On 12.09.2013 14:08,
ix4...@gmail.com wrote:
> I'm trying to create a setup very similar to that shown in Joanna's
>
http://theinvisiblethings.blogspot.co.uk/2011/09/playing-with-qubes-networking-for-fun.htmlat
> the very bottom of the post:
>
> AppVM01 -> firewallvm -> netvm -> NIC
> AppVM02 -> firewallvm -> netvm -> NIC
> AppVM03 -> [work-vpn] -> firewallvm -> netvm -> NIC
> AppVM04 -> [work-vpn] -> firewallvm -> netvm -> NIC
>
> The goal is to have some VMs reaching the internet directly, some (work)
> VMs reaching the Internet only via my work's VPN.
>
> I can connect to my work's VPN by using the netvm's NetworkManager applet,
> but of course that forces all network traffic from my Qubes system to go
> via the VPN which is not ideal.
>
> So the question becomes, how to create this [work-vpn] VM?
>
> I created a ProxyVM (seems like the right VM type for the job), but the
> NetworkManager service will not start - it just dies instantly.
Yes, NetworkManager is disabled in non-netvm by default.
> Is ProxyVM the correct type, or should I create a second NetVM and ask my
> work appVMs to talk to it, bypassing the firewallVM? Doesn't sound like a
> great idea.
ProxyVM is the correct type.
You have two options:
1. Setup VPN without NetworkManager. For OpenVPN it is quite simple: "openvpn
--config vpn-config.conf".
2. Enable NetworkManager in work-vpn: go to VM settings, services tab and add
there "network-manager". You need also somehow ensure that NetworkManager will
not touch eth0 there (there is no DHCP between Qubes VMs, so NM will probably
break network configuration otherwise). Read about unmanaged interfaces in
NetworkManager documentation.
> Note: All network traffic must leave my Qubes machine through the same NIC.
>
> Thanks,
>
> Alex
>
--
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?