I already have Road-warrior VPN server set up for when I want to access my network from the road, I could create user names for my family members to be able to log into my VPN server. Similarly I could set up a VPN server on their opnsense and do the same. Would that work or would a Site-to-Site VPN be better than the Road-warrior style solution for this? [/li][/list]
Secondly, because this is all home networks, there's no question of static IPs. How would this work with dynamic IPs. Would all 3 sites need to have separate DynDNS accounts so that any changes in the WAN IP wouldn't require someone to manually go in and change the IP addresses in the VPN server and client settings?
Thirdly, I have a 100 down / 5 up cable connection. Once they connect to my VPN Server -- whether Road-Warrior style or Site-To-Site -- would they be using my bandwidth for anything that they do on their end -- even internet browsing?
If so, would a Site-to-Site VPN be an "always-on" solution or can it be connected/disconnected by clicking a button(family is not into IT at all)?
Finally, for the given use case, would it be better to use OpenVPN or IPSec for Site-to-Site VPN setup?
Site-to-site is easier if you have a lot of clients (i.e. devices) that are fixed to the site. E.g. if your family mainly connect from fixed desktop PC's. If everybody uses phones, laptops, tablets, etc. to connect, then a road warrior VPN gives them freedom to roam.
You only need to set one location with dynamic DNS (yours most obviously) as the VPN hub. All other endpoints can be VPN clients. If you only have one public IP address, you need to set different port numbers for the OpenVPN servers.
You don't need to redirect their default gateway to the VPN tunnel. You can push out a route to your subnet(s) to the VPN client and they will only send traffic for those subnets over the VPN.
Quote from: Inxsible on March 24, 2021, 07:57:25 amIf so, would a Site-to-Site VPN be an "always-on" solution or can it be connected/disconnected by clicking a button(family is not into IT at all)?Site-to-site is easier, provided you have access to the remote OPNsense interface. More video calls
Quote from: Inxsible on March 24, 2021, 07:57:25 amFinally, for the given use case, would it be better to use OpenVPN or IPSec for Site-to-Site VPN setup?OpenVPN is much easier to set up, whereas IPSec benefits from being included in many OS as standard. YMMVTake a good look at the LAN subnet ranges. This may prove impossible if everybody has 192.168.0.0/24 set on their routers Bart...
Not quite clear on this. If the VPN is not connected, I wouldn't have access to my family's opnsense interface. So they would have to initiate the VPN connection. Are you suggesting that I just do an "always-on" Site-to-Site such that they can access my services whenever they want without intervention? Does it even make sense to use the connect/disconnect model, given that they would be using their bandwidth for all other stuff except when they are using the services that I host?
Not sure clients behind CGNAT is a showstopper: https://itectec.com/superuser/site-to-site-vpn-with-cgnat/
I haven't looked into Zerotier, mostly because I'm wary of outsourcing security. OpenVPN has its own CA, so gives control over who gets to connect.It's a matter of where you draw the line between inside and outside your network, I guess.Bart...