> > So I would set up openvpn on my remote server and connect to it from:
>
> here's a few ideas about the subject, some options to think about.
>
> > 1. my local print server for printing
>
> Look into routed vpn networks.  If I were in your case I would probably
> set up a VPN server on (one of) my firewall(s) and then either
> route/allow :641 traffic to the remote print server through the VPN or
> simply redirect :641 connections through the VPN, just like port
> forwarding for NATed servers behind firewalls.  in this configuration,
> the remote print server is really a VPN client rather than a server.

That sounds good.

> > 2. my laptop for ssh and imap
>
> I like to allow myself, with my laptop, to connect to my SOHO-sized
> server setup through a VPN.  To this end I tell the gateways on select
> subnets to route throught to the VPN, and tell the VPN server to route
> to those subnets' gateways.  That way I can configure any computer
> (through the vpn, of course) without having to worry about opening it
> to external connections.  If you wanted to make the VPN transparent,
> you could NAT the VPN traffic instead, and make it look like it came
> from the VPN server itself.

Can't say I understand this but I have some reading to do about VPN.

> I cringe at the idea of having to use a VPN for imap, however.

Why?  Would you say the same of using it for SMTP?

> > Could I also only allow access to my website's admin pages through
> > openvpn?
>
> You could, but it might be a little tricky, depending on your setup.
> If it were my goal, I would probably put the server pages in a
> directory and control access to that directory to only VPN addresses
> (Again, this assumes a routed vpn). Or you could put it on a different
> server entirely.
>
> However, I would do no such thing.  I would want to use an entirely
> different access scheme for website admin, using a user login to
> perhaps an ssl protected webpage, or if I were really concerned, HTTP
> authentication.  . I would not want my web admins, who likely enjoy the
> ease with which they can manipulate their web pages, to be allowed on
> the VPN, and wouldn't want to set it up on their computers or worry
> about them getting viruses and the like.  It's hard for a virus to
> transmit in a meaningful fashion over FTP and access to webpages, but
> trojans on a VPN client give the trojan controller the same access to
> the VPN -- and a copy of the client's certificates.  I am not quick to
> pass out trusted certs for my vpn.

I was thinking authentication + VPN, but maybe that's overkill.  I
kinda like the idea of everything non-public going through the VPN.
Nobody should be in there but me so there's no trust problem.  Is that
too much?

There are only three machines involved here:

1. remote web/mail server, print client
2. local firewall/router/print server
3. local web/mail/print client

I think it would make sense to make machine #2 the VPN server, but it
is not nearly as reliable as machine #1 in terms of the internet
connection and the hardware (machine #2 is getting old).  I would hate
to be out of town and lose access to all email services because
machine #2 goes down.  Machine #1 basically never goes down.  Could I
make #1 the VPN server to maximize reliability and have everything
work the way I want it to?

- Grant


> In short, better uses of the VPN in this case would probalby be remote
> access to the corp. network from your laptop and secure access to
> remote print servers from whatever the number of hosts.
-- 
gentoo-user@lists.gentoo.org mailing list

Reply via email to