The VPN router allows a client connection to commercial VPN services like HMA (HideMY Ass). Since the VPN router is ahead of the UTM hardware all of the UTM's protection is still effective. The VPN router is just to establish a VPN client connection for your home network as a whole.
If you uses VPN client software behind your UTM (on your personal computer) the UTM protection is effectively side-stepped.
I should have added that I have taken the VPN out of my network. It was a bit too clumsy to use daily.
TI'm also a bit perplexed why you would utilize a paid VPN service if you utilize UTM or any router firmware capable of running OpenVPN (unless you're based in a country that restricts content and need a proxy), as any router with VPN capable firmware can do the exact same thing for free (unless you're needing to hide your WAN IP).
"(unless you're needing to hide your WAN IP)" - This is exactly what I am trying to accomplish, and the service I have can certainly do so.
I have an old Linksys router running DD-WRT which is totally capable of running as an OpenVPN Client, and this VPN connection works exactly as expected.
Given that Sophos is enterprise-grade software, and running OpenVPN software in the backend, I had readily assumed that the device could be easily configured as a VPN Client. It would apear otherwise.
It can be easily configured as an OpenVPN client... this isn't a question of how hard it would be, as OpenVPN is inherently easy to configure, but of where the openvpn files and scripts reside that control the config files within the OpenVPN jail.
Find the location of those scripts, and it would take no more than an hour for me to figure out what needs to be edited to allow not just for Sophos to be run as a client, but also for it to run numerous server instances.
It can be easily configured as an OpenVPN client... this isn't a question of how hard it would be, as OpenVPN is inherently easy to configure, but of where the openvpn files and scripts reside that control the config files within the OpenVPN jail.
Find the location of those scripts, and it would take no more than an hour for me to figure out what needs to be edited to allow not just for Sophos to be run as a client, but also for it to run numerous server instances.
If I were able to find the scripts, I as well, could likely figure out the rest. The problem is, everywhere that mentions and CLI changes also has the following note:
"Note – Any modifications done by root will void your support. Instead use WebAdmin for any configuration changes." This includes the Sophos Website, Support serch/knowledge base, and the WebUI help pages.
Given this, any CLI changes are straight-up out of the question; supportability must be kept. In order to keep support, we need to do this in the WebUI. If it cannot be done in the WebUI, then it might as well not be able to be done at all.
So it isn't a question of "can it be done at all", but "how to do this in a supported manner". If the answer is not at all, then so be it, I just need to know so I can move on to other products. If it CAN be done (in a supported manner, through the WebUI), even better (I would prefer this option by far)! And it CAN be done, we need to determine how.
Please see my above comment regarding the terminal warning...
You're running the exact same version of UTM that enterprise users run, which is why the warning is there. All a home user has to do is apply common sense...
- Do you have paid support? No.
- Are you using a Sophos Hardware Appliance? No.
I did see that. I have not seen anything anywhere to indicate that if I paid for support that CLI edits/changes would then be allowed. If you have anything to show this, please let me know.
I don't see how whether or not I paid for support and/or running on Sophos branded hardware has any bearing on whether or not Sophos has a supported method to be configured as a VPN Client.
And if I AM indeed "running the exact same version of UTM that enterprise users run", then there should be something somewhere to indicate how to do this configuration change (I cannot possibly be the ONLY person wanting/needing to do this kind of VPN configuration), and yet there is nothing, at all, anywhere. Not even anything indicationg that it *MIGHT* be able to be done via CLI.
If, as your responses imply, setting up Sophos as a VPN client can only be supported via a paid support subscription (as you indicate, CLI edits would need to be made, and CLI edits would only be supported via paid service), then I would tend to think that there would be something somewhere to indicate this as some kind of limitation on the home use license; or perhaps that this kind of configuration can only be done via CLI and thus support... blah blah blah... Yet all the documentation indicates that THE ONLY limitation is the 50 IPs (and EVERYTHING ELSE works).
I'm not going to engage in an argument with someone who bases their beliefs on assumptions and not what the EULA actually says.
As a home user, you are not entitled to support... period. At this point, I would encourage you to read the EULA, something you clearly have not done (I encourage paying specific attention to 15.6.3 and 15.7.2).
/var/sec/chroot-openvpn/etc/openvpn/
# ps aux | grep -v grep | grep vpn
root 10679 0.0 0.0 36652 1480 ? Sl 13:02 0:00 /usr/local/bin/reporter/vpn-reporter.pl
root 26157 0.0 0.0 5864 2332 ? Ss Oct15 0:19 /usr/sbin/openvpn --config /etc/openvpn/openvpn.conf --writepid /var/run/openvpn.pid
root 26159 0.0 0.0 5004 556 ? S Oct15 0:01 /usr/sbin/openvpn --config /etc/openvpn/openvpn.conf --writepid /var/run/openvpn.pid
I have also found the files you mentioned, though the directory makes me curious:/var/sec/chroot-openvpn/etc/openvpn/
Especially when the following ps command (and output):# ps aux | grep -v grep | grep vpn
root 10679 0.0 0.0 36652 1480 ? Sl 13:02 0:00 /usr/local/bin/reporter/vpn-reporter.pl
root 26157 0.0 0.0 5864 2332 ? Ss Oct15 0:19 /usr/sbin/openvpn --config /etc/openvpn/openvpn.conf --writepid /var/run/openvpn.pid
root 26159 0.0 0.0 5004 556 ? S Oct15 0:01 /usr/sbin/openvpn --config /etc/openvpn/openvpn.conf --writepid /var/run/openvpn.pid
So... If I understand how this would work correctly... All I would need to do is get my .ovpn config file (and certs) to the gateway, and start another openvpn process, using a command similar to the ps aux output, right?
So... If I understand how this would work correctly... All I would need to do is get my .ovpn config file (and certs) to the gateway, and start another openvpn process, using a command similar to the ps aux output, right?I've never run a router as a client before, so I'm not sure if your client config would need to be a ovpn file or a conf file. This should be fairly easy to find out though via OpenVPN's HowTO page. (I do remember discussing this with another user on OpenWRT's WRT1900ac thread, and if I can recall around what thread pages it was discussed, I'll take a look there as well [I've been following that thread since pg 103 and it's now in the 320's, so no guarantees]).
So... If I understand how this would work correctly... All I would need to do is get my .ovpn config file (and certs) to the gateway, and start another openvpn process, using a command similar to the ps aux output, right?I've never run a router as a client before, so I'm not sure if your client config would need to be a ovpn file or a conf file. This should be fairly easy to find out though via OpenVPN's HowTO page. (I do remember discussing this with another user on OpenWRT's WRT1900ac thread, and if I can recall around what thread pages it was discussed, I'll take a look there as well [I've been following that thread since pg 103 and it's now in the 320's, so no guarantees]).
To anyone who may find this thread searching for a means to accomplish this. All I was able to find was repeated nonsense about how this isn't possible.
It's fairly easy. Grab an old router, flash ddwrt on it, set up your open VPN, Turn DHCP on (if you want), set it in a DMZ.
Set up a new Ethernet interface wan interface, attach it your DDWRT router. Set up a multipath rule to push whichever traffic or hosts across this new interface to your ddwrt router - dmz - and eventually out your primary wan.
No biggie. So UTM won't be client. You can find a router in the garbage can that can perform this service.
Did anyone get this working?
I have installed DDWRT on a router and patched it to the new WAN i created but for some reason i am not getting internet access on the DDWRT router, i have not setup any VPN as yet.
I get it working if i patch it on the current network via a switch but not when i patch it newly created wan interface.