Table of Contents
VPN Importance for Automation & Acquisition Servers
Any server responsible for media acquisition or automation control should be treated as internet-facing infrastructure, even if it is not directly exposed via open ports.
A VPN is not optional hardening — it is a baseline requirement for protecting identity, reducing exposure, and enforcing predictable traffic flow.
This page explains why a VPN is required, how it fits into the Trash Panda Guides architecture, and outlines best-practice VPN behavior, with NordVPN recommended as a known-good provider.
Configuration steps are intentionally covered on separate pages.
Why a VPN Is Required
Automation and acquisition servers routinely:
- Communicate with external services
- Query indexers and metadata providers
- Download content from untrusted or variable sources
- Maintain long-lived outbound connections
Without a VPN, this traffic:
- Exposes your public IP address
- Is directly attributable to your ISP account
- Can be logged, throttled, or flagged
- Breaks the assumption of isolation used elsewhere in the architecture
A VPN establishes a controlled, encrypted egress path that decouples acquisition traffic from your physical location and ISP identity.
Risk Reduction, Not Anonymity
This is not about absolute anonymity.
A VPN provides:
- IP abstraction
- Traffic encryption in transit
- Reduced ISP visibility
- Consistent routing behavior
It does not:
- Make a system immune to misconfiguration
- Replace firewall rules
- Protect exposed services
Think of the VPN as a network boundary, not a magic shield.
Architectural Role of the VPN Server
In the Trash Panda Guides environment:
- The automation/acquisition server is isolated
- Internet-bound traffic is forced through the VPN
- LAN traffic remains local and unrestricted
This creates a clear separation:
- WAN traffic = encrypted, tunneled
- LAN traffic = direct, low-latency
This balance is critical — especially for:
- NFS mounts
- Plex communication
- Reverse proxy access
- Management UIs
Mandatory VPN Behavior
Any acceptable VPN configuration must meet the following requirements:
- All internet-bound traffic traverses the VPN
- Local subnet traffic bypasses the VPN
- VPN failure does not leak traffic
- The VPN starts automatically at boot
- No application-level VPN exceptions
If the VPN drops, traffic should fail closed, not silently fall back to the WAN.
Why NordVPN Is Recommended
Any reputable VPN provider can work, but NordVPN is recommended because it:
- Supports Linux natively
- Provides a mature CLI
- Allows fine-grained routing control
- Supports kill-switch enforcement
- Is widely documented and well-tested
NordVPN is not required — but using it minimizes unknowns.
NordVPN Best-Practice Settings
When using NordVPN on an automation or acquisition server, the following behavioral settings are considered best practice.
Core Settings
- VPN protocol: NordLynx
- Auto-connect: Enabled
- Start on boot: Enabled
- Kill switch: Enabled (system-wide)
These ensure the VPN is always active and traffic never escapes unintentionally.
Traffic Routing Behavior
- Route all external traffic through VPN
- Exclude local subnets from the tunnel
- Do not rely on application-level split tunneling
Local resources (examples):
- NAS / NFS servers
- Plex Media Server
- Reverse proxy
- Management workstations
These must remain reachable even if the VPN is active.
DNS Handling
- Use VPN-provided DNS
- Do not use ISP DNS
- Avoid custom DNS unless required
DNS leaks defeat the purpose of tunneling traffic.
Server Selection
- Use geographically stable regions
- Avoid frequent region hopping
- Avoid specialty servers unless required
Consistency improves reliability and reduces unexpected failures.
VPN + Automation: Why This Matters
Automation tools assume:
- Reliable connectivity
- Predictable routing
- Stable IP behavior
A misconfigured VPN can:
- Break indexer access
- Prevent downloads
- Disrupt local mounts
- Cause silent failures
A properly configured VPN becomes invisible — exactly as intended.
What This Page Does NOT Cover
This page intentionally avoids:
- CLI command syntax
- OS-specific setup steps
- Firewall rule definitions
- Tool-level binding
Those topics are covered in:
- VPN installation guides
- Automation server configuration pages
- Download client binding guides
Summary
A VPN on the automation/acquisition server is:
- A security boundary
- A routing policy
- A reliability requirement
When implemented correctly:
- Internet traffic is controlled and encrypted
- Local services remain fast and accessible
- Automation runs uninterrupted
- Failures are obvious, not silent
This is foundational infrastructure — not an optional add-on.
