Koozali.org: home of the SME Server

VPN Server Behind Firewall Questions

aekalman

VPN Server Behind Firewall Questions
« on: May 24, 2001, 12:06:24 AM »
I was able to successfully get e-smith 4.1.2 working as a VPN server by assigning one of our static IPs as its external IP address and then dialing in through an ISP with Win95 (!) v1.4 DUN and connecting to that static IP.

I got e-smith server running like this:

Internet <-> DSL modem <-> e-smith <-> LAN2 (private LAN)

But I'm not particularly comfortable with this, as there are no no firewalls between LAN2 and the internet.

The problem I'm having is figuring out how to get it to work behind a firewall, and was wondering if someone could help / point me in the right direction.

Our setup looks like this:

Internet <-> DSL modem <-> Firewall1 <-> DMZ / LAN1 <-> Firewall2 <-> LAN2

LAN1 uses private IPs (e.g. 192.168.1.x) and LAN2 also uses private IPs (e.g. 192.168.2.x). Services in the DMZ include http and ftp, with Firewall1 forwarding those services to them. Firewall2 is a choke firewall with "our network" behind it. Firewall1 is LinkSys BEFSR41, and Firewall2 is FREESCO.

Q1) As a general question, how (on earth) does one place e-smith VPN server behind a firewall and still have the ability to connect / tunnel to its static IP via VPN?

The LinkSys unit prevents me (I think) from having our static IPs in the DMZ/LAN1, and forwarding port 1723 to e-smith VPN in DMZ/LAN1 with a private IP address doesn't seem to work -- I get no response at all from e-smith -- I checked the logs.

Q2) As a security issue, what's the best (low-cost, as you can see we're cheap here :-)) topology to pursue to allow VPN access to LAN2 but maintain security.

Thanks!

aekalman

Re: VPN Server Behind Firewall Questions
« Reply #1 on: May 25, 2001, 07:23:12 AM »
Well, I was able to get it to work -- I ended up placing the e-smith server (ext eth interface) in LAN1 with a private IP, and (int eth interface) on LAN2 with a private IP.

I then configured the LinkSys router to forward 1723/TCP and 47/UDP (dunno if the latter is really required) to the LAN1 private IP of the e-smith server. I then connect to the public IP (ext interface of Router/Firewall #1, the LinkSys).

I also had to choose the "use maximum security" option for the Win2k Pro client DUN VPN connection, and then it worked beautifully.

However, I'm still concerned with security. Can anyone comment on whether / how much our network has been compromised by the e-smith server connecting the two private LANs together "over" the second firewall/router that serves as a choke firewall for the private LAN2.

Thanks,