diff --git a/Shorewall-docs2/OPENVPN.xml b/Shorewall-docs2/OPENVPN.xml
index e810f75dc..136576e39 100644
--- a/Shorewall-docs2/OPENVPN.xml
+++ b/Shorewall-docs2/OPENVPN.xml
@@ -21,7 +21,7 @@
- 2005-10-19
+ 2005-10-25
2003
@@ -434,7 +434,7 @@ verb 3
article by Marc Zonzon
-
+
Securing a Home Wireless Network with OpenVPN (OpenVPN
Bridge)
diff --git a/Shorewall-docs2/myfiles.xml b/Shorewall-docs2/myfiles.xml
index f2f496083..9e61de11d 100644
--- a/Shorewall-docs2/myfiles.xml
+++ b/Shorewall-docs2/myfiles.xml
@@ -53,38 +53,40 @@
I have DSL service with 5 static IP addresses (206.124.146.176-180).
- My DSL modem
(Westell 2200) is connected to eth2 and has IP
- address 192.168.1.1 (factory default). The modem is configured in
- bridge
mode so PPPoE is not involved. I have a local
- network connected to eth3 which is bridged to interface tun0 via bridge
- br0 (subnet 192.168.1.0/24), a wireless network (192.168.3.0/24) connected
- to eth0, and a DMZ connected to eth1 (206.124.146.176/32). Note that I
- configure the same IP address on both eth1 and modem (Westell 2200) is
+ connected to eth2 and has IP address 192.168.1.1 (factory default). The
+ modem is configured in bridge
mode so PPPoE is not
+ involved. I have a local network connected to eth3 which is bridged to
+ interface tun0 via bridge br0 (subnet 192.168.1.0/24), a wireless network
+ (192.168.3.0/24) connected to eth0, and a DMZ connected to eth1
+ (206.124.146.176/32). Note that I configure the same IP address on both
+ eth1 and eth2.
In this configuration:
- I use one-to-one NAT for Ursa (my personal system that run SuSE
- 10.0) - Internal address 192.168.1.5 and external address
- 206.124.146.178.
+ I use one-to-one NAT for "Ursa" (my
+ personal system that run SuSE 10.0) - Internal address 192.168.1.5 and
+ external address 206.124.146.178.
- I use one-to-one NAT for Eastepnc6000 (My work system -- Windows
- XP SP1). Internal address 192.168.1.6 and external address
- 206.124.146.180.
+ I use one-to-one NAT for "Eastepnc6000" (My
+ work system -- Windows XP SP1). Internal address 192.168.1.6 and
+ external address 206.124.146.180.
I use SNAT through 206.124.146.179 for my Wife's Windows XP
- system Tarry
, my crash and burn
- system "Wookie", our SuSE 10.0 laptop Tipper
which
- connects through the Wireless Access Point (wap) via a Wireless Bridge
- (wet), and my work laptop (eastepnc6000) when it is not docked in my
- office.
+ system Tarry
, my crash
+ and burn system "Wookie", our SuSE
+ 10.0 laptop Tipper
which connects
+ through the Wireless Access Point (wap) via a Wireless Bridge (wet),
+ and my work laptop (eastepnc6000) when it is not
+ docked in my office.
While the distance between the WAP and where I usually use
the laptop isn't very far (50 feet or so), using a WAC11 (CardBus
wireless card) has proved very unsatisfactory (lots of lost
@@ -107,36 +109,38 @@
The firewall runs on a P-II/233 with Debian Sarge (testing).
- Ursa runs Samba for file sharing with the Windows systems and is
- configured as a Wins server.
+ Ursa runs Samba for file sharing with the
+ Windows systems and is configured as a Wins server.
The wireless network connects to the firewall's eth0 via a LinkSys
WAP11. In additional to using the rather weak WEP 40-bit encryption
(64-bit with the 24-bit preamble), I use MAC verification and OpenVPN in bridge mode.
+ url="OPENVPN.html#Bridge">OpenVPN in bridge mode.
- The single system in the DMZ (address 206.124.146.177) runs postfix,
- Courier IMAP (imap and imaps), DNS (Bind 9), a Web server (Apache) and an
- FTP server (Pure-ftpd) under Fedora Core 4. The system also runs fetchmail
- to fetch our email from our old and current ISPs. That server is
- accessible from the Internet through Proxy
- ARP.
+ The single system in the DMZ (address 206.124.146.177) runs Postfix, Courier IMAP (imap and
+ imaps), DNS (Bind 9), a
+ Web server (Apache) and an
+ FTP server (Pure-ftpd) under
+ Fedora Core 4. The system
+ also runs fetchmail to fetch our
+ email from our old and current ISPs. That server is accessible from the
+ Internet through Proxy ARP.
- The firewall system itself runs a DHCP server that serves the local
- and wireless networks.
+ The firewall system itself runs a DHCP server that serves the
+ local and wireless networks.
All administration and publishing is done using ssh/scp. I have a
desktop environment installed on the firewall but I usually don't start
- it. X applications tunnel through SSH to Ursa or one of the laptops. The
- server also has a desktop environment installed but it is seldom started
- either. For the most part, X tunneled through SSH is used for server
- administration and the server runs at run level 3 (multi-user console mode
- on Fedora).
-
- I run an SNMP server on my firewall to serve MRTG running
- in the DMZ.
+ it. X applications tunnel through SSH to Ursa or one
+ of the laptops. The server also has a desktop environment installed but it
+ is seldom started either. For the most part, X tunneled through SSH is
+ used for server administration and the server runs at run level 3
+ (multi-user console mode on Fedora).
The ethernet interface in the Server is configured with IP address
206.124.146.177, netmask 255.255.255.0. The server's default gateway is
@@ -145,16 +149,17 @@
/etc/network/interfaces file (see below) adds a host route to
206.124.146.177 through eth1 when that interface is brought up.
- In addition to the Openvpn bridge, the firewall hosts an OpenVPN
+ In addition to the OpenVPN bridge, the firewall hosts an OpenVPN
Tunnel server for VPN access from our second home in Omak, Washington or when we are
otherwise out of town.
- Eastepnc6000 is shown in both the local LAN and in the Wifi zone
- with IP address 192.168.1.6 -- clearly, the computer can only be in
- one place or the other. Tipper can also be in either place and will
- have the IP address 192.168.1.8 regardless.
+ Eastepnc6000 is shown in both the local LAN
+ and in the Wifi zone with IP address 192.168.1.6 -- clearly, the
+ computer can only be in one place or the other.
+ Tipper can also be in either place and will have
+ the IP address 192.168.1.8 regardless.
@@ -818,19 +823,28 @@ client-config-dir /etc/openvpn/clients
ccd-exclusive
client-to-client
-verb 3
-
+verb 3
+
+ Tipper and Eastepnc6000 Configuration in the Wireless
+ Network
+
+ Please find this information in the OpenVPN bridge mode documentation.
+
+
+
Tipper Configuration while on the Road
This laptop is either configured on our wireless network
(192.168.3.8) or as a standalone system on the road.
- Tipper's view of the world is shown in the following diagram:
+ Tipper's view of the world is shown in the
+ following diagram: