|
From: Bruno T. <bru...@tr...> - 2024-11-03 18:17:28
|
Hello Peter, In my humble opinion, though I may be wrong, this isn't really OpenVPN's role, in fact. Beside the VPN, you should have some kind of network configuration limiting the accessibility of your internal servers (for example via iptables or something built upon it). Of course, via the OpenVPN directive "push" you can specify routes, and one could think in the first place that it could be sufficient to only specify the routes (and/or IP addresses) the clients are allowed to connect to, but it is not the case, as it is still possible for an OpenVPN client to locally add routes even if those routes have not been pushed by the server. Hence it cannot serve as an efficient security measure. Regards, Bruno Le 03/11/2024 à 17:59, Peter Davis via Openvpn-users a écrit : > Hello, > I have an OpenVPN server that I use to share the internet. Users > connect to this server and use its internet. When a user connects to > the OpenVPN server, he\she can ping the IP addresses of other servers > on the network. How can I create a restriction? > > Thank you. > > > _______________________________________________ > Openvpn-users mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/openvpn-users |