Oracle Labs
DiscordGitHubTelegram
  • Welcome!
  • Why Oracle Labs?
  • Services
    • Chainlink node service provider
    • Consulting & development
  • Infrastructure Whitepaper
    • Supported Networks
    • Cloud setup
    • How do we monitor?
      • Monitoring Endpoints
  • Technical
    • Chainlink Guide
    • Chainlink Public Jobs
    • Solving common problems
    • Chainlink Node Logs
      • Log
      • Keystore
      • HeadTracker
      • GasEstimator
      • DirectRequest
      • Postgres
      • Client
      • BulletproofTxManager
      • BalanceMonitor
      • FluxMonitor
      • PeriodicBackups
      • OCR
  • Blog
    • Articles
      • External Initiators
      • Configuring logging in a kubernetes cluster
      • Integrate Chainlink Operator Contract with Chainlink Node
      • Setting up custom price feeds on chainlink node
      • Two-factor authentication to the server via ssh
      • Creating an L2TP vpn tunnel over IPSec
Powered by GitBook
On this page
  • Setting up IPSec
  • Setting up L2TP
  • Setting up PPP
  • Sources:
  1. Blog
  2. Articles

Creating an L2TP vpn tunnel over IPSec

PreviousTwo-factor authentication to the server via ssh

Last updated 2 years ago

In this series of mini articles, we describe how to deploy high-availability and secure Chainlink node. This article is dedicated to creating an L2TP vpn tonnel over IPSec for Guard VM, that will have access to Chainlink Virtual Private Cloud infrastructure.

Setting up IPSec

Warning. For strongswan-starter setup it is better to go to source #1. This step was skipped when setting up.

Setting up L2TP

Note: It is mandatory that the local ip and ip range are specified correctly.

Setting up PPP

Adding firewall rules (does not work temporarily with the firewall)

NAT settings

Required for local network and internet access with a vpn connection.

Remember the rules, so that they are not wiped after restarting the server

Checking service status

Saving the rules

Let’s check that everything works. Turn off and on the server. Check that the rule for NAT is still in place.

Next we will set up 2FA on Guard VM via ssh.

Sources:

https://www.digitalocean.com/community/tutorials/how-to-set-up-a-firewall-with-ufw-on-ubuntu-18-04-ru
https://www.digitalocean.com/community/tutorials/how-to-set-up-an-ikev2-vpn-server-with-strongswan-on-ubuntu-20-04-ru
https://interface31.ru/tech_it/2021/07/osnovy-iptables-dlya-nachinayushhih-chast-3-tablica-nat.html
https://www.cyberciti.biz/faq/how-to-save-iptables-firewall-rules-permanently-on-linux/
https://www.dmosk.ru/miniinstruktions.php?mini=l2tpd-ubuntu
https://cdn-images-1.medium.com/max/1280/1*1wthr1ig-XjwFQV4X8vkgg.png
https://cdn-images-1.medium.com/max/1280/1*mjh6my4fCDlTRaQ9DNOZYQ.png
https://cdn-images-1.medium.com/max/1280/1*AynTUt5G-tD9DbQFCJObzA.png
https://cdn-images-1.medium.com/max/1280/1*KlwbA67ndjCi7hmC1XqjNg.png
https://cdn-images-1.medium.com/max/1280/1*E1KIciY4uVdbo8NIqFYL6w.png
https://cdn-images-1.medium.com/max/1280/1*eQ77IP3jBxZgygpTy5qm1Q.png
https://cdn-images-1.medium.com/max/1280/1*z-iWc8dQc3M2sCh5pRUoug.png
https://cdn-images-1.medium.com/max/1280/1*HxsTqHgm7XKar0F9NoMrzg.png
https://cdn-images-1.medium.com/max/1280/1*sDxmS--K6K73m_Eor5W0LA.png
https://cdn-images-1.medium.com/max/1280/1*cOCedUKfzjM-R5CwQrVbNQ.png
https://cdn-images-1.medium.com/max/1280/1*HtnzxOLr8NHbc81yK1_bOA.png
https://cdn-images-1.medium.com/max/1280/1*eG0QLfIq-L-nxJRPwgBexA.png
https://cdn-images-1.medium.com/max/1280/1*6zhckvch09BnqtEqucmpDQ.png
https://cdn-images-1.medium.com/max/1280/1*VYGeFEbsbKB9nY-b0lO9YQ.png
https://cdn-images-1.medium.com/max/1280/1*TsFNC4QEKtLmYkrZit4ZQA.png
https://cdn-images-1.medium.com/max/1280/1*uKKh-1MVgbe7ZunI7db5UA.png
https://cdn-images-1.medium.com/max/1280/1*u6F03F5tApY46uS_CtQeeA.png
https://cdn-images-1.medium.com/max/1280/1*k3I-BUmp7UtFZVuRs1eYbQ.png
https://cdn-images-1.medium.com/max/1280/1*3-TWkNdBT_9GYXpANT4vHQ.png