User Guide - Limiting network access to only authorized private and trusted internet services
A military contracting services company carries out software development of highly sensitive applications of national security importance. They provide their employees with company-owned laptops that are managed and locked-down by the IT department.
Owen is in charge of IT and Networking for this company. Remote access needs to be provided to a handful of management employees. He has been tasked to find a Network-as-a-Service solution that, based on the user’s identity, restricts network and internet access to:
- Authorized applications hosted in specific private networks IP address subnets ranges
- Access to specific private domains
- Only HTTPS access to all private services
- No access to the internet except a select set of domains
Owen decides to use OpenVPN Cloud to build a VPN that provides secure remote access to its private network and the internet. He completes the signup process as shown here. During the signup process, Owen selects an OpenVPN-ID for his VPN. This [OpenVPN-ID].openvpn.com domain uniquely identifies the VPN that has been set up by Owen.
- On the VPN section of the Settings page, Owen sets VPN Topology to Custom so that access rules can be enforced.
- Owen adds the IP address range of the subnet that hosts internal applications as a Network named app_network. In spite of the private network having access to the Internet, he does not enable VPN Egress becausethere is no need for the Network to announce the default route to the VPN but only routes for a specific set of internet domains.
- Owen adds the following as services for the app_network:
- Adds a service of type set to domain for each of the allowed set of public domains: cnn.com, .mil, .gov, and linkedin.com
- Adds a service with type set to IPv4 and service set to HTTPS for the IP address subnet range of app_network
- Owen then installs the Connector on a computer running Linux on the private subnet. He sets that instance to enable IPv4 forwarding and NAT on the private IP address.
- The DNS systems reside in the same subnet as app_network. To allow the users to resolve private domain names while connected to the VPN, Owen configures the private DNS servers as the DNS Servers on the VPN section of the Settings page.
- On the Groups tab of the Users page, he adds a new group called Mngmt withthe Internet Access setting set to Block. This means that all the internet traffic from the user’s device will be tunneled to OpenVPN Cloud and all that traffic will be dropped, except the ones destined to configured pubic domains as services for app_network. He sets Connect Auth to the value of every time so that the VPN users need to always enter their credentials when they connect to the VPN
- To enforce access control, Owen creates an access group with the user group Mngmt as the source and all the services belonging to app_network as the destinations.
- On the User section of the Settings page, Owen sets Profile Distribution to Manual. The use of this setting disables the users from using their logins to automatically activate devices and import profiles.
- Owen adds the management employees as Users and assigns them to the Mngmt group. He then adds a device for each one of them. He then downloads the device profile for each user’s device.
- For each of the laptops, Owen installs the OpenVPN Connect client and uses file import to add the respective profile for the user’s device. He uses a third-party endpoint management software to add a policy to always connect to OpenVPN Cloud when a network connection is active.
After this setup, anytime the laptops connect to a network (whether internal or public) the laptop will establish a VPN connection, after authentication, to OpenVPN Cloud in order to gain HTTPS access to apps hosted on the private network and a select set of internet sites.