User Guide - Configuring a VPN that meets a variety of needs
In this document, we examine a VPN setup to meet the needs of a fictitious company. In doing so, we aim to cover the use and configuration of OpenVPN Cloud to meet the most common VPN scenarios. We will be building the VPN in phases. This allows us to cover various VPN setups using one example and progressively build in complexity while reducing the repetition of configuration steps.
A business has headquarters located in California, USA, a branch office in Massachusetts, USA and another branch in the United Kingdom. Owen is in charge of IT and Networking for this company. Owen is looking for a VPN solution that does not require him to manage, install and maintain VPN servers and allows him to create a hosted VPN that can be accessed from regional locations worldwide.
Owen is aware that such a service is provided by OpenVPN Inc and signs up to use OpenVPN Cloud.
Owen completes the signup process as shown here. During the signup process, Owen selects technop.openvpn.cloud as the web domain for the user portal. This domain uniquely identifies the VPN that will be set up by Owen and is used by Connect Client applications (VPN Client software) to identify the VPN that it needs to connect to.
Owen’s first goal is to establish site-to-site networking between the private networks in each office location. He wants full-mesh connectivity such that each location can communicate with the other two locations. Owen plans the connectivity using the table below:
|Site Type||Site Location||closest OpenVPN Cloud Region||Network Name||Subnets to associate with the network||Route for public Internet traffic generated from this Network|
|HQ Building||CA, USA||San Jose, CA||HQNetCA||10.1.0.0/17||use local exit point do not enter OpenVPN Cloud VPN|
|Branch office||MA, USA||Ashburn, VA||BranchNetMA||10.2.0.0/20||use local exit point do not enter OpenVPN Cloud VPN|
|Branch office||UK||London, UK||BranchNetUK||10.3.0.0/20||use local exit point do not enter OpenVPN Cloud VPN|
Once the planning is done, Owen gets to implementation by following these steps:
Sign in to the OpenVPN Cloud administration portal and configure the HQ network
Owen uses the guide shown here to configure the first network. Multiple network subnets can be configured for the same Network.
Set up the other two networks
Check that access is set to full mesh
Install connector software and connect to OpenVPN Cloud
A guide to installing the OpenVPN client and connecting to OpenVPN Cloud is shown at: Installing Network Connector – Linux
Configure the network routes at each of the sites
IP forwarding is the ability for an operating system to accept incoming network packets on one interface, recognize that it is not meant for the system itself, but that it should be passed on to another network, and then forwards it accordingly. This is what you need when you have for example a system setup that is sitting between two different networks and needs to pass traffic between them. On pretty much any Linux system, barring a few exceptions, this can be accomplished by editing the /etc/sysctl.conf file and adding or uncommenting a specific line. To enable IP forwarding on Ubuntu/Debian, for example, see, Enable IPv4 forwarding. Check IPv6 forwarding as well if needed : https://wiki.gentoo.org/wiki/IPv6_router_guide
The alterations you’ve made to the sysctl.conf file should now have taken effect and IP forwarding should now be enabled permanently on this system.
Now there is only one thing left to configure. The router in the network where the Connector is installed needs to be made aware that it can reach the other two networks, and that they can be reached by contacting the private IP address of the Connector. While the configuration shown below addresses the HQ network, routes need to be added to both the branch networks too.
In our example network, the computer that has the Connector installed on it at HQ has an IP of 10.1.60.55. To make the router aware that BranchNetMA and BranchNetUK subnets can be reached via the Connector, look up the documentation of your router device, and look up how to add static routes. Please note that you should add these static routes on the router present in the HQ. These are the static routes that need to be added:
- Network 10.3.0.0 with subnet mask 255.255.240.0 through gateway 10.1.60.55
- Network 10.2.0.0 with subnet mask 255.255.240.0 through gateway 10.1.60.55
With the new static routes in place, whenever traffic now arrives at the router that has as a destination an IP address somewhere in 10.3.0.0/20 or 10.2.0.0/20, it will know that it should forward this to the OpenVPN Connector at IP address 10.1.60.55. OpenVPN Cloud will then route it to the correct site.
Remote Workers / Telecommuting
The business has hired two people with specialized skills and allowed them to work remotely. Harry and Mary will be working out of their home offices and need to access the corporate network. Owen decides to make them part of the full-mesh VPN by setting them up as OpenVPN Cloud users. All OpenVPN Cloud users if not assigned to a specific group, belong to the Default Group. The full-mesh access configuration allows these users to access all of the VPN even other User’s devices.
Check and edit the Default User Group settings
Owen checks whether the Default Group setting meets his needs. As he wants all users to authenticate with username and password, he edits the Authentication Type to ‘Profile and password’. Owen refers to Editing Default User Group settings for setup.
Choose the means of profile distribution
Owen wants the employees to receive their profiles automatically once they take steps to add their profile into the Connect Client and authenticate via their OpenVPN Cloud credentials. He would have chosen the manual mode if delivering the profile to the employee was being handled by the employee on-boarding portal, or a device management system, or by other offline means.
Add users Harry and Mary
There are two ways that Owen can choose to invite Harry and Mary to be users of the VPN:
- Let OpenVPN Cloud send an invitation to the user’s email and activate the user’s account when the user clicks on the invitation link. For this to happen, the user email must be supplied while adding the user
- The administrator can provide the user portal link, username and temporary password to the user via other means. For this to happen, the user email must NOT be supplied while adding the user.
Owen uses Adding a User as a guide to adding Harry with his email address. The alternative of using the temporary password is shown in Admin sends instructions with temporary password to new User. On receiving the credential and user portal link, the user can either User Account activation with temporary password access the user portal or directly import the profile using Connect Client User Account activation with temporary password using Connect Client
User Harry joins OpenVPN Cloud
Harry receives the invitation email, activates his account and downloads the Connect Client application for his device. See, User Account Activation
User Harry gets profile and connects
Harry can now get the profile and connect to one of the allowed VPN Regions for the group Default. Notice that Frankfurt is not in the list because Default group was not allowed to connect to Frankfurt. See, User downloading app, getting profile and connecting
Owen Checks that Harry has got his profile
Check that Harry’s Status is now ‘Active’ and a device is present. See, Check User and Devices
Internet Security and Policies
The IT Security department have started using various Network Threat Management tools such as Intrusion Detection and Protection systems, malware scanning, among others. Owen wants to direct all public traffic from the branch networks and any telecommuters to the HQ networks. The HQ networks will serve as the Internet exit point for the VPN so that the Internet security policies implemented at HQ is enforced and the security appliances don’t need to be installed in the branch locations. In order to do this, Owne carries out these steps:
Add an Internet Gateway to the HQ Networks
Configure the computer with the Connector as an Internet Gateway
Make changes to Internet Access for Networks
Using Changing a Network’s Internet Access to use Internet Gateway as a guide, Owen changes the Internet Access setting of BranchNetMA and BranchNetUK to use HQNetCA for Internet Access. Now the VPN is ready to accept public traffic from both Networks and route it over to HQNetCA for connectivity to the Internet.
Add Default Routes at the Branch Networks
Owen configures the routers at both branch sites to remove the static routes put in earlier (see, static routes ) and use the computer with the Connector software as the default route for the private network.
Make changes to Internet Access for User Groups
To route the Internet traffic from VPN connected Users over to HQNetCA, the Groups need their Internet Access changes from Local to HQNetCA. Owen follow the guide Changing User Group’s Internet Access to use Internet Gateway to set both the Owner and Default Groups to use HQNetCA for Internet Access.
Many SaaS providers offer a means to prevent unauthorized logins by letting their customers configure an IP address range to whitelist. Once configured, Login requests originating only from this whitelisted IP address range are allowed. Owen wants to put this additional security check in place for the SaaS tools used by his company. With telecommuters also needing access to these tools, it is hard to define an IP address range because their public IP address will change based on whether they work from home, cafe or some other Internet access point. Owen does not need to work about these changing IP addresses because he has configured the Groups Internet Acces to use the HQNetCA network (see, Changing User Group’s Internet Access to use Internet Gateway). Therefore, the traffic reaching the SaaS tools always have public IP address the same as the public IP address of HQNetCA even for telecommuters.
Owen can now configure the public IP address range of HQNetCA as the whitelist IP address range for SaaS. For example, https://help.salesforce.com/articleView?id=mc_overview_ip_whitelist.htm&type=5
OpenVPN Cloud allows the configuration of strict access controls. Controls can be put in place that will restrict access from Networks, Hosts, and User Groups to fine-grained services defined under Networks and Hosts. The sections below illustrate some of the ways access controls can be used.
Inter-site Access Controls
While Owen has networked together the private networks of HQ and the two branches, he knows that there is only a specific subnet in each location that houses services that need to be accessible from other sites and by telecommuters. Owen decides to constrain access to only those subnets between the sites.
Configures services for all three networks
Using Configuring a Subnet as a Service as a guide, Owen creates subnet of HQ services that all branches and telecommuters need access to. He creates a service SharedHQServices for subnet 10.1.10.0 /24 in HQNetCA, SharedBrMAServices for subnet 10.2.10.0/25 in BranchNetMA, and SharedBrUKServices for subnet 10.3.10.0/25
Add Access Control Group
Using Add Access Group as a guide, Owen creates an Access Group that provides access from All User Groups and All Networks to the Shared Services subnet created in each Network.
Switch to use of Custom VPN Topology
Access Groups and Services are only applicable when the VPN is not in full-mesh mode. Owen switches the VPN topology to using Custom as shown in Changing VPN topology from Full-Mesh to Custom
Now that the access controls are active, employees at the various location and while telecommuting have full access to services as long as the services are from the Shared Services subnet any attempt to access IP address outside of those subnets is blocked by OpenVPN Cloud.
User Group Application Access Controls
Owen wants to further tighten the security when employees are telecommuting. Instead of giving them access to the complete subnet housing shared services at all the locations, he wants to provide them with web access (protocols: HTTP and HTTPS) to that subnet and only to the subnet at the location that they normally work out of.
Create New web-specific Service
Using Protocol-specific Service as a guide, Owen creates web-specific services in each of the Networks
Create new User Groups
Owen creates a User Group for each location: HqEmp, BrMAEmp, BrUKEmp. He uses Add New User Group as a guide. When he is done, the Groups screen looks like the one below.
Assign Users to appropriate Groups
Owen changes the Group from Default to the correct User Group based on each user’s work location. See, Assign a User to a Different Group
Alter existing Access Groups
The existing Access Group provided All Groups access to the full shared services subnets in all locations. This Access Group needs to be edited in order to remove User Groups from that rule and let it pertain just to Networks. See, Edit Access Group
Create Group-specific Access Groups
Now, for each of the new User Groups, Owen needs to create an Access Group to provide web access to the shared subnet it the same work location as the user’s report to. See, Provide access to a specific Service to a User Group. Once done, the Access Groups look like below. Now due to these Access Groups, telecommuting users can only access web services from the Network that they would connect to when at work.
Now that Owen has restricted telecommuters to just the use of web services, he is assured that none of the users can access any other services while telecommuting. But, Owen would like to access Servers on any of the 3 location’s network while telecommuting. Owen frequently needs ssh access to his servers while at work. To get the same access while telecommuting, Owen needs to define new Services and Access Groups.
Create New Services
Owen creates a new Service under each Network for SSH and Telnet access to the complete private IP address space of those networks. See, Protocol-specific Service for more details on setting up a Service.
Create a new Access Group
In the earlier step, Owen had created HQPrivilegeAccess, BrMAPrivilegeAccess, and BrUKPrivelegeAccess as Services. Now, he provides access to these services to the Owner User Group of which he is a member of by creating a new Access Group. For more specifics on creating Access Groups see, Add New User Group
Access Rules in effect
With the Access Group for privileged access setup, the current access rules that are in effect are shown in the screenshot below.
Owen has been asked to give the highest grade of access security to a particular server on HQ network which houses financial reporting application. The financial service should be accessible only to key members of the HQ finance department, of which Henry is a member. Owen decides to implement some of the zero-trust principles for this service. The private corporate network is not treated as a trusted network. For access to the service, the user needs to connect to the VPN. This enforces that user identity is authenticated and the device too is authenticated by use of certificates. If the device is compromised, the certificate can be revoked. After authentication, only authorized users are provided access to the application. This strict zero-trust access policy along with additional web application authentication makes for a strong access security model.
To make the service inaccessible from the branch networks, Owen deploys the server in a subnet that is different from the shared services subnet. To ensure that other computers on the HQ private network do not have direct access to the service, Owen adds firewall rules to only allow traffic coming via the Connector computer to communicate with the financial application server.
Create a new User Group
Assign User to the Group
Create a Service for the financial web application
Create a new Access Group
Secure IoT Application
To conserve energy, the company has decided to upgrade its infrastructure at the Headquarters building to enable building automation. The solution requires that a number of control systems installed in the building communicate with the building automation control server. Owen decides to use AWS to host the automation control server. Instead of making the complete AWS VPC a Network and using a site-to-site networking paradigm, just the Control server can be a part of the VPN by colocating the Connector client on the same server. The steps Owen follows for this solution are:
Adding a Host
Owen configures a new Host called IOT-BldgAuto See, Adding a Host
Owen configures two services, one a web service for the building automation application, and the other for privileged access to the server. See, Adding Service for a Host
Owen downloads the profile for the Connector configured for the host and uses that to configure the Connector software on the building automation control server. See, Installing Network Connector – Linux
Adding User Group for IoT
Owen adds HQIoT as a new User Group. The building automation control systems in the HQ building will belong to this Group. As these systems are unattended and will need to setup the VPN connection without the need for someone to enter username and password, the Authentication Type is selected to use just the profile (i.e. mutual authentication based on the use of digital certificates). San Jose, CA is the only VPN Region that these devices are allowed to connect to. Owen intends to use just on User (HQBldgIoT) to represent all the control systems in the HQ building. Each control systems will be one Device that belongs to this User. As the number of control systems are many, Owen configures 100 as the number of devices allowed per user. As these devices will only communicate with their control server (Host IoT-BldgAuto), Internet Access is Blocked See, Customizing a User Group
Adding a User
A new User, HQBldgIoT, is created and assigned to HQIoT User Group. See, Adding a User
Installing Client and downloading profile
The control systems run on Windows operating systems. The steps to download the Connect Client for Windows and connect to San Jose VPN Region are similar to User downloading app, getting profile and connecting
Providing the Control Server Address
The control systems need to be configured with the IP address of their control server for them to use the IoT web service. As the control server has been configured as an OpenVPN Cloud Host, it can be reached using the VPN address assigned by OpenVPN Cloud to the Host Connector. As seen from the configuration below, the Host has been assigned an IPv4 address of 100.64.1.2
Final VPN and configuration
After all the configuration, the end state for the VPN is achieved.