Here are 2 different options for getting ssh access from a specific IP address or network:
1. Add the VPN subnet to 'Local networks' (server-manager::Security::Local networks)
2. Enable 'Public' access to ssh, then manually create an "AllowHosts" list for the sshd service:
* Change SSH to allow connections from anywhere (server-manager::Security::Remote access::Secure shell access)
* execute the following commands at a shell prompt, as root:
config setprop sshd AllowHosts 192.168.10.n
signal-event remoteaccess-update
Finally, it is considered secure to:
- allow public access to ssh
- disable password login to ssh, and configure public-private keys as described in
http://wiki.contribs.org/SSH_Public-Private_KeysOf course, if you have to VPN to a non-SME VPN server in order to access your SME server then it sounds like your SME is already behind a firewall, so configuring "public" access to ssh should still only allow access from your local networks...