qubes-doc/privacy/vpn.md

58 lines
2.8 KiB
Markdown
Raw Normal View History

2014-05-23 06:42:09 -04:00
---
2015-04-10 16:17:45 -04:00
layout: doc
2014-05-23 06:42:09 -04:00
title: VPN
permalink: /doc/privacy/vpn/
redirect_from:
- /en/doc/vpn/
- /doc/VPN/
- /wiki/VPN/
2014-05-23 06:42:09 -04:00
---
2014-05-23 08:47:14 -04:00
How To make a VPN Gateway in Qubes
----------------------------------
2014-05-23 06:42:09 -04:00
The simplest case if you set up a VPN connection using the Network Manager inside one of your VMs. Setting up such a connection is really not Qubes specific and it is documented in Your operating system documentation. If you using the Qubes default Guest OS (Fedora): [Establishing a VPN Connection](http://docs.fedoraproject.org/en-US/Fedora/18/html/System_Administrators_Guide/sec-Establishing_a_VPN_Connection.html)
2014-05-23 06:42:09 -04:00
The Qubes specific part is to choose the right VM for the VPN client:
2014-05-23 06:42:09 -04:00
### NetVM
The simplest case is to set up a VPN connection using the Network Manager inside your NetVM. Because the NetworkManager already started you are ready to set up your VPN connection. However this has some disadvantages:
2014-05-23 06:42:09 -04:00
- You have to place (and probably save) Your VPN credentials inside the NetVM which is directly connected to the outside world
- All your AppVMs which are connected to the NetVM will be connected to the VPN (by default)
2014-05-23 06:42:09 -04:00
2014-05-23 10:16:18 -04:00
### AppVM
While the Network Manager is not started here (for a good reason), you can configure any kind of VPN client in your AppVM as well, however it is only suggested if you have to use a special VPN client.
2014-05-23 10:16:18 -04:00
2014-05-23 06:42:09 -04:00
### ProxyVM
2015-11-04 07:39:57 -05:00
**WARNING:** *Currently the NetworkManager is not working in ProxyVMs as expected. Actually it will mess up the routing table and because of that your packets may not be routed to the VPN tunnel. - This surely occurs if your VPN wants to be the default gateway.* ([#1052](https://github.com/QubesOS/qubes-issues/issues/1052))
2014-09-22 03:50:21 -04:00
2014-05-23 08:25:42 -04:00
One of the best thing in Qubes that you can use a special type of VMs called ProxyVM (or FirewallVM). The special thing is that your AppVMs see this as a NetVM, and the NetVMs see it as an AppVM. Because of that You can place a ProxyVM between your AppVMs and Your NetVM. This is how the default firewall VM is working.
2014-05-23 06:42:09 -04:00
Using a ProxyVM to set up a VPN client gives you the ability to:
2014-05-23 06:42:09 -04:00
- Separate your VPN credentials from Your AppVM data.
- Easily control which of your AppVMs are connected to your VPN by simply setting it as a NetVM of the desired AppVM.
2014-05-23 06:42:09 -04:00
2014-05-23 08:18:21 -04:00
**To setup a ProxyVM as a VPN gateway you should:**
2014-05-23 06:42:09 -04:00
2015-11-04 15:14:02 -05:00
1. Check (`rpm -q qubes-core-vm`) if you have the package **qubes-core-vm**
version **2.1.36** (or later).
2014-05-23 08:15:00 -04:00
2015-11-04 15:14:02 -05:00
2. Create a new VM and check the ProxyVM radio button.
2014-05-23 08:15:00 -04:00
2015-11-04 15:14:02 -05:00
![Create\_New\_VM.png](/attachment/wiki/VPN/Create_New_VM.png)
2014-05-23 08:15:00 -04:00
2015-11-04 15:14:02 -05:00
3. Add the `network-manager` service to this new VM.
2014-05-23 08:15:00 -04:00
2015-11-04 15:14:02 -05:00
![Settings-services.png](/attachment/wiki/VPN/Settings-services.png)
2014-05-23 08:18:21 -04:00
2015-11-04 15:14:02 -05:00
4. Wet up your VPN as described in the Network Manager documentation linked above.
2014-05-23 08:15:00 -04:00
2015-11-04 15:14:02 -05:00
5. Connect your AppVMs to use the new VM as a NetVM.
![Settings-NetVM.png](/attachment/wiki/VPN/Settings-NetVM.png)