I had a very difficult time creating and maintaining a tunnel between two computers over the Internet. The reason I wanted this tunnel was to safely encrypt data between the two without having to configure security into every service. Most site-to-site VPN tunnels are built using dedicated hardware such as a Cisco ASA 5505 however in my case this was a home project and needed to be satisfied on a budget.

The first step to building the tunnel is understanding your network. In my case the computers were both behind a router with unique NAT subnets. Computer A had a NAT of and Computer B (shown below).

Used for SSH VPN post

Network Topology for SSH VPN Example

Once you understand your network structure the next thing you need to do is setup SSH keys between your servers, if you haven’t already. This is outside the scope of this post but here is a great article: SSH Public Key Guide.

The next step is configuring /etc/network/interfaces. In this example we want Computer A to join Computer B’s network ( with the IP (these are all arbitrary IPs used to define an example). First we will configure the tunnel on Computer A giving it an IP address and instructing it to send all traffic through the tunnel. Second, we will configure Computer B to forward all traffic from the tunnel into the network but also add a route back to the network through the tunnel.

On Computer A:

sudo nano /etc/network/interfaces

Add the following at the end

#SSH Tunnel to Computer B
iface tun0 inet static
pre-up ssh -S /var/run/ssh-vpn -M -f -w 0:0 username@ComputerB "/sbin/ifdown tun0;/sbin/ifup tun0"
pre-up sleep 5
up ip route add via
down ip route del via
post-down ssh -S /var/run/ssh-vpn -O exit username@ComputerB

On Computer B:

sudo nano /etc/network/interfaces

Add the following at the end

#SSH Tunnel to Computer A
iface tun0 inet static
up arp -sD eth0 pub

Now, everything should be configured. Of course replace all IPs with the correct one’s for your network configuration. To test bring up the tunnel on Computer A by doing:

ifup tun0

If no error messages appear then you can continue to test the tunnel by doing a ping:


If this fails check all of your IPs again as it is likely a configuration error.

Now to the persistant part of the whole thing. On Computer A we will add a script to check the tunnel and reestablish it if down.

On Computer A:

nano /usr/local/bin/checktun0

And paste the following code:


if [ ! -d /sys/class/net/tun0 ]; then
	/sbin/ifdown tun0; /sbin/ifup tun0

Then modify the permissions and add the script to crontab:

chmod a+x /usr/local/bin/checktun0
crontab -e

Paste the following line at the end:

* * * * *       /usr/local/bin/checktun0

Now your tunnel will start when your box starts, close properly when it goes down, and automatically be checked every minute and restart the tunnel if down.


Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *