Creating an L2TP vpn tunnel over IPSec
Last updated
Last updated
In this series of mini articles, we describe how to deploy high-availability and secure Chainlink node. This article is dedicated to creating an L2TP vpn tonnel over IPSec for Guard VM, that will have access to Chainlink Virtual Private Cloud infrastructure.
Warning. For strongswan-starter setup it is better to go to source #1. This step was skipped when setting up.
Note: It is mandatory that the local ip and ip range are specified correctly.
Required for local network and internet access with a vpn connection.
Remember the rules, so that they are not wiped after restarting the server
Checking service status
Saving the rules
Let’s check that everything works. Turn off and on the server. Check that the rule for NAT is still in place.
Next we will set up 2FA on Guard VM via ssh.