Hello Peter,

In my humble opinion, though I may be wrong, this isn't really OpenVPN's role, in fact. Beside the VPN, you should have some kind of network configuration limiting the accessibility of your internal servers (for example via iptables or something built upon it).

Of course, via the OpenVPN directive "push" you can specify routes, and one could think in the first place that it could be sufficient to only specify the routes (and/or IP addresses) the clients are allowed to connect to, but it is not the case, as it is still possible for an OpenVPN client to locally add routes even if those routes have not been pushed by the server. Hence it cannot serve as an efficient security measure.

Regards,

Bruno


Le 03/11/2024 à 17:59, Peter Davis via Openvpn-users a écrit :
Hello,
I have an OpenVPN server that I use to share the internet. Users connect to this server and use its internet. When a user connects to the OpenVPN server, he\she can ping the IP addresses of other servers on the network. How can I create a restriction?

Thank you.


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to