On Wed, Feb 06, 2013 at 02:23:08AM +0000, Alex Heneveld wrote:
> Hi,
> 
> We're trying to set up a VPC/nTier-App such that a single VM (call it a 
> management node) outside the VPC has ssh access to the VM's inside the 
> VPC.  (And to do this for multiple VPC's, same mgmt node.)  What's the 
> best way to implement this?
> 
> It seems like #754 [1] would be the right way to go about this when 
> available (is that right?) but already there are a few things we could 
> do now:
> 
> - set up an extra public IP on each tier with careful port forwarding 
> and ACL restricted to the mgmt node
> - use an s2s vpn where the other "site" is just the mgmt node
> - use a shared network, seems supported based on #748 [2] (but this 
> would break isolation?)
> 
> Any thoughts on these or others?
> 
> TIA,
> Alex
> 
> 
> [1]  https://issues.apache.org/jira/browse/CLOUDSTACK-754
> [2]  https://issues.apache.org/jira/browse/CLOUDSTACK-748
> 
>

Is this "other VM" going to be in a different zone?

This seems like you would have to consider it as being a completely
different entity from the VPC that it will be connecting into.  With
that being the case, you're best off setting up an IP sec tunnel
into the VPC from that VM.  I don't think you'll want to manage a bunch
of port forwarding rules for each VM in the VPC.

Reply via email to