vpn endpoint inside firewall

Hi all,

When placing a VPN router/server inside a firewalled network, I assume it will be fine to just attach one LAN-side port to the local LAN, and not have a connection to the vpn router's WAN port. Yes?

My firewall router is a Linksys WRT54G v3.0 running HyperWRT v15c. I'm using this setup because I need lots of ports forwarded (more than what's available with the standard firmware), and I need to be able to forward GRE using iptables. And I'd like to keep the firewall separate from the vpn endpoint.

For the vpn endpoint I'll be using a Netscreen, Netgear, D-Link, or Linksys. The client will be an XP laptop running a clinet that's IPsec

-- either the vpn device's proprietary client or TheGreenBow, etc.

Alternately, I could move the WRT54G to the inside and use it as just a wireless access point, but I'd need to port-forward 30+ ports. (usually soho routers only allow 10 or so.)

I've had trouble setting up various software VPN servers:

A) XP host inside private network listening for VPN conections: -- I forwarded nececary ports, plus used IP tables to be sure the GRE is forwarded. -- Got 721 error. Tried & tried & tried. No joy.

B) OpenVPN running on same XP box: -- Bridged network and Tapi interfaces. -- On laptop, worked okay, but soon stopped. -- Note, when switching from Ethernet to Wireless must delete bridege, recreate & rename bridge on new interface. PITA.

So, what's the popular physical arrangement for a soho VPN box inside the firewalled home LAN?

Thanks in advance.

Reply to
Loading thread data ...

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.