This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
app-notes:webvpn-secure-https-portforwardings-for-unsecure-http-devices [2018/07/13 13:40] – preisig | app-notes:webvpn-secure-https-portforwardings-for-unsecure-http-devices [2022/01/28 14:00] (current) – schmitt | ||
---|---|---|---|
Line 12: | Line 12: | ||
===== Prerequisistes ===== | ===== Prerequisistes ===== | ||
* Netmodule Router running software version >= 4.0.0.100 with a virtualisation licence | * Netmodule Router running software version >= 4.0.0.100 with a virtualisation licence | ||
- | * Running LXC virtualisation environment [[app-notes:virtualisation|described here]] | + | * Running LXC virtualisation environment [[virtualisation:start|described here]] |
* ARM based linux distribution of your flavor from [[https:// | * ARM based linux distribution of your flavor from [[https:// | ||
* The [[https:// | * The [[https:// | ||
- | * As an alternativ you can download a ready to use container | + | * As an alternativ you can download a ready to use container |
* OpenVPN network setup (your container could also run on one of your openvpn clients) | * OpenVPN network setup (your container could also run on one of your openvpn clients) | ||
* Clients need fix IP adresses so you can add them later to traefik | * Clients need fix IP adresses so you can add them later to traefik | ||
Line 129: | Line 129: | ||
For a more detailed description on how to configure traefik please refer to [[https:// | For a more detailed description on how to configure traefik please refer to [[https:// | ||
+ | ==== Information on the already setup container ==== | ||
- | ===== Configuring | + | You can download traefik already integrated into an[[https:// |
- | On the router side we assume that you have already setup OpenVPN. Now in the configuration above you saw, that the backends are defined | + | Download from: **(ADD LINK AGAIN)** |
+ | * Configuration: | ||
+ | * Binary: / | ||
+ | * Startup Script: / | ||
+ | |||
+ | In this container all you need to do, is extract it to your router, edit / | ||
+ | |||
+ | Since the service runs as non-root user the default listening ports for http and https where changed to 65080 and 65443. So additionally on your router you'd need to create NAPT Rules, that rewrite the http & https ports accordingly. | ||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | ===== Configuring the router (EndPoint) ===== | ||
+ | |||
+ | On the router side we assume that you have already setup OpenVPN. Now in the configuration above you saw, that the backends are defined | ||
The Router (for example in Site1) would need a NAPT Rule translating the incoming Port 8080 from its tun interface to port 80 and the ip of your endpoint. So your NAPT rule on the router on site 1 might look like this (with a second endpoint to visualize the just mentioned). | The Router (for example in Site1) would need a NAPT Rule translating the incoming Port 8080 from its tun interface to port 80 and the ip of your endpoint. So your NAPT rule on the router on site 1 might look like this (with a second endpoint to visualize the just mentioned). | ||
- | {{: | + | {{: |
On the router that is running the container and serving the requests, don't forget to change the WebGui Ports 80 & 443 to some other ports,so that they can be re-written via NAPT rules to get to the container. | On the router that is running the container and serving the requests, don't forget to change the WebGui Ports 80 & 443 to some other ports,so that they can be re-written via NAPT rules to get to the container. |