Hi there,

for the first time during my employment I have the
opportunity to introduce OpenBSD into a production of
the corporate environment as an VPN concentrator i.e.
remote access server. The problem is, all folks here
are very Linux biased and introducing OpenBSD for such
an important task is looked at using ultra-magnifying
glasses meaning any failures will not be tolerated at
all, but if OpenBSD proves to be worth its job it will
be considered approved for use even in future services
as well. So, this is the one-time chance I wouldn't
like to miss. :)

I never before worked with VPN deployment, but now
think of using IPsec since it is an open standard and
it is implemented in OpenBSD.

The VPN scenario looks to me pretty default and
straightforward:

- client machines will be connecting to VPN server
anywhere from the internet using several OS flavors
(99% winbloze laptops, 1% winCE PDA + linux laptops),

- VPN software on client machines must be freely
obtainable (preferably bundled with OS itself),

- VPN solution must be unique (i.e. using the same
protocol regardless of the client type).

- VPN server must be relatively easy to administer and
configure, and it must have local firewall (pf) which
can filter VPN traffic and tunneled traffic as well.


The network layout looks like following:

CLIENT (can have public IP or private IP)
| (private client IP assumes default gateway uses NAT)
|
|
INTERNET
|
|
NIC_0_FIREWALL_0 (public IP)
FIREWALL_0
NIC_1_FIREWALL_1 (public IP, subnet_A)
|
|
NIC_0 (public IP, subnet_A)
VPN_SERVER (OpenBSD)
NIC_1 (public IP, subnet_B)
|
|
NIC_0_FIREWALL_1 (public IP, subnet_B)
FIREWALL_1
NIC_1_FIREWALL_1 (public IP, subnet_C)
|
|
DESTINATION SUBNET (public IP network, subnet_C)

The goal would be for client to reach destination
subnet (subnet_C) using VPN.

It is not possible for VPN server to reside directly
into destination subnet (subnet_C) because of
administrative reasons, but if you give me a _very_
good reason to do so, maybe it could be arranged. The
scenario layout would then look like this (in this
case, note the lack of both the second firewall and
the second NIC on VPN server):

CLIENT (can have public IP or private IP)
| (private client IP assumes default gateway uses NAT)
|
|
INTERNET
|
|
NIC_0_FIREWALL_0 (public IP)
FIREWALL_0
NIC_1_FIREWALL_0 (public IP, subnet_C)
|
|
NIC_0 (public IP, subnet_C == DESTINATION SUBNET)
VPN_SERVER (OpenBSD)

As you can see, there is almost none use of any
address translation (except when client connects to
some provider which uses private adressess for
access). 
Also firewalls don't perform any address translation
either, they just permit/deny traffic and route it.
Neither firewall is aware of any VPN traffic.

So please, could anyone help and provide me with the
needed guidelines to accomplish this scenario ? As I
said before, success of this VPN scenario definitely
would be a very good advocacy for OpenBSD.

Thank you,

Jeraklo
--
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

Reply via email to