Hello,
Well, I'd like to have the following polices for the network:
INTIAL:
a. LAN, VPN and WIFI on the same subnet.
b. Essential services (i.e. DHCP and DNS) permitted between hosts on LAN/VPN/WIFI and the router (except for VPN and WIFI)
c. Only LAN and WIFI hosts can initiate connections to WAN.
d. Traffic shaping service for filtering p2p
FUTURE:
a. WIFI hosts can't initiate connections to WAN.
b. WIFI hosts should make a VPN connection (to another VPN server either running on router). Once connected they can initiate any connections to WAN via the VPN tunnel.
c. Only WIFI through VPN can initiate connections to WAN.
d. Roadwarrior VPN connections can't route traffic through WAN
I'm using 192.168.1.0/24 for my local network.
The need for using the same subnet is because i need a broadcast domain. Which i can't do by routing traffic. I need to use other protocols (like IPX) on the VPN and WIFI clients. But also i don't wan't that VPN clients accessing my internet connection.
First I'm tring to setup Shorewall (3.0.5) configuration on White Russian 0.9:
I stared with the following:
#/etc/shorewall/intefaces
wan eth1 detect tcpflags,dhcp,norfc1918,routefilter,nosmurfs
- br0 192.168.1.255 dhcp
#/etc/shorewall/hosts
lan br0:eth0
wifi br0:eth2
vpn br0:tap0
#/etc/shorewall/policy
$FW all ACCEPT
lan all ACCEPT
vpn lan ACCEPT
wifi wan ACCEPT
wifi lan ACCEPT
wifi $FW DROP info
vpn $FW DROP info
vpn wan DROP info
wan all DROP info
#/etc/shorewall/masq
eth1 br0
my OpenVPN configuration:
#/etc/openvpn/server.conf
port 12001
proto udp
mode server
tls-server
dev tap0
client-to-client
cipher BF-CBC
auth SHA1
ca /etc/openvpn/keys/ca.crt
dh /etc/openvpn/keys/dh1024.pem
cert /etc/openvpn/keys/server.crt
key /etc/openvpn/keys/server.key
local 192.168.1.1
client-config-dir /etc/openvpn/clients
tls-auth /etc/openvpn/keys/ta.key 0
comp-lzo
user nobody
group nobody
keepalive 10 60
persist-key
persist-tun
ping-timer-rem
verb 0
Any help, suggestions, etc may be welcome. Thanks.