A Virtual Private Cloud (VPC) is a private network interface for collections of DigitalOcean resources. VPC networks are inaccessible from the public internet and other VPC networks, and traffic on them doesn’t count against bandwidth usage. You can link VPC networks to each other using VPC peering connections.
You can configure Droplets as internet gateways and reroute traffic from your other resources through the gateway. This allows you to isolate backend resources from the public internet while still allowing access from your gateway Droplet.
Network without Internet Gateway
Network with Internet Gateway
This guide explains how to configure a Droplet as a gateway, set up routing between the gateway Droplet backend Droplets, and then isolate those backend Droplets from the public internet by disabling their public-facing network interfaces.
To begin configuring your Droplets, choose the OS your Droplets use:
To configure your gateway Droplet, you need to configure its IP forwarding and the NAT settings.
IP forwarding allows the Droplet to act as a router and forward packets to target Droplets within your VPC network.
To enable IP forwarding, connect to your Droplet and run:
sysctl -w net.ipv4.ip_forward=1
To persist these changes, open /etc/sysctl.conf
in a text editor:
nano /etc/sysctl.conf
Add the line net.ipv4.ip_forward=1
to the bottom of the file, then save it. Depending on your Linux distribution, this line may already exist in the file, commented out. In this case, uncomment it by deleting the #
at the beginning of the line.
# Uncomment the next line to enable packet forwarding for IPv4
net.ipv4.ip_forward=1
Network address translation (NAT) converts the private IP addresses associated with your VPC network’s traffic to the IP address of your internet gateway, and vice versa. This allows the gateway to correctly route traffic between your backend resources and the public internet. You can configure the gateway Droplet to perform NAT using the native Linux utility, iptables
.
Using the following iptables
command, configure the gateway Droplet to translate traffic from your VPC network’s subnet to the public IP of the gateway Droplet, replacing <vpc_network_prefix>
with your VPC network’s private IP prefix:
iptables -t nat -A POSTROUTING -s <vpc_network_prefix> -o eth0 -j MASQUERADE
To locate your VPC network’s prefix in the control panel, click Networking in the main menu, then select the VPC tab. From the list of VPC networks, locate the target network. The network’s prefix is listed beside the public name in the second column.
On DigitalOcean Droplets, the default name for the public network interface is eth0
. If you have changed this, replace eth0
in the iptables
command with the correct interface name.
You can find your Droplet’s public interface name with ip
:
ip -br a
The -br
flag returns only basic information about the Droplet’s network interfaces for better readability. The a
argument returns all IP addresses associated with the Droplet’s network interfaces.
To persist these changes so that the NAT rule is automatically enabled when the Droplet boots up, install iptables-persistent
:
sudo apt-get install iptables-persistent
Upon successful installation, iptables-persistent
asks if you want to save the current IPv4 rules. Select Yes.
To save future IPv4 rule changes, use the command iptables-save > /etc/iptables/rules.v4
.
After configuring the gateway Droplet, you need to configure new IP routes for any backend Droplets that should use the gateway to access the internet. These routes direct traffic destined for the internet through the gateway Droplet.
Because you are redirecting the backend Droplet’s internet traffic through the gateway Droplet, you need to log in to the backend Droplet from the gateway Droplet. Otherwise, the SSH connection drops once you change the IP routes.
To log in to the backend Droplet from the gateway Droplet, open a new terminal on your local machine and run the following ssh
command with the ProxyCommand
option, replacing the <public_IP_of_gateway_Droplet>
and <private_IP_of_backend_Droplet>
values with the applicable IP addresses. The ProxyCommand
option tells SSH to connect to the gateway Droplet first, and then use that connection to connect to the backend Droplet:
ssh -o ProxyCommand="ssh -W %h:%p root@<public_IP_of_gateway_Droplet>" root@<private_IP_of_backend_Droplet>
Once logged into the backend Droplet, you need to add an IP route to its network configuration that retains the Droplet’s access to its metadata endpoint (169.254.169.254
). The metadata endpoint is a service provided by DigitalOcean that allows the Droplet to access data about itself, like its IP address, DNS name server settings, and network interface information.
To do this, locate the backend Droplet’s original gateway IP address by sending the following curl
request to the metadata endpoint:
curl -s http://169.254.169.254/metadata/v1/interfaces/public/0/ipv4/gateway
The command returns the backend Droplet’s current gateway address.
To create the necessary IP route, run the following command, replacing the <your-gateway-IP>
value with the gateway IP address returned in the curl
request:
ip route add 169.254.169.254 via <your-gateway-IP> dev eth0
The command line returns a blank prompt when executed.
Next, add your gateway Droplet’s IP as a route to the backend Droplet’s network configuration:
ip route change default via <private_IP_of_gateway_Droplet>
To persist these changes and ensure that the Droplet boots with the new default route, you need to remove the old gateway route and add the new gateway route to the Droplet’s network configuration file. Before you do, we recommend making a backup make a copy of the default network configuration file:
cp /etc/netplan/50-cloud-init.yaml /etc/netplan/50-cloud-init.yaml.backup
To edit your network configuration file, open /etc/netplan/50-cloud-init.yaml
in a text editor:
nano /etc/netplan/50-cloud-init.yaml
Then remove the routes
stanza containing the Droplet’s original gateway IP address from the eth0
interface and add the new route to the eth1
interface, as shown in the example below:
GNU nano 6.2 /etc/netplan/50-cloud-init.yaml
# This file is generated from information provided by the datasource. Changes
# to it will not persist across an instance reboot. To disable cloud-init's
# network configuration capabilities, write a file
# /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg with the following:
# network: {config: disabled}
network:
version: 2
ethernets:
eth0:
addresses:
- 137.184.174.21/20
- 10.20.0.7/16
match:
macaddress: 86:bc:46:82:4d:95
mtu: 1500
nameservers:
addresses:
- 67.207.67.3
- 67.207.67.2
search: []
routes:
- to: 0.0.0.0/0
via: <original gateway address>
# Remove this route from the file.
set-name: eth0
eth1:
addresses:
- 10.118.0.4/20
match:
macaddress: 5a:59:57:e0:f3:9d
mtu: 1500
nameservers:
addresses:
- 67.207.67.3
- 67.207.67.2
search: []
routes:
- to: 0.0.0.0/0
via: <private IP address of gateway Droplet>
set-name: eth1
Save the changes and exit the file. Then run the following command to apply the new network configuration:
netplan apply -debug
The -debug
flag returns any YAML formatting errors in the configuration file. If formatted correctly, the command returns a blank prompt.
To configure your gateway Droplet, you need to configure its IP forwarding and the NAT settings.
IP forwarding allows the Droplet to act as a router and forward packets to target Droplets within your VPC network.
To enable IP forwarding, connect to your Droplet and run:
sysctl -w net.ipv4.ip_forward=1
To persist these changes, create the following file in a text editor:
vi /etc/sysctl.d/10-ip-forwarding.conf
Then add the following line to the file, save the file and then close it.
net.ipv4.ip_forward=1
Network address translation (NAT) converts the private IP addresses associated with your VPC network’s traffic to the IP address of your internet gateway, and vice versa. This allows the gateway to correctly route traffic between your backend resources and the public internet. You can configure the gateway Droplet to perform NAT using the native Linux utility, iptables
.
To configure your gateway’s NAT, install iptables
:
yum install iptables
Using iptables, configure the gateway Droplet to translate traffic from your VPC network’s subnet to the public IP of the gateway Droplet using the following command, replacing <vpc_network_prefix>
with your VPC network’s private IP prefix:
iptables -t nat -A POSTROUTING -s <vpc_network_prefix> -o eth0 -j MASQUERADE
To locate your VPC network’s prefix from the control panel, click Networking in the main menu, then select the VPC tab. From the list of VPC networks, locate the target network. The network’s prefix is listed beside the public name in the second column.
On DigitalOcean Droplets, the default name for the public network interface is eth0
. If you have changed this, replace eth0
in the iptables
command with the correct interface name.
You can find your Droplet’s public interface name with ip
:
ip -br a
The -br
flag returns only basic information about the Droplet’s network interfaces for better readability. The a
argument returns all IP addresses associated with the Droplet’s network interfaces.
To persist these changes so that the NAT rule is automatically enabled when the Droplet boots up, run:
iptables-save > /etc/sysconfig/iptables
iptables
saves the NAT configuration.
To confirm that the configuration runs at startup, use the find
command to view a list of services and files that run at startup:
find /etc -type f -atime -1
If /etc/sysconfig/iptables
is in the list, the iptables
configuration runs at startup.
After configuring the gateway Droplet, any backend Droplets that you want to use the gateway to access the internet need to be configured with new IP routes. These routes direct traffic destined for the internet through the gateway Droplet.
Because you are redirecting the backend Droplet’s internet traffic through the gateway Droplet, you need to log in to the backend Droplet from the gateway Droplet, otherwise the SSH connection drops once you change the IP routes.
To log in to the backend Droplet from the gateway Droplet, open a new terminal on your local machine and run the following ssh command with the ProxyCommand
option, replacing the <public_IP_of_gateway_Droplet>
and <private_IP_of_backend_Droplet>
values with the applicable IP addresses. The ProxyCommand
option tells SSH to connect to the gateway Droplet first, and then use that connection to connect to the backend Droplet:
ssh -o ProxyCommand="ssh -W %h:%p root@<public_IP_of_gateway_Droplet>" root@<private_IP_of_backend_Droplet>
Once logged into the Droplet, you need to add an IP route to your network configuration that retains the Droplet’s access to its metadata endpoint (169.254.169.254
). The metadata endpoint is a service provided by DigitalOcean that allows the Droplet to access data about itself, such as its IP address, DNS name server settings, and network interface information.
To do this, locate the backend Droplet’s original gateway IP address by sending the following curl
request to the metadata endpoint:
curl -s http://169.254.169.254/metadata/v1/interfaces/public/0/ipv4/gateway
The command returns the backend Droplet’s current gateway address.
To create the necessary IP route, run the following command, replacing the <your-gateway-IP>
value with the gateway IP address returned in the curl
request:
ip route add 169.254.169.254 via <your-gateway-IP> dev eth0
The command line returns a blank prompt when executed.
Next, edit the Droplet’s network interface configurations to remove the old gateway route and to add the new one. To do this, first open the public interface (eth0
) configuration in a text editor:
vi /etc/sysconfig/network-scripts/ifcfg-eth0
Then remove or comment out the default GATEWAY=<default_gateway_IP_address>
field:
# Created by cloud-init on instance boot automatically, do not edit.
#
BOOTPROTO=none
DEFROUTE=yes
DEVICE=eth0
GATEWAY=<default_gateway_IP_address>
# Delete or comment out the `GATEWAY=default_gateway_IP_address` field.
HWADDR=2e:c1:31:1c:de:55
IPADDR=142.93.215.133
IPADDR1=10.47.0.6
IPV6ADDR=2400:6180:0100:00D0:0000:0000:00DB:5001/64
IPV6INIT=yes
IPV6_DEFAULTGW=2400:6180:0100:00D0:0000:0000:0000:0001
MTU=1500
NETMASK=255.255.240.0
vi
opens files in a read-only mode by default. To edit a file in vi
, switch to insert mode by pressing the i
key.
Once you are done editing the file, press the Esc
key to exit insert mode. Then type :wq
and press Enter
to save and quit the file.
Save the changes to the file and close it.
Next, open the private interface (eth1
) configuration in a text editor::
vi /etc/sysconfig/network-scripts/ifcfg-eth1
Then add the following highlighted lines to the end of the file to set the new gateway route:
# Created by cloud-init on instance boot automatically, do not edit.
#
BOOTPROTO=none
DEVICE=eth1
HWADDR=06:ec:53:14:63:98
IPADDR=10.139.224.18
MTU=1500
NETMASK=255.255.0.0
ONBOOT=yes
TYPE=Ethernet
USERCTL=no
GATEWAY=<private_ip_address_of_gateway_droplet>
DEFROUTE=yes
Save the changes to the file and then close it.
Once you have configured your network interfaces and added the IP route, reboot the Droplet for the changes to take effect:
sudo reboot
Once the Droplet has rebooted, log in to the Droplet again using the SSH ProxyCommand.
To configure your gateway Droplet, you need to configure its IP forwarding and the NAT settings.
IP forwarding allows the Droplet to act as a router and forward packets to target Droplets within your VPC network.
To enable IP forwarding, connect to your Droplet and run:
sysctl -w net.ipv4.ip_forward=1
To persist these changes, create the following file in a text editor:
vi /etc/sysctl.d/10-ip-forwarding.conf
Then add the following line to the file, save the file and then close it.
net.ipv4.ip_forward=1
Network address translation (NAT) converts the private IP addresses associated with your VPC network’s traffic to the IP address of your internet gateway, and vice versa. This allows the gateway to correctly route traffic between your backend resources and the public internet. You can configure the gateway Droplet to perform NAT using the native Linux utility, iptables
.
To configure your gateway’s NAT, install iptables
:
yum install iptables
Using iptables, configure the gateway Droplet to translate traffic from your VPC network’s subnet to the public IP of the gateway Droplet using the following command, replacing <vpc_network_prefix>
with your VPC network’s private IP prefix:
iptables -t nat -A POSTROUTING -s <vpc_network_prefix> -o eth0 -j MASQUERADE
To locate your VPC network’s prefix from the control panel, click Networking in the main menu, then select the VPC tab. From the list of VPC networks, locate the target network. The network’s prefix is listed beside the public name in the second column.
On DigitalOcean Droplets, the default name for the public network interface is eth0
. If you have changed this, replace eth0
in the iptables
command with the correct interface name.
You can find your Droplet’s public interface name with ip
:
ip -br a
The -br
flag returns only basic information about the Droplet’s network interfaces for better readability. The a
argument returns all IP addresses associated with the Droplet’s network interfaces.
To persist these changes so that the NAT rule is automatically enabled when the Droplet boots up, run:
iptables-save > /etc/sysconfig/iptables
iptables
saves the NAT configuration.
To confirm that the configuration runs at startup, use the find
command to view a list of services and files that run at startup:
find /etc -type f -atime -1
If /etc/sysconfig/iptables
is in the list, the iptables
configuration runs at startup.
After configuring the gateway Droplet, any backend Droplets that you want to use the gateway to access the internet need to be configured with new IP routes. These routes direct traffic destined for the internet through the gateway Droplet.
Because you are redirecting the backend Droplet’s internet traffic through the gateway Droplet, you need to log in to the backend Droplet from the gateway Droplet, otherwise the SSH connection drops once you change the IP routes.
To log in to the backend Droplet from the gateway Droplet, open a new terminal on your local machine and run the following ssh command with the ProxyCommand
option, replacing the <public_IP_of_gateway_Droplet>
and <private_IP_of_backend_Droplet>
values with the applicable IP addresses. The ProxyCommand
option tells SSH to connect to the gateway Droplet first, and then use that connection to connect to the backend Droplet:
ssh -o ProxyCommand="ssh -W %h:%p root@<public_IP_of_gateway_Droplet>" root@<private_IP_of_backend_Droplet>
Once logged into the Droplet, you need to add an IP route to your network configuration that retains the Droplet’s access to its metadata endpoint (169.254.169.254
). The metadata endpoint is a service provided by DigitalOcean that allows the Droplet to access data about itself, such as its IP address, DNS name server settings, and network interface information.
To do this, locate the backend Droplet’s original gateway IP address by sending the following curl
request to the metadata endpoint:
curl -s http://169.254.169.254/metadata/v1/interfaces/public/0/ipv4/gateway
The command returns the backend Droplet’s current gateway address.
To create the necessary IP route, run the following command, replacing the <your-gateway-IP>
value with the gateway IP address returned in the curl
request:
ip route add 169.254.169.254 via <your-gateway-IP> dev eth0
The command line returns a blank prompt when executed.
Next, edit the Droplet’s network interface configurations to remove the old gateway route and to add the new one. To do this, first open the public interface (eth0
) configuration in a text editor:
vi /etc/NetworkManager/system-connections/cloud-init-eth0.nmconnection
Then remove or comment out the default route1=0.0.0.0/0,<default_gateway_IP_address>
field:
# Generated by cloud-init. Changes will be lost.
[connection]
id=cloud-init eth0
uuid=1dd9a779-d327-56e1-8454-c65e2556c12c
type=ethernet
[user]
org.freedesktop.NetworkManager.origin=cloud-init
[ethernet]
mtu=1500
mac-address=D6:4B:77:B4:C0:36
[ipv4]
method=manual
may-fail=false
address1=178.128.238.189/20
route1=0.0.0.0/0,178.128.224.1
# Delete or comment out this route from the file.
address2=10.20.0.10/16
vi
opens files in a read-only mode by default. To edit a file in vi
, switch to insert mode by pressing the i
key.
Once you are done editing the file, press the Esc
key to exit insert mode. Then type :wq
and press Enter
to save and quit the file.
Save the changes to the file and close it.
Next, open the private interface (eth1
) configuration in a text editor::
vi /etc/NetworkManager/system-connections/cloud-init-eth1.nmconnection
Then add the following highlighted line to the end of the file to set the new gateway route:
# Generated by cloud-init. Changes will be lost.
[connection]
id=cloud-init eth1
uuid=3c50eb47-7260-5a6d-801d-bd4f587d6b58
type=ethernet
[user]
org.freedesktop.NetworkManager.origin=cloud-init
[ethernet]
mtu=1500
mac-address=D6:84:01:8D:69:63
[ipv4]
method=manual
may-fail=false
address1=10.118.0.8/20
route1=0.0.0.0/0,<private IP address of your gateway Droplet>
Save the changes to the file and then exit the editor.
Once you have configured your network interfaces and added the IP route, reboot the Droplet for the changes to take effect:
sudo reboot
Once the Droplet has rebooted, log in to the Droplet again using the SSH ProxyCommand.
The backend Droplet now routes internet traffic through the gateway Droplet. You can verify this by using ping
and ip route
.
ping
verifies that your Droplet can reach the internet. To ping
a website, run:
ping google.com
The command returns results that look like this:
root@backend:~# ping google.com
PING google.com (216.58.196.174) 56(84) bytes of data.
64 bytes from maa03s31-in-f14.1e100.net (216.58.196.174): icmp_seq=1 ttl=118 time=9.70 ms
64 bytes from maa03s31-in-f14.1e100.net (216.58.196.174): icmp_seq=2 ttl=118 time=8.38 ms
After you verify that the Droplet can reach the internet, use ip route
to verify the network route the backend Droplet uses to reach an IP address on the internet. To use ip route
, run:
ip route get 8.8.8.8
The command returns the network route the Droplet uses to reach the IP address, 8.8.8.8
. The gateway’s private IP address is the second IP address in the returned route.
root@backend:~# ip route get 8.8.8.8
8.8.8.8 via <gateway-private-IP-address> dev eth1 src <backend-droplet-private-IP-address> uid 0
Additionally, you can verify that the backend Droplet is inaccessible via the public internet by attempting to SSH into it.