Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    need help understanding benefit of OpenVPN

    Scheduled Pinned Locked Moved OpenVPN
    11 Posts 6 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      detox
      last edited by

      Hello All!

      I really need some help understanding OpenVPN. Here is my issue:
      I had been told we are tightening security at work. As most of the folks I service are 1/2 person offices and many are using HotSpots (MiFi) via cell carrier I cannot afford to build a PfSense box for each and for many it is not practical.
      So, I decided I needed to learn how to install, configure and deploy OpenVPN.
      This went well, and had OpenVPN connections working on 3 remote laptops. I reported this and was chastised stating that (OpenVPN) does nothing of value. All it does is secure tunnel from the VPN server to the other location but does nothing for security from the laptop to the VPN server so it has no value. VPN is only good if you want to watch TV or a move that you cannot see in the US.

      Now, I do not believe PfSense would provide software thats only practical use to to watch movies in another country. Not to mention this person has numerous laptops using VPN into the main office for access to printers, file servers etc.

      So, here is my question,,, as far as security goes, what benefit does OpenVPN have? Why should it be used? Does it matter if you are connected to web via cell phone/hotspot?
      Sorry for the rambling, am a bit frustrated and angered at the whole thing and looking for outside explanation on why OpenVPN should be used in business environment. And, I will not mention that "it's OK if you want to play with your experiments (PfSense) I'm just cannot afford to put Meraki firewalls in your offices at the moment".
      Thanks for letting me rant in a safe place. Any rational comments will be appreciated.

      M johnpozJ JKnottJ 3 Replies Last reply Reply Quote 0
      • M
        mer @detox
        last edited by

        @detox said in need help understanding benefit of OpenVPN:

        All it does is secure tunnel from the VPN server to the other location but does nothing for security from the laptop to the VPN server so it has no value

        So this secure tunnel to the VPN server: where are the two ends? Isn't one end on the laptop itself and the other end on the VPN server?

        Basically, my opinion, whomever made that specific statement really doesn't know what they are talking about, do they?
        If your default route is out the VPN, then every single packet leaving the laptop are secured in the VPN so in theory can't be cracked. Of course once it hits the server it's unsecure from then on.

        A common use is you set up a VPN from "home" to your work, when it's connected (VPN) the work network looks local to your home network. So if the work network is trusted, the home network connected through the VPN is "trusted".

        D 1 Reply Last reply Reply Quote 0
        • D
          detox @mer
          last edited by

          @mer
          Thank you for you reply. Yes, I have the OpenVPN client created by PfSense on the laptop.
          The laptop is connected to web via Verizon hotspot/cellphone/MiFi.
          The VPN server is on my PfSense firewall.

          All I am attempting to to is provide a greater security for our folks who do not have a "home" office to work from.

          thanks again

          M 1 Reply Last reply Reply Quote 0
          • M
            mer @detox
            last edited by

            @detox So OpenVPN client on the laptop connects over the physical medium of Verizon celluar network to a VPN server that is in front of the rest of the work network (roughly).

            To me it sounds like an IP packet generated on the laptop goes into the client end of the OpenVPN tunnel, gets encrypted, hits the outbound physical interface on the laptop, chunked into cellular data, far end cellular data gets recombined into IP data in the OpenVPN tunnel, then gets to your OpenVPN server.

            Well, to me, that path means the data leaving your laptop is secured in the OpenVPN tunnel until it hits the OpenVPN server.

            What happens after it hits the server depends on the ultimate destination. If it's going to a public service like say Google DNS, the output of the OpenVPN server end gets routed to the public internet, return comes back to your server, back down the tunnel, back to the laptop.

            If the destination is something inside of work on the server side, say some equipment in the lab at $WORK then effectively the "traffic to and from the work resources is secure".

            Maybe pictures on a whiteboard will help you get your point across. My father had a saying "managers are often promoted to the level of their ignorance".

            AndyRHA 1 Reply Last reply Reply Quote 0
            • AndyRHA
              AndyRH @mer
              last edited by

              @mer said in need help understanding benefit of OpenVPN:

              My father had a saying "managers are often promoted to the level of their ignorance"

              Never tell your boss you are aware of the Peter Principle. There is a nice Wiki on it. 🤣

              o||||o
              7100-1u

              M 1 Reply Last reply Reply Quote 1
              • M
                mer @AndyRH
                last edited by

                @andyrh Another thing my dad said (yes he is an engineer) "If you want to prove something is fixed give it to your boss"

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @detox
                  last edited by johnpoz

                  @detox just curious how exactly were your team/users accessing resources at the office before? When not in the office?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  D 1 Reply Last reply Reply Quote 1
                  • D
                    detox @johnpoz
                    last edited by

                    @johnpoz
                    the best $30 belkin routers you can buy at walmart; verizon hotspots

                    johnpozJ B 2 Replies Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @detox
                      last edited by johnpoz

                      @detox no I mean how did they access the resource actually in the office? Like file server(s), email any sort of databases in use - any other software run on servers or resources in the office..

                      You just opened up services ports for these things to the public internet?

                      edit: Unless there is some sort of actual resource in the office that they need to access, file server, some business type software, printer even. Some sort of local resource in the office then there prob is little use for a vpn into the office from their remote location if they are not actually accessing any resources there.

                      Say if your emails and files were all hosted externally on office 365 or something.. There would be little reason to vpn to the office from their home/laptop if there is no actual resources that need to be accessed in the office. Remote desktop to some server/pc in the office to run some business software, etc.

                      A vpn is a way to access resources securely over a non secure network. Ie how to access the work network from your home over the public internet (non secure).. But if you don't actually have anything they need/want to access on the business network - then justification of routing their traffic through the vpn to the work network to just go to say office365 could be seen as pointless.

                      Now if they say remote desktop to some box sitting in the office via remote desktop and run software XYZ on that pc.. Then YEAH!!! vpn is way more secure way to make sure this box in the office is not directly exposed to the public internet for remote desktop.. And only users and devices that have securely authed to the VPN, and then all traffic between that laptop and work network is secured for this remote desktop session.

                      Vs just setting up a port forward on your router at the office to the public internet for 3389 to this boxes work network IP.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 1
                      • JKnottJ
                        JKnott @detox
                        last edited by

                        @detox

                        All a VPN does, in this case, is provide a secure connection between a remote device and the office. This means the traffic cannot be intercepted. It does nothing about security on the device, such as antivirus or attacks coming in from elsewhere. One thing that can reduce the exposure to those attacks is to force all traffic through the VPN, whether work related or not.

                        However, many companies use VPNs for remote workers. I have installed and supported VPNs, including when I was at IBM, supporting a major corporation.

                        BTW, I have been using VPNs for around 20 years and never, ever used it to watch TV shows or movies that I couldn't get here. It's always been for remote access, either to my home network or office. While I use OpenVPN and years ago used CIPE, all my work VPNs were IPSec.

                        Incidentally, if you're using VoLTE on your cell phone (a virtual certainty these days), your calls are encrypted with IPSec so, even there, you're using a VPN.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 1
                        • B
                          Bambos @detox
                          last edited by

                          @detox how you handle vulnerabilities on the cheap routers ?
                          how you avoid sniffing traffic without encryption ?
                          how you get easy updates and renew the system without replacing hardware?
                          how you manage easily traffic routing and adding rules ?

                          The answer to all above is pfSense and OpenVPN. at least is what i learned from the good guys here.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.