192.168.1.*
dsl model -> VPN router/firewall -> linux iptables gateway -> Switch -> LAN
................................\ ___ /
......................192.168.2.1 --- 192.168.2.2
Thanks for any help to any and all of these questions.
Small business user here. I have an office LAN that is behind a couple of firewalls:
DSL modem -> router/firewall -> linux iptables gateway -> Switch -> LAN
.................192.168.0.1 192.168.0.2 / 192.168.1.1 192.168.1.*
The router has firewall rules to block all incoming ports except a few services (mail, web, sip and a few others). All inbound and outbound traffic has to go through the linux gateway which has a redundant iptables setup to really make sure nothing is getting through. The gateway is also running as a transparent proxy on outbound port 80 to redirect web traffic through squid (caching and site blocking).
I am thinking of getting a new router that supports VPN, so that I can do road warrior type connections from Mac OSX, Windows Vista/7, Androids or IPhones. I see that there are several protocols out there (PPTP, IPSec, L2TP/IPSec, SSL). It also seems like each router provides a different level of support for each of these protocols. So much for standards! Anyway, I have a couple of questions about how all of this works.
1) What protocol has the least hassles? Or put another way, what protocols should I stay away from? I hear that PPTP is old and insecure. I have read the SSL has the least number of problems in terms of getting from the client to the server (usually no problems getting through firewalls/nat etc). It looks like L2tp/IPSec has good native support. Is it possible to make a definitive recommendation that one protocol is the best trade-off for simplicity and security for road warrior use?
2) What would be the best protocol to support if I don't want to have to mess with proprietary client access software? I know that Mac supports L2TP/IPSec out of the box, and I think IPhone does also. I don't know about Android or Windows. Is this the way to go? How good are the SSL clients and where do I get them from?
3) I was looking at the D-LINK DSR-500N router that seems to support all of these protocols, plus the release notes say that the latest firmware supports OpenVPN. I have not been able to find a review of this router any where. I am reluctant to purchase without hearing from someone (anyone!) about their experience. Will it work seamlessly with IPhone and Android clients? Has anyone got a DSR-500N and can vouch for it?
4) How will the VPN router work with my linux gateway? Right now only a few ports are allowed in to the LAN. I assume that the VPN tunnel will want connect directly to the LAN, not to the outside of the gateway.
Like this?
.....................192.168.0.1 192.168.0.2 / 192.168.1.1 192.168.1.*
dsl model -> VPN router/firewall -> linux iptables gateway -> Switch -> LAN
................................\
.................................192.168.2.* ---------------> Switch -> LAN
How will machines on the LAN figure out the routing?
I don't understand how this can work. Should I put another interface card in to the linux gateway for VPN connections, and set up VLAN's on the router to keep the traffic separate like this:
.....................192.168.0.1 192.168.0.2 / 192.168.1.1 192.168.1.*
dsl model -> VPN router/firewall -> linux iptables gateway -> Switch -> LAN
................................\ ___ /
......................192.168.2.1 --- 192.168.2.2
Thanks for any help to any and all of these questions.