I have a couple of users that need to connect to local network, as of right now they connect using IPsec, but the performance isn’t great, so I’ve tested self-hosted Netbird, the ability to set ACLs it’s great, and it’s pretty fast but the problem that I’ve is I can’t approve which devices can connect.
Is there any open source and free solution available that I could replace the IPsec VPN?
I’ve checked the Tailescale (not self-hostable and not free), Netbird (device approval feature isn’t free) and Headscale (I don’t know how much secure it is, and I don’t know if even support device approval feature) unfortunately I don’t have a budget right now
My firewall only supports IPsec, but the performance isn’t very good now I want to replace with different solution
I want to give access to a couple of people to have access to local network different ports and protocols with good performance and with devices that I’ve approved
I don’t know of any free software that will do approved devices. With the free version of openVPN a you can set it to where they need a TLS key and a username and password. So only devices that have the TLS key can connect. But if you want to get into it, someone can go find the keys and place them on a different device. But company owned devices should block normal users from getting to those directories.
Right now with IPsec I set up Pre-shared key, so I have some control on which device can connect
If I could have a better control or even same as Pre-shared key would be good enough
I do, but these are windows devices, as well. That can make a difference. People also have iOS and Android clients as well. I’ve been very pleased with how lightweight Wireguard is and how well it preforms.
Wireguard? Dont know how many users you have so that may be a limitation. To be clear not a technical limitation rather administrative as you have to set up each client. But you will be able to control access via firewall rules.
Tailscale i wouldn’t recommend at all unless you are happy with the default permit any/any option they give you out the box. You will need to use their dashboard to create JSON rules for users/groups.
OpenVPN is really the only scalable and reasonable option you have for remote access.
The problem I’ve with Wireguard is the user can easily export the config and move to an unapproved device and connect to network
Is there any way to control that?
As I told, mattsowders the problem I’ve with Wireguard is the user can easily export the config and move to an unapproved device and connect to network
I have been using FortiGate (for now)
Each Wireguard enabled device has its own private key. Wouldn’t be as easy to simply export and import into another device if its all set up correctly.
What do you mean “if it’s all set up correctly”? the Wireguard client on Windows have an export option, and you can import that config file to another PC
I mean, if I export my config from one device and import it into another. yeah it’ll import but it will not connect. At least not on my setup. Public keys are mismatched if config is imported from another device and public keys can’t be changed within the windows client (to my knowledge). I’m running my Wireguard instance from pfSense and using mainly Windows clients. This is all assuming you have set up the correct config to begin with. Hoping you get the info you need.