[NEBULA] Can I isolate external VPN L2TP connections to port group 2 only?

GadgetryTechGadgetryTech Member Posts: 6
edited June 2, 2020 4:43PM in Nebula Security Gateway
I have a secure box on my network that other developers need to remotely access.  I do not want them to be able to see anything on my home network.  If they were using the Nebula VPN feature on my NSG 100,  can I make it so they only see the server(s) on an isolated network?

I know other options are bypassing the Nebula VPN service and just open a single port, then deploy a VM running a VPN service on it's own subnet.  I just like the hardware feature built in to the NSG and its performance.  Thanks!

Accepted Solution

All Replies

  • RUnglaubeRUnglaube Member Posts: 135  Ally Member
    I believe using the outbound rules will do just fine, but I guess you first need to create a rule that allows access from the VPN network to servers network, and then another rule bellow that blocks other traffic from the VPN network to any.
    "You will never walk along"
  • Thanks Chris!  Finally got around to testing this out.  VPN traffic is isolated to Port group 2 on the gateway.  Any traffic on port group 2 cannot hit my local/home network, but I can still establish sessions from my home network to VMs on port group 2 without any issues.  Works like a charm!  
    Nebula_Chris
Sign In to comment.