Join 1M+ other developers and:
- Get help and share knowledge in Q&A
- Subscribe to topics of interest
- Get courses & tools that help you grow as a developer or small business owner
Using OpenVPN to provide private networking access to multiple VPC
I am using the OpenVPN droplet on marketplace for my setup. I am trying to figure out how I can configure it to allow a client access to the private networks on each of my VPC (which may be hosted in separate regions).
SFO3 VPC: OpenVPN droplet
SFO3 VPC: Misc droplet
AMS3 VPC: Testing Environment droplets
NYC1 VPC: Production Environment droplets
client: my laptop
I would like to configure OpenVPN so that I, the client, can connect via ssh to each servers (droplets) in each of the VPCs listed above via their private network. Then I will use iptables/firewall to reject all connections to each servers public ip address (ie. effectively dropping public network access on all hosts, except the OpenVPN server)
Is this possible and allowed with DigitalOcean’s VPC?
Currently, I am only able to ssh into the hosts that are in the SFO3 VP3. Attempting to ssh or ping hosts in the other VPCs timeout.
I’ve updated the OpenVPN’s Routing configuration to allow each VPC’s private subnets. However, I am still unable to connect to any other host other than the ones under SFO3 VPC.
These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.×