Using OpenVPN to provide private networking access to multiple VPC

Hello, I am using the OpenVPN droplet on marketplace for my setup. I am trying to figure out how I can configure it to allow a client access to the private networks on each of my VPC (which may be hosted in separate regions).

My Setup:

SFO3 VPC: OpenVPN droplet SFO3 VPC: Misc droplet AMS3 VPC: Testing Environment droplets NYC1 VPC: Production Environment droplets

client: my laptop

I would like to configure OpenVPN so that I, the client, can connect via ssh to each servers (droplets) in each of the VPCs listed above via their private network. Then I will use iptables/firewall to reject all connections to each servers public ip address (ie. effectively dropping public network access on all hosts, except the OpenVPN server)

Is this possible and allowed with DigitalOcean’s VPC?

Currently, I am only able to ssh into the hosts that are in the SFO3 VP3. Attempting to ssh or ping hosts in the other VPCs timeout.

I’ve updated the OpenVPN’s Routing configuration to allow each VPC’s private subnets. However, I am still unable to connect to any other host other than the ones under SFO3 VPC.

Please help.

Thank you!

Show comments

Submit an answer

This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

Sign In or Sign Up to Answer

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

Want to learn more? Join the DigitalOcean Community!

Join our DigitalOcean community of over a million developers for free! Get help and share knowledge in Q&A, subscribe to topics of interest, and get courses and tools that will help you grow as a developer and scale your project or business.