![]() ![]() ![]() In this document we will be covering three different ways to achieve this. Their traffic can then be forced through the external VPN container using a custom Docker exec config. Our recommended configuration would be to use an off the shelf or custom VPN docker container running alongside Kasm Workspaces while leveraging our existing desktop and application containers. Now you could customize our existing core containers with VPN tools, but then it requires many network level permissions and becomes a configuration nightmare. Setting up a Tailscale Docker containerįor security reasons or to gain access to a remote network you might want to give specific Kasm Workspaces access to a VPN.Option 2 using a popular VPN Vendor container.
0 Comments
Leave a Reply. |