Jump to content
Not connected, Your IP: 3.81.29.254
Sign in to follow this  
madmanvep

VPN outbound gateway on home network to AirVPN

Recommended Posts

On my home network, I have a public IP and run a few public services (email server, web, etc). These have no need for AirVPN. On the other hand, all of my client computers I would like to run through AirVPN (laptop when I fire it up, tablets, desktop, etc).

 

I am thinking the easiest way to do this is to set up one box (a virtual machine) running as an alternate gateway on my network that is always connected to AirVPN. I could statically assign addresses and gateways to my servers, but then allow DHCP to route all client traffic through this alternate gateway (and thus through AirVPN).

 

My question, has anyone done this successfully. If so how?

 

I dont want to set up my router to connect to the VPN since I need to have services run through it from my ISPs static IP. I could run just about any flavor of linux or windows to get this to work if someone has a proven method.

 

I found a link to a similar project on the OpenVPN site, but the directions seem to be incomplete. I build three separate VMs trying to get it working, no luck. 

Share this post


Link to post

You can do this and more with pfSense... either by following my guide for three or more NIC's or by using selective routing and some creativity with the LAN subnet mask.

 

I have both clear net and VPN connectivity currently using multiple subnets for LAN (clear-net), VPN_LAN, XBOX (clear-net), VOIP (clear-net) and PRINTER (Local access only). I soon will be doing away with the separate subnets for LAN, VPN_LAN and XBOX. I likely will be using a subnet of 192.168.0.1 /18 (/24 is normal) which will give me an internal address range of 191.168.0.1 - 191.168.63.254 on my LAN.

 

Then by creating outbound NAT rules for VPN traffic (lets say 192.168.10.1 /24) and clearnet traffic (say for instance 192.168.11.1 /24) that direct/NAT the outbound traffic to the correct gateway, I can use policy routing in my firewall rules to ensure correct and leak free vpn/clearnet usage.

 

There are a few more steps involved with firewall rules, dhcp server and dns server settings as well as a few system settings but this is the gist of it.

 

This may all sound confusing now, but point is... you can do this quite easily with pfSense. If you use good equipment you will also have the benefits of having no noticeable speed degradation through the VPN, strong network security, and you can even get into using Suricata or Snort if you are up to it.


Have my guides helped you? Help me keep helping you, use my referral: userbar.png

How to set up pfSense 2.3 for AirVPN

Friends don't let friends use consumer networking equipment!

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...