-
-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trusted Network Detection #21
Comments
Interesting. I assume that you never want to connect to the VPN if a ping to a resource success or fail? |
Yes, I'm working on an Always on VPN project which seems very difficult on a Mac. Love the VPNStatus app btw.
I'm trying to get it so the user doesn't need to do anything. So if they are at home the VPN connects but if they are in the office it even doesn't try to connect
If the app could check for a resource before trying to connect that should tell it if they are in the office (not needing the VPN) or outside (needing the VPN)
The resource could be checking for an internal website, so does https://myweb.mydomain.local succeed or can I ping the DC
It's kinda like the ignore SSID in the VPNUtil, if 10.99.99.* is detected don't connect. The above example is how many other AoVPN providers do it.
Thanks
From: Alexandre Colucci ***@***.***>
Sent: 12 August 2022 09:07
To: Timac/VPNStatus ***@***.***>
Cc: Peter McCaldon ***@***.***>; Author ***@***.***>
Subject: Re: [Timac/VPNStatus] Trusted Network Detection (Issue #21)
CAUTION: This email originated from outside of aps Events & Media. Do not click links or open attachments unless you recognise the sender and know the content is safe.
Interesting. I assume that you never want to connect to the VPN if a ping to a resource success or fail?
Do you have a more precise example?
-
Reply to this email directly, view it on GitHub<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FTimac%2FVPNStatus%2Fissues%2F21%23issuecomment-1212843608&data=05%7C01%7C%7Cf1457da8527044d3179308da7c3999ab%7C7ca100591ae14c14a285583c73657bc6%7C0%7C0%7C637958884090216823%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Y%2BL1xEowIo4yG37tMo%2FluDbDEDrRhYZusmzbYJePTAs%3D&reserved=0>, or unsubscribe<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fnotifications%2Funsubscribe-auth%2FAZAJSVOKJDE5ZHVQDAX7RMDVYYAZJANCNFSM56KW7AGA&data=05%7C01%7C%7Cf1457da8527044d3179308da7c3999ab%7C7ca100591ae14c14a285583c73657bc6%7C0%7C0%7C637958884090373036%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=xmqWeUOkeRygtQXPAx%2F0vebkQ4Wn2KGrq2wiXxhfkrU%3D&reserved=0>.
You are receiving this because you authored the thread.Message ID: ***@***.******@***.***>>
|
@PeterMcCaldon-aps Thanks for the clarification. Such a feature could be implemented in VPNStatus. As a first idea, I would most likely change The function
|
the VPNutil gives us the option to ignore SSID's but it would be nice if it could also ignore specific network ranges or ideally if it detects an internal resource (ping or https connection)
The text was updated successfully, but these errors were encountered: