I would like to disable public access to ssh. How do I still access the server but block port 22? Do I need to create another droplet just for openvpn (which is fine)? Is there a tutorial somewhere to basically “hide” ssh behind a vpn?

1 comment
  • I’ve set up a working OpenVPN server and successfully routed my other servers through it. I’ve disabled SSH ports from anywhere but from a valid VPN client connection (the firewall config handily let me select the VPN server as only valid inbound source).

    I would now like to restrict also the VPN server’s SSH port behind the actual VPN client connection. Is this achievable?

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

×
1 answer

Just run sshguard. It shuts down the hackers.

How would you maintain your droplet without ssh access?

Submit an Answer