andrewjs18
Contributor
- Joined
- Oct 19, 2014
- Messages
- 141
I know this thread is a couple of months old but the OP's significant contribution is worth a look at again. It forces me to stop and think when I came across it today.
In my opinion, this approach however lowers the security a knot or two since the traffic is allowed to pass through the router and then authenticated at the FreeNAS box. This means other resources on your network/s, behind the router, are exposed to potential breach.
I'd argue that having OpenVPN server running on the router (i.e. the front gate to your whole network/s) is more secure. In this way, access to any authorized resources behind the router has to first pass the secured authentication on the router. Open VPN client is running on the remote host.
Which router offers you that feature (at an affordable price), try MikroTik. For US market, try this site: http://www.ispsupplies.com/brands/MikroTik-Reseller/
(I am not associated with this company in any way except I bought a book on MikroTik from them).
My two cents.
I'll bet most people do not have a router capable of running openvpn on it, especially if they're running this within their home LAN (myself included at the moment).