a1ca06a3c5534c04beb0ca79242ec4d706d56ffa
The VPN capability of the UniFi Security Gateway is extremely limited. It does not support road-warrior IPsec/IKEv2 configuration, and its OpenVPN configuration is inflexible. As with DHCP, the best solution is to simply move service to another machine. To that end, I created a new VM, *vpn0.pyrocufflink.blue*, to host both strongSwan and OpenVPN. For this to work, the necessary TCP/UDP ports need to be forwarded, of course, and all of the remote subnets need static routes on the gateway, specifying this machine as the next hop. Additionally, ICMP redirects need to be disabled, to prevent confusing the routing tables of devices on the same subnet as the VPN gateway.
Description
Ansible configuration policy for the private network/home lab of Dustin C. Hatch
http://dustin.hatch.name/
Languages
Jinja
86.2%
Python
6.6%
Shell
4.6%
Groovy
2.6%