On 12/31/18 10:32 AM, Tom Eastep wrote:
> On 12/29/18 2:26 PM, C. Cook wrote:
>> On 12/28/18 1:34 PM, Tom Eastep wrote:
>>> On 12/28/18 10:08 AM, C. Cook wrote:
>>>> Idk whether this is a Shorewall question or not.
>>>>
>>>> My LAN has a class C of 192.168.1.0.  The gateway for all LAN members is
>>>> 192.168.1.1
>>>>
>>>> Now one of the LAN members is a KVM VM at 192.168.1.16, and it is the
>>>> Wireguard VPN server.  Remote machines come in through the gateway and
>>>> are port-forwarded to the VPN server for full access to the LAN.  This
>>>> works fine now. (Thank you)
>>>>
>>>> First Question:  Remote VPN members can access any node in the LAN, but
>>>> can not get back out through the gateway for internet access.  Any idea
>>>> where I should look?  The VPN server does have its gateway set to
>>>> 192.168.1.1.
>>> Is the remote VPN client configured to use the VPN as a default route?
>> It's set so that no applications are exempted from using the VPN.  I
>> should think this would be equivalent.  Seems to be my only option.
>>
> I doubt that the setting you are talking about redirects all traffic
> through the tunnel.

Maybe true.

I wasn't getting access on the phone before while on VPN, but I've made
a number of Shorewall changes in my LAN.  I do have internet access on
my phone now.


>
>>
>>>
>>>> Second Question:  Another member of the LAN, 192.168.1.4, is the backups
>>>> server.  And the backups server runs a KVM VM which handles all security
>>>> cameras (ZoneMinder) through a dedicated port in the class C of
>>>> 10.1.50.0.  This security cam VM has a second IP in the class C of the
>>>> LAN and serves Zoneminder to the LAN this way.
>>>>
>>>> I would like to serve Zoneminder to the outside only on the VPN.  Does
>>>> that mean I port-forward 80 to the VPN server, either through a reverse
>>>> SSH tunnel or by Shorewall DNAT?  Then to access it from remote on the
>>>> VPN server?  Is this the best way?  Would it then also still be
>>>> accessible to the LAN?
>>> I'm confused. Who initiates this TCP connection on port 80 and where is
>>> the http server?
>> The remote phone could initiate it using the ZM app, or any random
>> machine inside the LAN could initiate it.  Only the WireGuard server is
>> running Wg so no internal communications is VPN.
>>
>> Communication with the cameras could be via port 80 to get ZoneMinder
>> functionality, or directly from the cameras by getting the rtsp stream
>> with something like VLC.
> Then, since the backup server is on the LAN, VPN clients should be able
> to connect to it directly.

Well I don't allow ports open on LAN machines, to reduce attack surface.

But I've realized that I can set up a reverse SSH tunnel from the VPN
server on wg0, to the cameras server.  This way Zoneminder is available
only to the VPN.


>
>>
>>>
>>>> Third Question:  The cameras on 10.1.50.0 are only visible to the
>>>> cameras server on a dedicated port.  These cameras provide a high-res
>>>> RTSP stream and a low-res RTSP stream, the latter being appropriate for
>>>> a remote phone.  Can anyone see how I can pipe the low-res stream to the
>>>> VPN server so it's accessible by a remote phone?
>>>>
>>> Is this stream accessible from other hosts on the LAN? If so, how?
>>
> To access the camera directly, the Shorewall box needs to have a route
> to the 10.1.50.0/24 subnet via the backup server's 192.168.1.4 address
> and the backup server would need to enable IP forwarding. Assuming that
> you can get default routing from the VPN client to go through the
> tunnel, then the VPN clients can access the server directly.

Good idea, thanks.


>
>> It's not, because the cameras are in a different class C than the LAN. 
>> The rtsp streams can be reached by the backups server (KVM host to the
>> cameras VM) because it has a dual IP, one of which is in the cameras'
>> domain.
>>
>> If I add IPs to all machines in the LAN I'm concerned that this would
>> put them in the collision domains of the cameras, defeating the purpose
>> of having them in a different class C.
>>
> If you are concerned about 10.1.50.0/24 colliding with a network local
> the the VPN client, you can use DNAT on the Shorewall box. You could
> have VPN clients connect to port 81 on IP 192.168.1.4, which would be
> DNATted to the dedicated port on the camera.

Will do, thanks.



_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to