Creating an L2TP vpn tunnel over IPSec

In this series of mini articles, we describe how to deploy high-availability and secure Chainlink node. This article is dedicated to creating an L2TP vpn tonnel over IPSec for Guard VM, that will have access to Chainlink Virtual Private Cloud infrastructure.

Setting up IPSec

Warning. For strongswan-starter setup it is better to go to source #1. This step was skipped when setting up.

Setting up L2TP

Note: It is mandatory that the local ip and ip range are specified correctly.

Setting up PPP

Adding firewall rules (does not work temporarily with the firewall)

NAT settings

Required for local network and internet access with a vpn connection.

Remember the rules, so that they are not wiped after restarting the server

Checking service status

Saving the rules

Let’s check that everything works. Turn off and on the server. Check that the rule for NAT is still in place.

Next we will set up 2FA on Guard VM via ssh.


Last updated