Usually, there are no security implications, IFF you keep your CA secure. Mind you, its private key has to be on the proxy/firewall, so make sure that is secure.
Quote from: meyergru on November 15, 2023, 10:45:44 amUsually, there are no security implications, IFF you keep your CA secure. Mind you, its private key has to be on the proxy/firewall, so make sure that is secure.That can be mitigated by using the private root CA to sign an intermediate CA once, then literally lock away the root CA private key in a safe. Use the intermediate CA for certificate signing.
In all corporate environments I have seen, there are only "free WLANs" for corporate guests that are separated from the company networks. If you fear mis-use, you can route the traffic for those networks over a VPN, such that the outgoing traffic will not be attributed to you.
... I could use VPN provider and route all of the Guest network traffic over that provider.
You configure a VPN to one of the common VPN providers via any suitable VPN type (Wireguard, IPsec or OPenVPN) and then you configure a route or a NAT rule for just the Guest subnet you want to go through that VPN's gateway. That way, all of your other networks use the default gateway, only the Guest subnet will be behind the VPN.
...Also, the Guest network has full unhindered internet access (i.e. no transparent HTTPS proxy). If I was to mistrust my Guests, I could use VPN provider and route all of the Guest network traffic over that provider. If anybody misuses this, the traffic does not originate from my "official" IPs....
1) Do all the hosts on your VLAN use the VPN? I would like to differentiate the hosts without creating additional VPNs. I'm finding my way around using subnets. Subnets A and B use VPN, subnets C and D use WAN.
2) In your opinion, what types of devices should not pass through the VPN? Can printers, SmartTVs and IoT only pass through the WAN?
3) How can I understand from OPNsense if a device/PC is using the VPN? I use "ProtonVPN Free" and have no indication in its dashboard that the VPN is being used at that moment. In OPNsense I see traffic in the graph, but the data is generic. I would like something related to the specific host "XYZ".