Mike Auty <m.a...@softhome.net> said:

> James,
>       Our current setup is one where we have staff and clients using the VPN 
> to connect into our network, staff for normal work, clients for remote 
> troubleshooting.  We'd like to block clients off from both each other 
> and the main network with connection tracking so that they cannot make 
> connections into staff areas, but staff can make connections into them. 
>   Also Staff must be allowed total access.
>       As far as I understand it at the moment, even though the OpenVPN 2.0 
> system can work as it's own router, it will by default pass packets out 
> to the system for firewalling/routing etc.  This is exactly what I'm 
> after, so that's great.

Right, the --client-to-client flag (off by default) controls whether or not
OpenVPN internally routes client-to-client traffic.

> What I'm trying to do now is have the 
> --client-connect script determine which MAC addresses come from which 
> remote client and firewall them appropriately.  I was firstly wondering 
> if this was possible and secondly, assuming that at the moment it 
> wasn't, how best it might be handled in the new system.  Perhaps calling 
> a script when a MAC is learnt, or kernel packet tagging or creating many 
> virtual adaptors.  The last two ideas are neither scalable nor good 
> solutions, but the scripting idea also seems cumbersome unless the same 
> script is called with the common name and the new MAC learnt...

Interesting...  The client-connect script cannot know the remote TAP's MAC
address because the initial ARP sequences to establish it haven't happened
yet.  But I don't think it would be difficult to add a new validation script
which is called for every new MAC learned and includes the common-name and IP
address of the client.

James

>       My current ideas for work arounds are to parse the logs looking for 
> "MULTI: learn" lines, then call scripts and firewall based on that.  The 
> other more feasible idea is since there are only really two divisions 
> (staff and clients) to set up two adaptors and have one allow only 
> clients, and the other only staff.  This however sidesteps the issue of 
> linking a certificate common name to network traffic in some way.  Any 
> ideas/comments would be appreciated...
>       Thanks,
>       Mike  5:)
> 
> 
> -------------------------------------------------------
> This SF.Net email is sponsored by Sleepycat Software
> Learn developer strategies Cisco, Motorola, Ericsson & Lucent use to deliver
> higher performing products faster, at low TCO.
> http://www.sleepycat.com/telcomwpreg.php?From=osdnemail3
> _______________________________________________
> Openvpn-devel mailing list
> Openvpn-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openvpn-devel
> 



-- 




Reply via email to