Thanks for a very good article. I followed your instructions and was able to get 3 nodes up and running. They can all talk to each other successfully. One of them is a DO Droplet, the other two are located inside my corporate LAN with a subnet of 172.23.6.0/24.
On ‘s hosts configuration file:
Thank you for sharing this amazing tutorial! For sure VPN seekers will learn a lot from this! Every single details had been specified. Really a good source just like how the Best Service Magazine Magazine defines [what is VPN](http:// « ). Kudos to the Writer!
If you happen to use a configuration management system, here is a good application. Minimally, each node that wants communicate directly with another node must have exchanged public keys, which are inside of the hosts configuration files. In our case, for example, only , so that connection is established over the private network.
The green represents our VPN, the gray represents the public Internet, and the orange represents the private network. All three servers can communicate on the VPN, even though the private network is inaccessible to ams1.
In this tutorial, we will go over how to use Tinc, an open source Virtual Private Network (VPN) daemon, to create a secure VPN that your servers can communicate on as if they were on a local network. We will also demonstrate how to use Tinc to set up a secure tunnel into a private network. We will be using Ubuntu 14.04 servers, but the configurations can be adapted for use with any other OS.
This creates the private key (/etc/tinc/).
Tinc uses a « netname » to distinguish one Tinc VPN from another (in case of multiple VPNs), and it is recommended to use a netname even if you are only planning on configuring one VPN. We will call our VPN « » for simplicity.
To complete this tutorial, you will require root access on at least three Ubuntu 14.04 servers. Instructions to set up root access can be found here (steps 3 and 4): .
If you are planning on using this in your own environment, you will have to plan out how your servers need to access each other, and adapt the examples presented in this tutorial to your own needs. If you are adapting this to your own setup, be sure to substitute the highlighted values in the examples with your own values.