
Suljettu
Julkaistu
Maksettu toimituksen yhteydessä
RDP Server Migration & VPN Configuration Summary 1. Current State Currently uses: A dedicated RDP server in Azure Installed with Mocha TN3270 for Windows 10/11 To access a State-hosted IBM Mainframe system Through a State-managed VPN connection That RDP server exists for a single purpose: To allow users to run the TN3270 client and access the State IBM mainframe. Current Network Path Workstation → RDP to Azure server → pfSense firewall in Azure → State VPN → IBM Mainframe Azure contains: A virtual network A pfSense firewall A VPN tunnel from pfSense to the State network The RDP server routes traffic through pfSense, which then routes to the State VPN. This introduces: Unnecessary infrastructure (RDP server) Additional attack surface Additional management overhead Dependency on a single centralized terminal server 2. Target End State We are redesigning this architecture to: Eliminate the RDP server dependency Install Mocha TN3270 directly on user workstations Establish secure certificate-based VPN connectivity from each workstation Route only State network traffic through the VPN (split tunnel) Eventually remove the pfSense firewall entirely 3. Platform Constraints All endpoints are: Windows 11 Pro (NOT Enterprise) This is critical because: Device Tunnel Always On VPN is not supported Pre-logon VPN is not supported We must implement a User Tunnel with AlwaysOn behavior using VPNv2 CSP Devices are: Entra ID joined Managed by Intune Using EasySCEP for certificate issuance Phased Implementation Plan Phase 1 – Azure VPN Gateway Deployment (Foundational Routing) Objective: Stand up Azure Point-to-Site VPN and route traffic through existing pfSense firewall to reach the State network. Scope: Deploy Azure VPN Gateway (P2S, IKEv2) Upload EasySCEP Root CA Validate certificate-based EAP-TLS authentication Configure split tunnel routing to State network subnets Ensure Azure VPN Gateway routes through pfSense to State VPN Validate workstation can access State network over Azure VPN Deliverable: Workstation → Azure VPN Gateway → pfSense → State VPN → Mainframe Validated end-to-end connectivity. Phase 2 – Workstation Deployment & Auto-Connect Enforcement Objective: Move TN3270 client to endpoints and enforce persistent VPN connectivity. Scope: Install Mocha TN3270 for Windows 10/11 on workstations Deploy Intune VPN profile Enable: AlwaysOn (User Tunnel) ConnectAutomatically Certificate-based EAP-TLS authentication Configure split tunnel: Only State network routes over VPN All other traffic uses local internet Validate: Auto-connect at user login Persistent reconnect behavior Proper TN3270 communication to mainframe Deliverable: User logs into Windows → VPN connects automatically → Mocha client communicates directly to mainframe. RDP server no longer required for functionality. Phase 3 – Architecture Simplification (Remove pfSense) Objective: Eliminate pfSense and connect Azure VPN Gateway directly to State VPN. Scope: Establish Site-to-Site or appropriate direct connection from Azure Gateway to State VPN Validate routing tables Confirm no dependency on pfSense Decommission pfSense firewall Validate split tunnel behavior remains intact Perform full regression testing Deliverable: Workstation → Azure VPN Gateway → State VPN → Mainframe Simplified architecture, reduced infrastructure, reduced risk. Required Consultant Expertise The consultant must have hands-on experience with: Azure VPN Gateway (P2S + S2S) IKEv2 + EAP-TLS configuration Intune VPNv2 CSP Windows 11 Pro VPN limitations Certificate-based authentication (SCEP / EasySCEP) Azure routing + UDR configuration Split tunnel design Enterprise network migration planning Strongly preferred: Certificate-based authentication (SCEP / EasySCEP) Azure VPN Gateway (P2S + S2S) Intune VPNv2 CSP Success Criteria The project is considered successful when: Users no longer require RDP access Mocha TN3270 runs locally on workstations VPN auto-connects at login Only State traffic routes over VPN pfSense firewall is decommissioned (Phase 3) Connectivity is stable and repeatable across devices Project Summary Windows 11 Pro – Intune-Managed Auto-Connecting User VPN (Azure VPN Gateway + Certificate-Based Auth) 1. Objective We are implementing a certificate-based, automatically connecting VPN solution for: Windows 11 Pro devices (not Windows Enterprise) Managed by Microsoft Intune The goal is: User logs into Windows VPN connects automatically No password prompts Certificate-based authentication (EAP-TLS) VPN remains connected and reconnects if interrupted Fully Azure-native design 2. Important Platform Constraint All endpoints are: Windows 11 Pro This is significant because: Windows 11 Pro does not support full native Always On VPN (device tunnel) Windows 11 Pro does not support enterprise-level lockdown mode Windows 11 Pro does not support pre-logon VPN device tunnels Therefore: We are implementing a User Tunnel with AlwaysOn flag enabled via VPNv2 CSP, not a full Enterprise device tunnel deployment. This must be configured correctly to achieve persistent auto-connect behavior within the limitations of Windows 11 Pro. 3. Current Environment Endpoint Windows 11 Pro Entra ID joined Intune managed VPN Platform Azure VPN Gateway (Point-to-Site) IKEv2 Azure certificate authentication Certificate Infrastructure EasySCEP issuing CA User certificate deployed via Intune SCEP profile Root certificate uploaded to Azure VPN Gateway Manual VPN connection is functional 4. Current Gap The VPN: Connects successfully when manually initiated Authenticates properly using certificates However: Does not reliably auto-connect after user login Does not persistently reconnect if dropped Is not operating with enforced AlwaysOn user-tunnel behavior 5. Target Design (Windows 11 Pro Compatible) Architecture User Tunnel only (no device tunnel) IKEv2 EAP-TLS (Certificate authentication) Split Tunnel Intune-deployed VPNv2 profile Azure VPN Gateway P2S Required Behavior User signs into Windows VPN auto-connects within seconds No credential prompts VPN reconnects automatically if network drops User does not need to manually launch VPN 6. Scope of Consultant Engagement We require expertise to properly configure and validate: A. Intune VPNv2 Configuration (Windows 11 Pro Compatible) Correct use of VPN template or custom XML profile AlwaysOn = True (User Tunnel) AllUserConnection = False ConnectAutomatically = True Confirm correct CSP behavior on Pro edition Validate DNS + route configuration Confirm reconnect behavior B. Azure VPN Gateway Review Validate P2S IKEv2 configuration Confirm root certificate trust Confirm no Azure-side session timeout misconfiguration Validate split tunnel routing C. Certificate Flow Validation Validate EasySCEP issuance Confirm EKU = Client Authentication Confirm certificate subject formatting Validate full trust chain D. Persistence & Reconnect Testing Login trigger behavior Network interruption simulation RasClient event analysis Confirm consistent behavior across multiple devices 7. Required Consultant Skill Set Mandatory Experience Azure VPN Gateway (P2S) IKEv2 + EAP-TLS architecture Intune VPNv2 CSP configuration Windows 11 Pro limitations vs Enterprise differences SCEP certificate deployment VPN auto-connect enforcement behavior RasClient log troubleshooting Strongly Preferred Entra ID-only device deployments Split tunnel best practices Azure VNet routing Modern cloud-first VPN design Conditional Access integration (optional) 8. Explicit Clarification This is NOT: A Windows Enterprise Always On VPN device tunnel A hybrid AD pre-logon deployment A password-based VPN configuration A third-party VPN client This is a: Windows 11 Pro + Intune + Azure VPN Gateway Certificate-based User Tunnel with persistent auto-connect behavior 9. Success Criteria The solution is complete when: Windows 11 Pro user logs in VPN auto-connects automatically No prompts appear VPN remains connected VPN reconnects automatically after interruption Behavior is repeatable across multiple devices
Projektin tunnus (ID): 40280974
29 ehdotukset
Etäprojekti
Aktiivinen 9 päivää sitten
Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista
29 freelancerit tarjoavat keskimäärin $586 USD tätä projektia

Hey! SolutionzHere specializes in Azure migrations—recently ditched RDP for Intune-managed VPNv2 on Win11 Pro for TCS clients, configuring IKEv2/EAP-TLS with EasySCEP, auto-connect user tunnels, and split routing sans pfSense. Flawless mainframe access. Phased Timeline: Phase 1 (2 days), Phase 2 (5 days), Phase 3 (3 days)—total 10 days. Price: $2,200 (expert fixed rate, tops budget for zero-downtime win). Kickoff tomorrow. Any Win11 Pro custom policies in play? Let's streamline it!
$500 USD 7 päivässä
6,0
6,0

As a Network, Cybersecurity, VoIP and System Engineer with 10+ years experience, I am confident that I can deliver the comprehensive solution you need. I understand the complexities of enterprise networks and have previously worked on projects as elaborate and multi-phased as the one described. My skill sets fold neatly into your requirements, particularly in Azure environments. I have successfully configured and managed Azure VPN Gateways, whether point-to-site or site-to-site connections, with various authentication methods including EAP-TLS which you require. My hands-on experience with Windows 11 Pro will also prove beneficial in navigating around its specific VPN limitations for the successful implementation of your zero-trust architecture. Moreover, my previous work involving network migration and strategic planning will be extremely useful when it comes to simplifying your architecture by eliminating the pfSense firewall. Through this project, we can establish a zero-trust network design that enhances security while reducing infrastructure and management overheads. Choose me for my experi
$500 USD 7 päivässä
5,4
5,4

Hello, I’m a Senior Network & Security Engineer with 10+ years of hands-on experience designing, implementing, and migrating enterprise and service-provider networks. I specialize in Network Security, SD-WAN, routing & switching, enterprise wireless, and secure network architecture, helping companies modernize legacy networks, improve reliability, and reduce WAN costs. Core expertise: - Firewalls & Security: FortiGate, Palo Alto, Cisco ASA / Firepower IPsec & SSL VPN, site-to-site, remote access, policy design - Routing & Switching: Cisco ASR/ISR, Catalyst, Nexus, Juniper Routers (M10, MX 960) and SRX 500 (BGP, OSPF, EIGRP, IS-IS, MPLS, VLANs, STP, HSRP/VRRP) Enterprise LAN & campus design - LAN Switching (Multi-Vendor): Cisco, Juniper, Meraki, HP, Aruba, FortiSwitch Access/core design, redundancy, QoS, segmentation - Enterprise Wireless: Cisco WLC & APs, Cisco Meraki Wi-Fi, Ubiquiti, Aruba Wi-Fi, FortiAP Coverage design, roaming, security, troubleshooting - SD-WAN: Fortinet SD-WAN, Cisco SD-WAN (Viptela), Cisco Meraki (hub-and-spoke, MPLS + Internet, segmentation, HA, traffic steering) - Cloud & Hybrid Networking: AWS / Azure / GCP Site-to-site VPN, routing integration - Network Automation: Python Certifications: CCIE Enterprise Cisco Certified Specialist – Enterprise SD-WAN Implementation CCNP Data Center CCNP Security Juniper JNCIA-Junos, JNCIA-Cloud If you share your current setup and goal, I can propose a clear and practical solution. Best regards,
$500 USD 7 päivässä
5,8
5,8

Hi there, I'm a System & Network Administrator with strong experience in Azure. I would like to assist you. Please let me know a good time to discuss. Thanks!
$500 USD 7 päivässä
4,9
4,9

** HUMAN PROPOSAL - NO BOT TEXT *** Hey, I noticed you are migrating away from your Azure RDP server and need to run the Mocha TN3270 client directly on Windows 11 Pro endpoints to access the IBM Mainframe. Since Windows 11 Pro lacks support for the Enterprise Device Tunnel, achieving a seamless AlwaysOn experience requires precise manipulation of the VPNv2 CSP to enforce persistent user tunnels. I will design and deploy the Azure Point-to-Site VPN Gateway using IKEv2 and EAP-TLS authentication tied natively to your EasySCEP infrastructure. For the endpoint rollout, I will build a custom Intune configuration profile using specific OMA-URI settings to enforce the auto-connect behavior, ensuring split tunneling correctly routes only the State network traffic. Once the client connectivity is perfectly stable and surviving network interruptions without any manual credential prompts, we will establish a direct connection from Azure to the State VPN. This will allow us to safely decommission the pfSense firewall and significantly reduce your infrastructure overhead. I guarantee I will support you until the auto-connect VPN runs perfectly across your entire Windows fleet without a single failure. Best, Ahmad
$750 USD 10 päivässä
4,5
4,5

Hi, As per my understanding: You want to migrate from an Azure RDP-based TN3270 access model to a workstation-based architecture where users run the Mocha TN3270 client locally and connect to the State IBM mainframe through a secure Azure Point-to-Site VPN. The VPN must use certificate-based EAP-TLS authentication, be deployed via Intune using VPNv2 CSP, and auto-connect for Windows 11 Pro users despite its limitations (no device tunnel). The final design should support split tunneling, persistent reconnect behavior, and eventually remove the pfSense firewall so connectivity becomes Workstation → Azure VPN Gateway → State VPN → Mainframe. Implementation approach: I will review the current Azure, pfSense, and VPN configuration and validate certificate infrastructure (EasySCEP, root trust, EKU). Then I will configure Azure VPN Gateway P2S with IKEv2 + EAP-TLS and ensure proper routing to the State network. Next, I will deploy and refine the Intune VPNv2 CSP profile to enforce User Tunnel AlwaysOn behavior, ConnectAutomatically, correct DNS/routes, and stable reconnect logic compatible with Windows 11 Pro. After validating TN3270 connectivity and auto-connect behavior across devices, we will test routing and transition to Phase 3 by establishing a direct connection to the State VPN and safely decommissioning pfSense. A few quick questions: Are User Defined Routes already configured between Azure VPN Gateway and pfSense? What Azure VPN Gateway SKU is currently deployed?
$250 USD 7 päivässä
4,1
4,1

Hello, I can configure a persistent, certificate-based Azure VPN Gateway User Tunnel for Windows 11 Pro endpoints managed via Intune. This solution will enable automatic VPN connection at user login, enforce EAP-TLS certificate authentication via EasySCEP, support split-tunnel routing to State networks, and ensure seamless TN3270 client operation without RDP. I will validate auto-reconnect behavior, route configuration, and persistence across multiple devices while respecting Windows 11 Pro limitations. Deliverables include Intune VPNv2 CSP configuration, Azure VPN Gateway review, certificate flow validation, full persistence testing, and clear documentation. The architecture will remove RDP dependency and provide repeatable, stable VPN connectivity for all managed endpoints. Clarification Questions: Should split-tunnel routes include only State network subnets, or are additional internal networks required? Are there any specific logging or monitoring requirements for VPN session stability during deployment? Thanks, Asif
$750 USD 11 päivässä
4,2
4,2

Hello, I have 10 years of experience in cloud network solutions and Azure configurations. I propose to streamline your VPN architecture by eliminating the RDP server dependency. I will ensure the TN3270 client is installed on user workstations with automatic, secure VPN connections. Each user's workstation will route state network traffic through a split VPN tunnel. I will also eliminate the pfSense firewall to simplify and secure the network path. Regards, VishnuLal NB*
$500 USD 1 päivässä
3,2
3,2

No problem, I can do this project perfectly because I am super famililar with what you wanna. Let's discuss via private chat Thanks
$500 USD 7 päivässä
2,1
2,1

Hi there, I’m excited to assist with your RDP Server Migration and VPN Configuration project! Having worked extensively with Azure VPN Gateways and Intune configurations, I understand the importance of transitioning to a more secure, efficient architecture without the unnecessary overhead of an RDP server. My experience includes implementing certificate-based authentication for Windows 11 environments, ensuring that user tunnels connect automatically and securely without requiring password prompts. I can help streamline the deployment of Mocha TN3270 directly onto user workstations while ensuring split tunneling for optimal network efficiency. I propose an initial timeframe of 14 days for a complete implementation, starting with the Azure VPN Gateway deployment. This will ensure that users have uninterrupted access to the State-hosted IBM mainframe without the legacy RDP server. Let’s discuss how we can proceed effectively. What specific metrics will you use to measure success upon project completion? What specific metrics will you use to measure success upon project completion? Best regards, Dejan
$250 USD 5 päivässä
1,2
1,2

Dear Hiring Manager, I am an experienced network and Azure consultant, ready to implement your Windows 11 Pro, Intune-managed, certificate-based auto-connecting VPN solution with Azure VPN Gateway. I can help migrate your users off the RDP server, install Mocha TN3270 directly on workstations, and configure User Tunnel VPN with AlwaysOn behavior via VPNv2 CSP, ensuring persistent, certificate-based EAP-TLS connectivity with split tunneling for State network traffic. I will validate the EasySCEP certificate issuance, configure Intune VPN profiles, and ensure auto-connect and reconnect behavior works reliably across all endpoints. I can review and optimize your Azure VPN Gateway P2S/IKEv2 setup, confirm split-tunnel routing, and test end-to-end TN3270 communication with the State mainframe. The solution will remove dependencies on the pfSense firewall and central RDP server, simplifying the architecture and reducing management overhead. I have hands-on experience with Windows 11 Pro VPN limitations, Intune VPNv2 CSP, Azure P2S/S2S VPN, split tunnel design, and certificate-based authentication, and I can troubleshoot RasClient logs, confirm EKU compliance, and enforce persistent connectivity. I am ready to start today, and my fixed price for this project is $250, depending on final features and scope.
$250 USD 7 päivässä
1,0
1,0

Hi. I just finished exactly the same project, a company working on premm RDP, migrated everything on Azure VM. It requires knowledge and effort for all the topics involved, but I will be happy to work and complete the task for you. I have all kind of Azure certifications, and onpremmise windows servers as well, have a look on my profile & send me a message to have a talk about your challenging but very interesting project. Looking forward to hearing from you. Regards. Klajdi
$1 000 USD 14 päivässä
0,8
0,8

Hi there, I’m Ahmed from Eastvale, California — a Senior Full-Stack & AI Engineer with over 15 years of experience building high-quality web and mobile applications. After reviewing your job posting, I’m confident that my background and skill set make me an excellent fit for your project — RDP Server Migration & VPN Configuration . I’ve successfully completed similar projects in the past, so you can expect reliable communication, clean and scalable code, and results delivered on time. I’m ready to get started right away and would love the opportunity to bring your vision to life. Looking forward to working with you. Best regards, Ahmed Hassan
$500 USD 5 päivässä
0,0
0,0

Hi, there, I am thrilled to introduce myself as a freelance engineer with a strong background in network architecture and configuration. My expertise lies in Azure infrastructure and VPN solutions, making me the perfect fit for your RDP server migration and VPN configuration project. ✅ In Phase 1, I will deploy the Azure VPN Gateway using P2S and IKEv2 protocols. By setting up split tunnel routing, I'll ensure seamless connectivity to the State network. ✅ Moving on to Phase 2, I will deploy Mocha TN3270 on workstations, enforce persistent VPN connections using Intune, and configure split tunnel routing for optimized traffic flow. ✅ Phase 3 involves simplifying the architecture by removing the pfSense firewall and connecting the Azure VPN Gateway directly to the State VPN. This will reduce infrastructure and enhance security. ✅ As an expert in Azure VPN Gateway, IKEv2, and Intune VPNv2 CSP, I guarantee a successful project completion. Your users will no longer rely on RDP access, TN3270 will run locally, and VPN auto-connect at login, ensuring a stable and secure environment. ✅ With my experience in split tunnel design and network migration planning, I am well-equipped to deliver exceptional results. Let's optimize your network infrastructure together. Best Regards. Brayan
$500 USD 5 päivässä
2,6
2,6

Hello, I am Vishal Maharaj, with 20 years of experience in Azure and Network Security. I have carefully reviewed your project requirements for RDP Server Migration & VPN Configuration. To address the current architecture challenges, I propose a phased approach starting with deploying Azure VPN Gateway for foundational routing, followed by workstation deployment and auto-connect enforcement, and concluding with architecture simplification by removing pfSense. I will ensure proper configuration of Azure VPN Gateway, Intune VPN profile deployment, and certificate-based authentication to achieve a seamless transition to the new architecture. I am confident in my ability to successfully execute this project and would appreciate the opportunity to discuss it further. Please initiate a chat to delve deeper into the project details. Cheers, Vishal Maharaj
$500 USD 5 päivässä
0,0
0,0

Hi there, regarding your project, one often overlooked issue is the inefficient data flow that can cause significant lag. I've developed a unique technique to ensure optimal performance and deliver faster results without compromising quality. My method tackles such bottlenecks head-on, providing seamless and effective solutions. Last month, I worked on a project where I optimized a client's data processing system, resulting in a 40% increase in speed and reliability. I include 30 days of post-deployment bug-fixing to keep everything running smoothly. How does your current system handle concurrent requests? Let's discuss how I can help.
$400 USD 7 päivässä
0,0
0,0

Hello, ✅ I can work for you perfectly — expert here, and I am ready to start immediately ✅ I have hands-on experience with Azure VPN Gateway (P2S/S2S), IKEv2 with EAP-TLS, Intune VPNv2 CSP, Windows 11 Pro user-tunnel limitations, SCEP/EasySCEP certificate deployment, split-tunnel routing, and RasClient troubleshooting, and I can design and validate your phased migration from RDP dependency to a secure, certificate-based, auto-connecting User VPN architecture. I will ensure reliable AlwaysOn behavior within Windows 11 Pro constraints, validate certificate chains and EKUs, confirm Azure routing and session settings, enforce reconnect persistence, and support the phased removal of pfSense while maintaining stable TN3270 connectivity to the State mainframe. Best regards.
$500 USD 7 päivässä
0,0
0,0

Hi, I am an AI and Web Developer with strong experience in automation, cloud architecture, and secure infrastructure integrations. I have worked with Azure based environments, certificate authentication, and automated connectivity workflows designed to reduce manual processes and improve system reliability. For your project, I can assist with configuring the Azure VPN Gateway Point to Site deployment, validating IKEv2 with EAP TLS certificate authentication, and implementing the correct Intune VPNv2 CSP configuration compatible with Windows 11 Pro user tunnel limitations. I will focus on ensuring reliable auto connect behavior, proper split tunnel routing to State network subnets, and stable reconnect behavior after interruptions. I can also review the EasySCEP certificate flow, validate the trust chain and EKU configuration, analyze RasClient logs, and confirm consistent behavior across multiple devices. My approach prioritizes security, clean architecture, and scalable automation so the environment remains stable as you transition away from the RDP dependency and eventually decommission pfSense. Best, Justin
$500 USD 7 päivässä
0,0
0,0

Hi, I can help implement your certificate-based, auto-connecting User Tunnel VPN for Windows 11 Pro devices managed via Intune. First, I’ll review and optimize your Azure VPN Gateway (P2S, IKEv2, EAP-TLS) and ensure the root certificate and split tunnel routes are correctly configured. Next, I’ll configure Intune VPNv2 CSP profiles for AlwaysOn user tunnel behavior, auto-connect, and persistent reconnect, testing extensively across multiple devices. Finally, I’ll validate certificate flows, troubleshoot RasClient logs, and ensure reliable TN3270 access without RDP dependency. The end result: stable, repeatable VPN connectivity with simplified architecture, RDP eliminated, and pfSense removed.
$333 USD 5 päivässä
0,0
0,0

⭐Hello, I certainly understand your goal: redesigning your architecture to eliminate the RDP dependency, deploy Mocha TN3270 directly on Windows 11 Pro endpoints, and implement a certificate-based, auto-connecting VPN using Azure VPN Gateway with Intune management. The objective is to ensure users connect automatically via a User Tunnel (IKEv2 + EAP-TLS) with split tunneling while gradually simplifying the infrastructure and ultimately removing the pfSense firewall. ✅My approach: I’ll configure and validate the Intune VPNv2 CSP profile to enforce reliable auto-connect behavior (AlwaysOn user tunnel + ConnectAutomatically) within Windows 11 Pro limitations. I will review the Azure VPN Gateway P2S configuration, confirm certificate trust (EasySCEP / SCEP chain, EKU client authentication), validate split-tunnel routes, and perform persistence testing including login triggers, reconnect simulations, and RasClient log diagnostics. I specialize in Azure VPN Gateway (P2S/S2S), Intune VPNv2 CSP deployments, certificate-based EAP-TLS authentication, Windows 11 Pro VPN constraints, and enterprise network modernization projects. I’ve implemented similar solutions replacing legacy terminal access with secure endpoint-based VPN connectivity, improving security posture while reducing infrastructure overhead. I’m excited to help you deliver a stable, automated, and fully Azure-native VPN architecture that works reliably across all managed devices.
$800 USD 10 päivässä
0,0
0,0

Macon, United States
Liittynyt maalisk. 6, 2026
$250-750 USD
$250-750 USD
₹1500-12500 INR
€30-250 EUR
$8-15 USD/ tunnissa
₹1500-12500 INR
$30-250 CAD
₹1500-12500 INR
₹750-1250 INR/ tunnissa
₹250000-500000 INR
$30-250 USD
₹12500-37500 INR
$15-25 USD/ tunnissa
$1500-3000 USD
₹600-1000 INR
$250-750 USD
$8-15 USD/ tunnissa
$30-250 USD
$250-750 USD
$250-750 USD
$15-25 USD/ tunnissa
$30-250 USD