I would like to disable public access to ssh. How do I still access the server but block port 22? Do I need to create another droplet just for openvpn (which is fine)? Is there a tutorial somewhere to basically “hide” ssh behind a vpn?
These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.
Just run sshguard. It shuts down the hackers.
How would you maintain your droplet without ssh access?
I’ve set up a working OpenVPN server and successfully routed my other servers through it. I’ve disabled SSH ports from anywhere but from a valid VPN client connection (the firewall config handily let me select the VPN server as only valid inbound source).
I would now like to restrict also the VPN server’s SSH port behind the actual VPN client connection. Is this achievable?