Hello,
I am running into a security concern related to client-to-client communication on a Pritunl VPN server and would appreciate guidance on the correct or recommended approach.
Scenario:
-
Office machines are connected to a Pritunl VPN server.
-
A user connects to the same VPN server from home.
-
Because both clients are on the same Virtual Network, the home client can directly access office machines via their VPN IP addresses.
-
This behavior violates our internal security policy, as VPN users should only access internal services, not other client endpoints.
Current understanding:
-
This seems to be caused by routing within the Virtual Network (client-to-client traffic being allowed).
-
Disabling Multiple Devices partially mitigates this, but it is not ideal, as the feature is still useful for other legitimate cases.
Questions:
-
Is there an official or recommended way in Pritunl to block client-to-client traffic on the same VPN server?
-
Can this be enforced via:
-
Firewall rules
-
Server settings
-
Organization settings
-
Or any undocumented / advanced configuration?
-
-
Is there a way to allow access only to specific internal subnets while explicitly preventing traffic between VPN clients?