1.3.6. OpenNAC VPNGW
The ON VPNGW node serves as a tunnel terminator, facilitating VPN connections through Wireguard.
This functionality enables authorized users to securely connect to a private network. Additionally, VPNGW incorporates Shorewall, providing users with the capability to establish rules for controlling traffic between various network zones. With Shorewall, users can define permissions or restrictions based on criteria such as source, destination, ports, and protocols, enhancing the overall control and security of the network configuration.
It is a mandatory component for the Secure Remote Access (2SRA) module, which includes critical components such as:
Policy Enforce: Stateful Firewall module that allows the definition and execution of access rules, based on IP, port source and destination.
VPN module: It allows the configuration of the VPN Gateway, authentication, encryption, pool of IP addresses, internal networks, dynamic zones, etc.
Administration Portal: The VPNGW component management console is integrated in the ON Core Administration Portal. You will find it under the VPNGW section.
Note
OpenNAC VPNGW is a critical node in the solution, and high-availability deployment is recommended. The deployment of one or more nodes to provide this high availability will depend on the deployment requirements, and the final architecture design. If this module is offline, we would lose the ability to establish connections in the VPN.
1.3.6.1. Component flows
The following table outlines the firewall rules for the ON VPNGW component:
Source |
Destination |
Port |
Service |
---|---|---|---|
Princ/Worker |
VPNGW |
TCP/10443 |
Disconnection |
Princ/Worker |
VPNGW |
TCP/6379 |
Redis |
VPNGW |
Princ/Worker |
TCP/443 |
HTTPS (HAProxy) |
VPNGW |
Princ/Worker |
TCP/22 |
SSH |
VPNGW |
Princ/Worker |
TCP/5002 |
Filebeat |
VPNGW |
Princ/Worker |
UDP/2003 |
Collectd |
VPNGW |
Sensor |
UDP/4789 |
VXLAN |
VPNGW |
NTP Server |
UDP/123 |
NTP |
VPNGW |
DNS Server |
UDP/53 |
DNS |
Internet (PAT) |
VPNGW |
TCP/443 |
HTTPS |
Internet (PAT) |
VPNGW |
UDP/1195 |
WIREGUARD |
1.3.6.2. Sizing an OpenNAC VPNGW
The dimension of Network Access solution infrastructure can be directly inferred from the expected workload in terms of users, IPs, types of authentication or use cases deployed that the NAC must sustain. The workload may be complicated to estimate, but this is a crucial exercise to build an efficient NAC Architecture.
The hardware specifications for the VPN Gateway are:
Resources |
Minimum |
Recommended |
---|---|---|
Memory |
16 GB |
32 GB |
CPU |
8 CPU |
16 CPU |
Disk Size |
200 GB |
200 GB |
Disk Type |
SCSI/SATA |
SSD |
Network |
2 NIC |
2 NIC** |
Note
** The 2 network interfaces are mainly for service and management (internal communication between the different nodes).