[Last Call] Learn how to a build a cloud-first strategyRegister Now


vpn central hub with vnc to clients

Posted on 2014-07-15
Medium Priority
Last Modified: 2014-07-16
I'm currently looking into solutions for my company. We deploy headless servers at business'  and have to remote into them to perform maintenance. Currently we use a ssh tunnel to a central server that then routes traffic to the remote server at the site. This provides a way to vnc "securely" to the sites. What I want to do is setup a central vpn in the cloud and have all the site connect to that. The catch is I don't want any of the client servers to have access to each other. Is this possible with vpn or am I needing to look at something else. Also I need to log who connects to the sites, for accountability.
Question by:lrgmmc
  • 2

Expert Comment

ID: 40198307
What about using something like Hamachi, which does exactly this?  Install the Hamachi client on all the remote servers, and you can also restrict who can connect to what.


Author Comment

ID: 40198325
Thanks for the quick response.
I've used that in the past, but i'm looking for something with more configuration. I need to track everything the user does on the machine. Preferably start a screen capture once the user connected. That's why I need to have access to the whole setup. The monitoring I can handle after I figure out a way to setup the vpn the way I'm thinking.

Accepted Solution

nick2253 earned 2000 total points
ID: 40200662
If you go the VPN route, there's no guarantee you can do stuff like screen capture, because a user could use an encrypted channel inside of the VPN and render any tracking useless.

Let me make sure I understand what you are doing right now:

1.  You have your network.
2.  You have a "central server" (where is this located?) that automatically initiates some kind of communication (SSH?) with the remote networks.
3.  You have the remote servers you are trying to administer.

You then SSH to the central server, and then the central server automatically re-routes your traffic over the internet to the correct remote network, through the remote network firewall, and into the remote server.  You then VNC over this SSH tunnel.

What you want to do:

1.  Your network.
2.  Central cloud-based server that has VPN connections to all the remote networks.
3.  Remote servers you need to administer.

You want to have a (semi?)permanent VPN connection between the central server and all the remote networks (including your own).  However, you want to be able to monitor all the activity on the remote servers, and you want to prevent any of the remote networks from connecting to each other.

Honestly, I think something like Teamviewer, or LogMeIn, or similar, is the way to go for accountability and ease of use.  From a central web-based administration console, you will easily be able to access all the remote servers.  And, you wouldn't have to worry about configuring VPN or VNC connections through the remote networks' gateways.


(And there are many others out there)

Featured Post

Get Certified for a Job in Cybersecurity

Want an exciting career in an emerging field? Earn your MS in Cybersecurity and get certified in ethical hacking or computer forensic investigation. WGU’s MSCSIA degree program was designed to meet the most recent U.S. Department of Homeland Security (DHS) and NSA guidelines.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
In this article, we’ll look at how to deploy ProxySQL.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month17 days, 23 hours left to enroll

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question