-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Chain two OpenVPNs together #4
Comments
Generally speaking yes - it's a matter of exposing server Y so that a client on the open server X network can reach it. The implementation depends on your specific environment and what you want to accomplish. If you control the network best would be to create a permanent PTP tunnel between the 2 server node networks, but if you don't you will need an IP on server Y that exposes an openvpn port reachable from server X. |
What I actually want to do is some sort of "Maintenance" VPN for the Client VPN. The goal is that an administrator can login into the Maintenance VPN and then have access to the clients in the client VPN. My current setup works so far, but I get weird openvpn errors (the connection is restarting every 1-2min. I am running an OpenVPN Server deployed via Helm Chart (this is running the maintenance VPN for the maintenance clients).
My Maintenance OpenVPN is 10.52.0.0/22 my client VPN is 10.54.0.0/22. These are our deployed IP rules:
Here are some logs:
You can see that the connection between Maintenance OpenVPN Server and Client VPN Server gets resetted.. but I can't find any reason for this: |
Hi @jfelten,
do you know if its possible to chain two OpenVPN Servers together in Kubernetes? What we are trying to achieve is that a client A from OpenVPN Server X can connect to all clients from OpenServer Y.
The text was updated successfully, but these errors were encountered: