I have a linux workstation with a corporate guest Windows image running on kvm. I would like to share the guest windows vpn connection with my linux host workstation.

My linux host has one network: virbr0 (public) with an ip 192.168.122.x

My vpn/corporate subnet is


Create on linux/kvm a new host only/private net ( I have an ip 192.168.100.x) and enable it in the windows guest os (ip

virbr0 virbr1

On the guest OS you should have several networks. I named them: virbr0 (public/internet), virbr1 (private, host only), vpn (created/used by your vpn client).

Solution with sshuttle

(sshuttle): connecting to many remote hosts like native connections (without socks and pac files).

“Sshuttle is not exactly a VPN, and not exactly port forwarding. It’s kind of both, and kind of neither.”

“Sshuttle assembles the TCP stream locally, multiplexes it statefully over an ssh session, and disassembles it back into packets at the other end. So it never ends up doing TCP-over-TCP. It’s just data-over-TCP, which is safe.”

I installed sshuttle with “apt-get install sshuttle” on my debian laptop

Then I installed sshd and python on the guest windows (I used cygwin).

Finally I was able to run:

cp /etc/resolv.conf.corporate /etc/resolv.conf
sshuttle -r matteo@

Solution with network sharing

Guest Windows side

Start your vpn in your windows guest OS (I saw that checkpoint - I suppose for securty reason - changes the ip address of the host net and share options of its own net)

Share the vpn net with the host only net: below my screenshots



Host Linux side

Enable the required routing

cp /etc/resolv.conf.corporate /etc/resolv.conf
ip route add via dev virbr1


One year ago I wrote an article with some useful networking tricks https://matteoredaelli.netlify.app/news/my-networking-survival-kit/