User Tools

Site Tools


automation:vpn

VPN Importance for Automation & Acquisition Servers

Any server responsible for media acquisition or automation control should be treated as internet-facing infrastructure, even if it is not directly exposed via open ports.

A VPN is not optional hardening — it is a baseline requirement for protecting identity, reducing exposure, and enforcing predictable traffic flow.

This page explains why a VPN is required, how it fits into the Trash Panda Guides architecture, and outlines best-practice VPN behavior, with NordVPN recommended as a known-good provider.

Configuration steps are intentionally covered on separate pages.

Why a VPN Is Required

Automation and acquisition servers routinely:

  • Communicate with external services
  • Query indexers and metadata providers
  • Download content from untrusted or variable sources
  • Maintain long-lived outbound connections

Without a VPN, this traffic:

  • Exposes your public IP address
  • Is directly attributable to your ISP account
  • Can be logged, throttled, or flagged
  • Breaks the assumption of isolation used elsewhere in the architecture

A VPN establishes a controlled, encrypted egress path that decouples acquisition traffic from your physical location and ISP identity.

Risk Reduction, Not Anonymity

This is not about absolute anonymity.

A VPN provides:

  • IP abstraction
  • Traffic encryption in transit
  • Reduced ISP visibility
  • Consistent routing behavior

It does not:

  • Make a system immune to misconfiguration
  • Replace firewall rules
  • Protect exposed services

Think of the VPN as a network boundary, not a magic shield.

Architectural Role of the VPN Server

In the Trash Panda Guides environment:

  • The automation/acquisition server is isolated
  • Internet-bound traffic is forced through the VPN
  • LAN traffic remains local and unrestricted

This creates a clear separation:

  • WAN traffic = encrypted, tunneled
  • LAN traffic = direct, low-latency

This balance is critical — especially for:

  • NFS mounts
  • Plex communication
  • Reverse proxy access
  • Management UIs

Mandatory VPN Behavior

Any acceptable VPN configuration must meet the following requirements:

  • All internet-bound traffic traverses the VPN
  • Local subnet traffic bypasses the VPN
  • VPN failure does not leak traffic
  • The VPN starts automatically at boot
  • No application-level VPN exceptions

If the VPN drops, traffic should fail closed, not silently fall back to the WAN.

Any reputable VPN provider can work, but NordVPN is recommended because it:

  • Supports Linux natively
  • Provides a mature CLI
  • Allows fine-grained routing control
  • Supports kill-switch enforcement
  • Is widely documented and well-tested

NordVPN is not required — but using it minimizes unknowns.

NordVPN Best-Practice Settings

When using NordVPN on an automation or acquisition server, the following behavioral settings are considered best practice.

Core Settings

  • VPN protocol: NordLynx
  • Auto-connect: Enabled
  • Start on boot: Enabled
  • Kill switch: Enabled (system-wide)

These ensure the VPN is always active and traffic never escapes unintentionally.

Traffic Routing Behavior

  • Route all external traffic through VPN
  • Exclude local subnets from the tunnel
  • Do not rely on application-level split tunneling

Local resources (examples):

  • NAS / NFS servers
  • Plex Media Server
  • Reverse proxy
  • Management workstations

These must remain reachable even if the VPN is active.

DNS Handling

  • Use VPN-provided DNS
  • Do not use ISP DNS
  • Avoid custom DNS unless required

DNS leaks defeat the purpose of tunneling traffic.

Server Selection

  • Use geographically stable regions
  • Avoid frequent region hopping
  • Avoid specialty servers unless required

Consistency improves reliability and reduces unexpected failures.

VPN + Automation: Why This Matters

Automation tools assume:

  • Reliable connectivity
  • Predictable routing
  • Stable IP behavior

A misconfigured VPN can:

  • Break indexer access
  • Prevent downloads
  • Disrupt local mounts
  • Cause silent failures

A properly configured VPN becomes invisible — exactly as intended.

What This Page Does NOT Cover

This page intentionally avoids:

  • CLI command syntax
  • OS-specific setup steps
  • Firewall rule definitions
  • Tool-level binding

Those topics are covered in:

  • VPN installation guides
  • Automation server configuration pages
  • Download client binding guides

Summary

A VPN on the automation/acquisition server is:

  • A security boundary
  • A routing policy
  • A reliability requirement

When implemented correctly:

  • Internet traffic is controlled and encrypted
  • Local services remain fast and accessible
  • Automation runs uninterrupted
  • Failures are obvious, not silent

This is foundational infrastructure — not an optional add-on.

automation/vpn.txt · Last modified: by privacyl0st