Windows Firewall not protecting IP Routing?

I was setting up OpenVPN so that I can access my work LAN from the outside (Currently using MS VPN).  In order to access the LAN via OpenVPN, they say you have to enable IP routing on the openVPN server (which is XP Pro SP2), see
This worked fine, however once I enabled IP routing not only the VPN clients can route to my LAN, but every machine in my DMZ can now route to the LAN.  I have the XP Firewall set to only allow access to the openVPN port 1194 and only from my PIX 501 (which NATs in a public IP).  A machine in my DMZ can route to my internal LAN just by adding a route through the openVPN server.  They can't ping the openVPN server, they can't access any files or services on the openVPN server, but they can still route through it.  They can ping through it, they can do remote desktop through it.  Thus if any of my DMZ machines were compromised, they would have clear access to my LAN, which kind of defeats the point of a DMZ.  Is this a bug?  Did I do something wrong?  See attached picture for config.
LVL 16
Who is Participating?
Would it be safer to take VPN users into a separate VLAN and route that traffic into your LAN?  I think you might have better control over routing by having that extra layer between the protected side and your incoming VPN users.  
Our company is getting rid of all IPSec VPN usage as we can.  We are changing over to a Juniper SSL VPN; you can do much more to control exposure to your network this way.  

As for the routing, are you running dynmic routing protocols?  Perhaps OpenVPN is participating in RIP for example?  You may need to configure a passive interface if such an idea exists for the OpenVPN device.  
QlemoBatchelor, Developer and EE Topic AdvisorCommented:
How is it possible that a machine on DMZ has access to the OpenVPN server?
I think your VPN server is routing traffic once you enabled it, I may be wrong though: "however once I enabled IP routing "
How do you know if your security is working?

Protecting your business doesn’t have to mean sifting through endless alerts and notifications. With WatchGuard Total Security Suite, you can feel confident that your business is secure, meaning you can get back to the things that have been sitting on your to-do list.

JohnBPriceAuthor Commented:
BLipman: A VLAN is an interesting idea, I don't think the PIX 501 does VLAN's, but my internal LAN switch does, maybe there is something I can work out with that idea.

RE: Dynamic routing protocols and RIP, the problem is not that the routing occurs, but that the Windows Firewall doesn't control it.

BTW, OpenVPN is not IPSEC, it is SSL. (and it's free, which is currently a constraint of mine)

Olemo, my Pix 501 does not have separate inside and DMZ zones, I'm faking a DMZ with a second (elCheapo home use) firewall between the PIX and the LAN.  This ElCheapo firewall doesn't do more than one NAT.  Thus in order to VPN in, I have to pass the PIX, and then either pass the ElCheapo, or bypass the ElCheapo, which is what I was trying to achieve with OpenVPN.  I can put the OpenVPN server is inside and port forward to that, thus eliminating the need for routing, but I would have to have an inbound public IP routed to the ElCheapo and I am not really comfortable with that.  I can't switch the ElCheapo with the PIX 501, because as I said, the ElCheapo doesn't do more than one NAT so I couldn't have multiple servers inside my DMZ.  Any suggestions would be welcome.

BLiman, I'm quite sure it is not the OpenVPN VPN software.  It is quite clearly when I enable routing on the box, the Windows (POS) firewall doesn't control the routing.
QlemoBatchelor, Developer and EE Topic AdvisorCommented:
Yes, that's true for sure. The XP firewall has no info about routing, it is applied to a single interface, and can act on incoming IP addresses or ports only. No use here. You could try to use more sophisticated software firewalls like Comodo, but I think you are going the wrong way. The problem with fake-DMZ is that you do not have real protection, as you see.

JohnBPriceAuthor Commented:
"The problem with fake-DMZ is that you do not have real protection, as you see."

Better options?

Right now, I do have VPN access which I believe is pretty safe, but has issues.  What I do now is use Cisco VPN to get through the PIX, and then port forward MS VPN packets to an inside Windows Server, which then you then get through using MS VPN.  The PIX doesn't allow MS VPN packets in unless they come through the Cisco VPN, and the only way into the LAN is MS VPN packets which go directly to the MS Server.  If a DMZ machine got compromised, the MS VPN will still protect the LAN.  I think it is pretty safe, but it is slow as a dog being double VPN, plus I want to get rid of the MS VPN.

What I would like to achieve is:
- A single VPN to get to the LAN
- The LAN is still protected even if one of my DMZ machines get compromised.
- Use either Cisco VPN or OpenVPN clients (I am trying to be able to administer my machines with my Nokia N810 which has only Cisco and OpenVPN clients)
- Must be free (or nearly so).  I already have the Cisco VPN licenses, so that is fair game.  This is strictly for fun and my convenience, so I can't really justify spending much.

What would think if I put the OpenVPN inside the LAN (one NIC), have the PIX forward only port 1194 from a dedicated IP address to the ElCheapo but not require the Cisco VPN, and have the ElCheapo port forward the 1194 packets to the open VPN?  If a DMZ machine got compromised, they would still have to break either the ElCheapo or the OpenVPN, since only 1194 packets would get through?  Anyone could send 1194 packets into my LAN, exposing the OpenVPN to DoS attacks, but I might be able to set the PIX to detect and stop them.

I would prefer to use just the Cisco VPN client, since OpenVPN is apain and I already understand the Cisco VPN, but I can't figure out asafe way to do it.

JohnBPriceAuthor Commented:
Looks my question is now dead to the world, so points for helping.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.