On Sun, 3 Feb 2008 12:25:25 -0800
Grant <[EMAIL PROTECTED]> wrote:

> So I would set up openvpn on my remote server and connect to it from:

here's a few ideas about the subject, some options to think about.  

> 1. my local print server for printing

Look into routed vpn networks.  If I were in your case I would probably
set up a VPN server on (one of) my firewall(s) and then either
route/allow :641 traffic to the remote print server through the VPN or
simply redirect :641 connections through the VPN, just like port
forwarding for NATed servers behind firewalls.  in this configuration,
the remote print server is really a VPN client rather than a server.

> 2. my laptop for ssh and imap

I like to allow myself, with my laptop, to connect to my SOHO-sized
server setup through a VPN.  To this end I tell the gateways on select
subnets to route throught to the VPN, and tell the VPN server to route
to those subnets' gateways.  That way I can configure any computer
(through the vpn, of course) without having to worry about opening it
to external connections.  If you wanted to make the VPN transparent,
you could NAT the VPN traffic instead, and make it look like it came
from the VPN server itself.  

I cringe at the idea of having to use a VPN for imap, however.  

> Could I also only allow access to my website's admin pages through
> openvpn?

You could, but it might be a little tricky, depending on your setup.
If it were my goal, I would probably put the server pages in a
directory and control access to that directory to only VPN addresses
(Again, this assumes a routed vpn). Or you could put it on a different
server entirely.  

However, I would do no such thing.  I would want to use an entirely
different access scheme for website admin, using a user login to
perhaps an ssl protected webpage, or if I were really concerned, HTTP
authentication.  . I would not want my web admins, who likely enjoy the
ease with which they can manipulate their web pages, to be allowed on
the VPN, and wouldn't want to set it up on their computers or worry
about them getting viruses and the like.  It's hard for a virus to
transmit in a meaningful fashion over FTP and access to webpages, but
trojans on a VPN client give the trojan controller the same access to
the VPN -- and a copy of the client's certificates.  I am not quick to
pass out trusted certs for my vpn.  

In short, better uses of the VPN in this case would probalby be remote
access to the corp. network from your laptop and secure access to
remote print servers from whatever the number of hosts.   

> - Grant
-- 
gentoo-user@lists.gentoo.org mailing list

Reply via email to