Hello,
I need to use proprietary VPN software (GlobalProtect) to my work. In order to connect, this VPN requires some software, which is not compatible with fedora-40 (this is the base for my work qube), but is compatible with debian-12.
So my plan was to create a ProxyVM qube based on debian-12, with all the proprietary software installed there, and then just set my work qube NetVM to that ProxyVM.
I’ve managed to install all the software in my ProxyVM and connect to companys VPN. I can now browse VPN-protected URLs from inside the ProxyVM.
Unfortunately when I point my work qube NetVM to that ProxyVM, then work-qube looses all internet connectivity. It can’t access VPN protected resources as well as open-internet resources.
Note: I do have “provides network” selected for ProxyVM.
Note: internet works fine in work-qube (with NetVM = ProxyVM) before I connect to GlobalProtect VPN in the ProxyVM qube.
So it seems when I connect, GlobalProtect does something to internet configuration which blocks traffic from downstream qubes.
This is what I see after connecting to GP VPN:
user@proxy-vm:~$ ip link show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group 1 qlen 1000
link/ether 00:16:3e:5e:6c:00 brd ff:ff:ff:ff:ff:ff
3: gpd0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1400 qdisc pfifo_fast state UNKNOWN mode DEFAULT group default qlen 500
link/none
Any ideas what might be blocking the traffic and how to debug / fix that?
Kind regards,
Qubes 4.2
work-vm based on fedora-40
proxy-vm based on debian-12
PS. I have tried looking for an answer in other VPN-related topics, but most of them assume you are using openvpn client and contain iptables instructions. In my case there is no openvnp configuration and debian-12 does not include (by default) iptables. Not sure if it was replaced by something else. If you could maybe help me understand the relevant part of networking stack it would be great.