Home

How do I access my services from outside?

$$2604
https://lemmy.world/u/leaf_skeleton posted on Feb 22, 2026 15:29

Hey all,

I’m setting up a homeserver and trying to figure out the best way to access it remotely. I’ve been looking at different solutions, but I’m a little stuck.

I’ve been looking at VPNs, but it feels weird, to route everything through my home IP when I’m also trying to use a commercial VPN for privacy / to combat services fingerprinting me based on my IP.

I’m currently considering a reverse proxy setup with an authentication provider like authentik or authelia, but as far as I understand, that wouldn’t work well with accessing services through an app on my mobile device (like for jellyfin music for example.) I did think about just opening up the ports and using a DDNS with a reverse proxy, but is’nt that like a big security risk?

Keep in mind I am no network admin, but I don’t have anything against learning if someone can point me in the right direction.

Also I heard some people say that on proxmox you should use unprivileged containers instead of vms for your services, does that hold up?

Any recommendations for tools or approaches?

https://lemmy.world/post/43453337
Reply
$$2608
https://lemy.lol/u/flork posted on Feb 22, 2026 15:37
In reply to: https://lemmy.world/post/43453337

NGINX Proxy Manager and DuckDNS.

Get DuckDNS set up first.

Then go to DuckDNS.org and register a domain.

Then go into NGINX proxy manager.

It’s pretty straightforward, click “add proxy host”, then type the domain from duckdns (I like to do a different subdomain for each service, ie: calibre.mydomain.duckdns.org, homeassistant.mydomain.duckdns.org, etc.) and point it at your container with the service you want to access remotely.

You’ll want to enable let’s encrypt. But other than that the defaults should be fine.

https://lemy.lol/comment/24313274
Reply
$$2609
https://lemmy.ca/u/eightys3v3n posted on Feb 22, 2026 15:38
In reply to: https://lemmy.world/post/43453337

Personally, I use headscale (self-hosted tail scale) that is open to the internet. Then my phone and all other devices use tailscale clients to connect to that. All my other services are accessed through the tailscale madic DNS service.

Nothing except headscale is open to the internet, and I can access anything I need an the server. It also doesn’t just route All traffic through my server, only the stuff to other tailscale nodes.

https://lemmy.ca/comment/21840955
Reply
$$2613
https://leminal.space/u/okwithmydecay posted on Feb 22, 2026 15:45
In reply to: https://lemmy.world/post/43453337

I’ve been frp to create a reverse proxy between my NAS at home and a DigitalOcean droplet. Been using it for over a year now, and not had any issues.

https://leminal.space/comment/21363456
Reply
$$2615
https://lemmy.sdf.org/u/wesker posted on Feb 22, 2026 15:48
In reply to: https://lemmy.world/post/43453337

Tailscale’s free offering goes a long way.

https://lemmy.sdf.org/comment/26167177
Reply
$$2625
https://lemmy.zip/u/GraveyardOrbit posted on Feb 22, 2026 16:08
In reply to: https://lemy.lol/comment/24313274

Don’t do this just use tailscale, it’s 100% easier and very fool proof

https://lemmy.zip/comment/24809659
Reply
$$2628
https://discuss.tchncs.de/u/i_am_not_a_robot posted on Feb 22, 2026 16:21
In reply to: https://lemmy.world/post/43453337

If you’re running insecure services, you can restrict them to be accessible by vpn. I have a mix of internet accessible and vpn accessible services using the tailscale nginx plugin.

If you want to send all your traffic over a vpn, you will either need to route all your traffic through your own vpn or use some sort of multiplexed vpn. tailscale can do this with mullvad, but it’s not yet possible with headscale.

https://discuss.tchncs.de/comment/24088918
Reply
$$2631
https://lemmy.world/u/libyx posted on Feb 22, 2026 16:29
In reply to: https://lemmy.world/post/43453337

Thanks for asking! I have the same problem, so eager to read the comments. Could you share what you choose in the end and why?

https://lemmy.world/comment/22285304
Reply
$$2633
https://lemmy.decronym.xyz/u/Decronym posted on Feb 22, 2026 16:31
In reply to: https://lemmy.world/post/43453337

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

Fewer Letters More Letters
DNS Domain Name Service/System
HTTP Hypertext Transfer Protocol, the Web
NAS Network-Attached Storage
nginx Popular HTTP server

[Thread #110 for this comm, first seen 22nd Feb 2026, 16:31] [FAQ] [Full list] [Contact] [Source code]

https://lemmy.decronym.xyz/comment/12982
Reply
$$2634
https://lemmy.world/u/leaf_skeleton posted on Feb 22, 2026 16:34
In reply to: https://lemmy.sdf.org/comment/26167177

Well, yes I looked at tailscale too, but that would prevent me from using my normal commercial VPN, which I would still like to use. The way I understand it, if I routed my entire network through tailscale to my server, it would essentially make all my internet traffic exit at my server. So, everything would still appear to be coming from my home IP address. I’m trying to get the best of 2 worlds: using the VPN to hide my IP from services that i visit and my ISP, and a secure connection to my home server.

https://lemmy.world/comment/22285377
Reply
$$2638
https://lemmy.sdf.org/u/wesker posted on Feb 22, 2026 16:41
In reply to: https://lemmy.world/comment/22285377

I have all my services spun up in docker containers, which makes it easier to pick and choose which services use Tailscale and which use a VPN.

https://lemmy.sdf.org/comment/26168132
Reply
$$2650
https://lemmy.world/u/TechLich posted on Feb 22, 2026 17:13
In reply to: https://lemmy.world/post/43453337

My recommendation is a VPN server to connect in from outside and have the default gateway for the VPN clients be a server that acts as a router that’s set up with your commercial VPN.

That way, you can be outside on a phone or a computer, access your internal network and still have your public internet traffic go out through your commercial VPN without having to be able to configure multiple VPN connections at once (eg. Android doesn’t support that).

Eg. 2 debian proxmox containers. One that runs wireguard (head/tailscale might also work here?) for external access and one that runs mullvad(or whoever) VPN cli and IP forwarding to be the gateway for your clients.

Only downside is the extra hops to send everything through your home network first rather than straight to the commercial vpn which is probably fine depending on your speeds. You can always disconnect and connect directly to the commercial VPN directly for faster internet traffic if you need to.

https://lemmy.world/comment/22286011
Reply
$$2654
https://sh.itjust.works/u/ohshit604 posted on Feb 22, 2026 17:14
In reply to: https://lemmy.world/post/43453337

I’ve been looking at VPNs, but it feels weird, to route everything through my home IP when I’m also trying to use a commercial VPN for privacy / to combat services fingerprinting me based on my IP.

My ASUS WRT router (running Merlin Firmware) forwards my Home VPN serve through one of my Proton VPN clients, I get all the added bonuses of being connected to my home network while benefiting from appearing across the world.

https://sh.itjust.works/comment/23916556
Reply
$$2656
https://lemmy.world/u/irmadlad posted on Feb 22, 2026 17:17
In reply to: https://lemmy.world/comment/22285377

I’m trying to get the best of 2 worlds: using the VPN to hide my IP from services that i visit and my ISP, and a secure connection to my home server.

How about Cloudflare Tunnels/Zero Trust? The caveat being that you have to own a domain that you can change the nameservers to the ones Cloudflare assigns you. You can purchase a domain from Cloudflare, but I think a lot of people get one from NamesCheap or PorkBun. I purchased on for less than $5 USD. With Cloudflare Tunnels/Zero Trust, you don’t have to open ports, fiddle with NAT, or any of that. You install it on your server and it punches a hole in to allow communication.

Some people like Cloudflare, some people don’t. Personally, I’ve never had any issues except for a very brief downtime a while back.

https://lemmy.world/comment/22286087
Reply
$$2660
https://lemmy.world/u/TechLich posted on Feb 22, 2026 17:25
In reply to: https://lemmy.world/post/43453337

For the unprivileged container thing, containers tend to be lighter on resources than VMs at the cost of a little isolation (they share the same kernel as proxmox which could have security implications).

The ability for lxc containers to run unprivileged with all the restrictions that entails alleviates a bit of that security risk.

Both options are generally considered pretty secure but bugs/vulnerabilities could break isolation in either case. The only real 100% safe isolation is bare metal.

I tend to run containers unless I have a really good reason to need a VM, and run unprivileged unless I have a really really good reason not to.

https://lemmy.world/comment/22286214
Reply
$$2663
https://mbin.potato-guy.space/u/potatoguy posted on Feb 22, 2026 17:34
In reply to: https://lemmy.world/post/43453337

I run my instance using cloudflare tunnels, directly from my thinkpad (over wifi), these tunnels are helpful because you don’t need to open ports, etc, also, there are other tunneling options, like hosting a server on a VPS that tunnels to your own selfhosted server, as there are some alternatives to cloudflare in that aspect.

Idk, might be an option.

https://mbin.potato-guy.space/m/selfhosted@lemmy.world/t/24711/-/comment/140691
Reply
$$2706
https://lemmy.sdf.org/u/StrawberryPigtails posted on Feb 22, 2026 19:25
In reply to: https://lemmy.world/comment/22285377

Well, yes I looked at tailscale too, but that would prevent me from using my normal commercial VPN

You can split your devices traffic, Tailscale traffic through Tailscale, everything else through your masking VPN.

I’m trying to get the best of 2 worlds: using the VPN to hide my IP from services that i visit and my ISP, and a secure connection to my home server.

For that, what I would do is put the masking VPN (like PIA or whatever) on your router (not all routers can do this) and then have Tailscale on the devices or individual services. In theory, everything would still be able to talk to each other (even if your mobile device is not behind the router), but everything that is behind the router would enter and exit their traffic wherever you have the masking VPN set to. Downside of doing this is that EVERYTHING that is behind that router is also behind that VPN which can cause problems with some services, like banking and streaming.

It would also mean that the only way you could host a public service is to have an external VPS acting as a reverse proxy. Cloudflare might also have something that could work around this setup, but I’m not familiar with their offerings.

This setup also doesn’t mask your traffic (origin and destination) from your mobile provider (just your home ISP), but that is a harder nut to crack as they can see, real time, where you are physically, and depending on your device, may have deeper device access anyways. I’m thinking prepaid phones and phones bought from the carrier (at least here in the US) or if your carrier has “asked” you to install an app to manage your account. My assumption is that my mobile provider can see anything I do while I have my phone or tablet with me, and just work around that.

You might want to ask in !privacy@lemmy.ml and !privacy@lemmy.world, as this is more up their alley.

https://lemmy.sdf.org/comment/26171115
Reply
$$2709
https://lemmy.world/u/EntropyPure posted on Feb 22, 2026 19:36
In reply to: https://lemmy.world/post/43453337

Cloudflare Tunnels work great and are really easy to setup. Plus you are not exposing you machine completely to the outside, as the cloudflared service/container „calls out“, and Cloudflare is your reverse proxy. Downside is, you’re binding yourself to one of the US hyperscalers.

Pangolin uses the same principle, but is a bit more challenging to setup. Plus you need some kind of cloud server to make it work.

As you already have a VPN active at all times (at least it sounds like that), a VPN home seems out of the picture.

Unless you have a dedicated firewall at home, maybe reconsider the reverse proxy route. Personally would not feel comfortable with exposing a machine at home to the internet in full without a handle on what it can do or how it may be reached.

https://lemmy.world/comment/22288307
Reply
$$2731
https://lemmy.world/u/irmadlad posted on Feb 22, 2026 20:04
In reply to: https://lemmy.world/comment/22288307

As you already have a VPN active at all times (at least it sounds like that), a VPN home seems out of the picture.

Expand on that, if you would. I run local VPN and everything else through Cloudflare. In fact the VPN DNS is Cloudflare as well as the stand alone pFsense firewall. Perhaps I am misunderstanding, which is likely since I’m all drugged up trying to pass a kidney stone.

https://lemmy.world/comment/22288779
Reply
$$2762
https://lemmy.world/u/EntropyPure posted on Feb 22, 2026 21:38
In reply to: https://lemmy.world/comment/22288779

Well, not every system can handle or support multiple VPN connections with different providers, or the VPNs could interfere with each other. E.g. when using Tailscale you can not use another WireGuard based VPN according to their FAQs.

Also, it adds complexity to the stack and system as a whole on the client side. That is all fine and dandy as long as it works, but quickly a pain in the butt once you have to debug something.

https://lemmy.world/comment/22290129
Reply
$$2766
https://lemmy.world/u/irmadlad posted on Feb 22, 2026 21:46
In reply to: https://lemmy.world/comment/22290129

when using Tailscale you can not use another WireGuard based VPN according to their FAQs.

Anecdotally, if I turn off the Advanced killswitch and The VPN killswitch of my main VPN, I can actually bring up Tailscale. But you are right, it does add complexity. Basically I use Tailscale on the server and pFsense firewall as an overlay VPN. It’s also handy if you lock yourself out of the server. A ‘backdoor’ of sorts.

https://lemmy.world/comment/22290254
Reply
$$2773
https://lemmy.ml/u/GeraltvonNVIDIA posted on Feb 22, 2026 22:12
In reply to: https://lemmy.world/post/43453337

Personally, i would use VPN, Pihole for Local-DNS Records and a simple Local Reverse Proxy to address my Network-Services. I wouldnt open anything from my Homelab to the Internet.

https://lemmy.ml/comment/24123439
Reply
$$2776
https://lemmy.pt/u/tirateimas posted on Feb 22, 2026 22:17
In reply to: https://lemmy.world/post/43453337

Tailscale or Netbird, any of them is better than setting up DDNS and securing the network access yourself.

https://lemmy.pt/comment/13065969
Reply
$$2791
https://lemmy.ml/u/Kagu posted on Feb 22, 2026 23:08
In reply to: https://lemmy.world/post/43453337

I’ll recommend netbird as its entirely running on your server, is free, and I found it way easier to set up compared to Tailscale/Headscald

https://lemmy.ml/comment/24124257
Reply
$$2827
https://lemmy.world/u/iggy posted on Feb 23, 2026 01:09
In reply to: https://lemmy.world/post/43453337

I went a different path than the VPN route that seems popular in the other comments…

I use a reverse proxy (caddy) with wildcard SSL (so all my hostnames aren’t in the public cert registry) plus port knocking. So normally no outside IPs are allowed to access my internal services, but I can knock and then access anything for a while. Working well so far.

https://lemmy.world/comment/22292758
Reply
$$2845
https://lemmy.dbzer0.com/u/fuckwit_mcbumcrumble posted on Feb 23, 2026 02:15
In reply to: https://lemmy.world/post/43453337

I’ve been looking at VPNs, but it feels weird, to route everything through my home IP

You don’t have to route all traffic through the VPN. Only traffic for your home network.

https://lemmy.dbzer0.com/comment/24573261
Reply
$$2846
https://lemmy.dbzer0.com/u/fuckwit_mcbumcrumble posted on Feb 23, 2026 02:19
In reply to: https://lemmy.world/comment/22290129

Wireguard + OpenVPN works well for me.

OpenVPN fully supports multiple simultaneous connections. But Wireguard is such a pain in the ass with this. But Wireguard dgaf about OpenVPN connections.

https://lemmy.dbzer0.com/comment/24573299
Reply
$$2898
https://feddit.it/u/Scrollone posted on Feb 23, 2026 05:43
In reply to: https://sh.itjust.works/comment/23916556

Sorry to burst your bubble, but removing the login form via CSS is just a cosmetic effect and it doesn’t have any effect on your security, since bots will try to brute force the login directly using the login endpoint.

https://feddit.it/comment/18461250
Reply
$$2923
https://sh.itjust.works/u/ohshit604 posted on Feb 23, 2026 06:45
In reply to: https://feddit.it/comment/18461250

Oh I am fully aware, that’s kinda why I added the line:

but be warned if you take this route that the CSS can be re-enabled on the login screen using your browsers element inspect

In my original comment, hence why I also suggest just outright blacklist all IP’s and whitelisting the known few.

https://sh.itjust.works/comment/23926497
Reply
$$2930
https://lemmy.world/u/rektdeckard posted on Feb 23, 2026 07:11
In reply to: https://lemmy.ml/comment/24124257

Are the free limits suitable for light media streaming by a few users? I’m currently running a simple setup with Caddy reverse proxy and port knocking, but my ISP doesn’t do static IP and they change my address every few months.

https://lemmy.world/comment/22295843
Reply
$$2932
https://programming.dev/u/monkeyFromTheLake posted on Feb 23, 2026 07:13
In reply to: https://lemmy.world/post/43453337

I am using wireguard for this purpose. My router supports that. It’s a very easy setup and works fine in every is case I encountered except for android car.

https://programming.dev/comment/22343737
Reply
$$2935
https://feddit.uk/u/Cyber posted on Feb 23, 2026 07:23
In reply to: https://lemmy.world/comment/22292758

How’d you setup the port knocking? Is that something caddy does?

I’m using haproxy and was thinking of trying the same thing… not sure if haproxy supports it though, or whether I have to do something else …?

https://feddit.uk/comment/23413122
Reply
$$2957
https://feddit.org/u/B0rax posted on Feb 23, 2026 08:56
In reply to: https://programming.dev/comment/22343737

I heard you need to exclude Android auto in the WireGuard settings, then it should work.

The reason is that the car communicates via IP with your phone. But when all phone traffic is routed through your home, it can not reach the car.

https://feddit.org/comment/11673498
Reply
$$2981
https://lemmy.ml/u/KarnaSubarna posted on Feb 23, 2026 10:19
In reply to: https://lemmy.world/post/43453337

Tailscale, if you don’t want to make your services available to anyone else than you (and people you want to grant access to).

https://lemmy.ml/comment/24131221
Reply
$$3007
https://lemmy.world/u/TunaLobster posted on Feb 23, 2026 11:40
In reply to: https://lemmy.world/comment/22285377

I don’t have an exit node in my tailnet. Through the magic of routing, tailnet stays in tailnet and vpn stays in vpn. I got extra fancy and used gluetun to handle docker vpn traffic, but only for some ports of some containers.

https://lemmy.world/comment/22298210
Reply
$$3035
https://sopuli.xyz/u/pleksi posted on Feb 23, 2026 12:14
In reply to: https://lemmy.world/comment/22286011

This is what i did but on the router. I have openwrt on the router. You can install an extension called PBR (policy based routing) on it.

Then you set up one wireguard interface that’s in the same firewall zone as your LAN to your lan and another that’s in the WAN. You can create policies to route any outbound connections (including the ones from your mobile client devices) through the commercial WAN wireguard connection.

https://sopuli.xyz/comment/22055545
Reply
$$3071
https://lemmy.ca/u/Auli posted on Feb 23, 2026 13:13
In reply to: https://lemmy.world/post/43453337

Depends I just have a proxy and open port 443. Its not wide open but open enough that others can use it. I geo block have IP lists filter through it and suricata. Or use a VPN if others don’t need access.

https://lemmy.ca/comment/21855516
Reply
$$3077
https://eviltoast.org/u/AvocadoSandwich posted on Feb 23, 2026 13:20
In reply to: https://lemmy.zip/comment/24809659

What’s wrong with this approach?

https://eviltoast.org/comment/17698456
Reply
$$3091
https://lemmy.world/u/Krukenberg posted on Feb 23, 2026 13:35
In reply to: https://lemmy.world/comment/22285377

Wouldn’t a MullvadVPN exit node from Tailscale suit your need perfectly? I’m a noob though.

https://lemmy.world/comment/22299618
Reply
$$3110
https://lemmy.ml/u/Kagu posted on Feb 23, 2026 14:15
In reply to: https://lemmy.world/comment/22295843

I think this may be a your milage may vary thing. I only personally use netbird for remote server management, as I barely consume anything other than streamed music remotely. Its possible the free speed limits are not suitable for 1080p video streaming

https://lemmy.ml/comment/24133987
Reply
$$3134
https://lemmy.world/u/irmadlad posted on Feb 23, 2026 15:09
In reply to: https://lemmy.ca/comment/21855516

Its not wide open but open enough that others can use it

How does that work? Are you saying you are filtering with Suricata? Curious as in my mind a port is either on or off. I am always ready to be schooled.

https://lemmy.world/comment/22301115
Reply
$$3185
https://lemmy.zip/u/GraveyardOrbit posted on Feb 23, 2026 16:59
In reply to: https://eviltoast.org/comment/17698456

I feel that beginners should avoid reverse proxying until they’ve learned more about networking security. Judging by OPs post and consideration of blindly opening ports to wan they seem to have a low level of knowledge about this stuff so a mesh vpn is much safer for them and their network

https://lemmy.zip/comment/24830665
Reply
$$3210
https://nord.pub/u/SirHaxalot posted on Feb 23, 2026 18:12
In reply to: https://lemmy.world/comment/22295843

The free version is mainly just a number of user and device limit. Although the relaying service might be limited as well, but that should only matter if both of your clients have strict NAT, otherwise the Wireguard tunnels gets directly connected and no traffic goes through Netbirds managed servers.

You can also self-host the control plane with pretty much no limitations, and I believe you no longer need SSO (which increased the complexity a lot for homelab setups).

https://nord.pub/comment/218557
Reply
$$3247
https://programming.dev/u/monkeyFromTheLake posted on Feb 23, 2026 19:35
In reply to: https://feddit.org/comment/11673498

Oh thanks. I knew the reason for the issue but had not thought of looking for a solution. Well I thought there was none.

https://programming.dev/comment/22353880
Reply
$$3271
https://sopuli.xyz/u/Evil_Incarnate posted on Feb 23, 2026 20:42
In reply to: https://lemmy.world/post/43453337

Have a look at Zerotier. I have some devices running it and it works a treat. Basically, add devices to your network and it gives them addresses that you can access as if it was on your home network. Your usual 192.168.. still work, but also you can choose a bunch like 172.25.. that you can only access when running Zerotier.

I use it to access jellyfin from my phone or laptop or to SSH into my server.

https://sopuli.xyz/comment/22064453
Reply
$$3544
https://lemmy.world/u/user314_lemmus_v3s posted on Feb 24, 2026 07:08
In reply to: https://lemy.lol/comment/24313274

I’ve been using this setup for years, then one day just installed caddyserver. No certbot, no boilerplate nginx config etc.

I was still using nginx for internal services but then replaced it with “fabio lb” because it works well with consul.

I was so happy do discover it that I want to share it with everyone ¯_(ツ)_/¯.

Thank you for your attention on this matter.

https://lemmy.world/comment/22315495
Reply
$$3548
https://lemmy.world/u/mikedd posted on Feb 24, 2026 07:22
In reply to: https://lemmy.ml/comment/24131221

I second this.

https://lemmy.world/comment/22315653
Reply
$$3554
https://lemmy.zip/u/kratoz29 posted on Feb 24, 2026 07:30
In reply to: https://lemy.lol/comment/24313274

CGNAT sends its regards.

(Although if you have IPv6 access you might get around this… But even in 2026 you will face issues going only this way).

https://lemmy.zip/comment/24845165
Reply
$$3557
https://lemmy.zip/u/kratoz29 posted on Feb 24, 2026 07:37
In reply to: https://lemmy.ml/comment/24124257

So is this like a Tailscale alternative and not a way to expose your services?

https://lemmy.zip/comment/24845239
Reply
$$3560
https://feddit.uk/u/javiwhite posted on Feb 24, 2026 08:02
In reply to: https://lemmy.world/post/43453337

Your mileage may vary, as it’s a project that doesn’t look to be actively worked on anymore, but selfhosted-gateway is a simple wireguard docker setup that’s relatively easy to set up. It spins up the relevant proxies and tunnel, Doesn’t cost anything, nor is there any signups etc… all you need is a VPS, a domain name and a home machine.

https://feddit.uk/comment/23436211
Reply
$$3582
https://sopuli.xyz/u/vaionko posted on Feb 24, 2026 09:15
In reply to: https://lemmy.zip/comment/24845165

I am behind GCNAT, and my ISP doesn’t do IPv6. I have a free tier VPS from Oracle that uses wireguard to tunnel packets to my home server.

https://sopuli.xyz/comment/22074005
Reply
$$3595
https://lemmy.zip/u/Chaser posted on Feb 24, 2026 09:49
In reply to: https://lemmy.world/post/43453337

My Ubiquity Dream Machine has Wireguard integrated. So it’s literally just a few clicks to spin up a server. I use it in combination with a port forward on my FritzBox and a dyn ip using https://dynv6.com/ and a domain i had laying around anyways.

Regarding Wireguard: Wireguards (imho) best feature is split tunneling. You can decide which ips or subnets to route through the tunnel. See AllowedIPs.

As a default it says something like

AllowedIPs = 0.0.0.0/0

Which means “just route everything through me”.

However you could allow your subnets only. Like this I use my private and my business vpn at the same time.

AllowedIPs = 10.0.0.0/24,10.0.1.0/24,10.0.2.0/24,10.0.3.0/24

You mentioned, that you have not a lot experience with networking, so your subnet may look like that. Just check your local ip and replace the last digit with 0/24

AllowedIPs = 192.168.2.0/24
https://lemmy.zip/comment/24846744
Reply
$$3681
https://lemmy.ml/u/Kagu posted on Feb 24, 2026 13:56
In reply to: https://lemmy.zip/comment/24845239

Correct. Its just a mesh VPN

https://lemmy.ml/comment/24155424
Reply
$$3711
https://lemmy.world/u/iggy posted on Feb 24, 2026 15:32
In reply to: https://feddit.uk/comment/23413122

I do the port knocking at the firewall level (it’s a pretty simple nft chain setup). Caddy isn’t involved at all. I was thinking about integrating that into my caddy config using something akin to an operator, but I haven’t needed any extra functionality yet.

https://lemmy.world/comment/22321855
Reply
$$3738
https://sh.itjust.works/u/WhyJiffie posted on Feb 24, 2026 16:36
In reply to: https://lemmy.world/comment/22301115

a firewall can be used to filter incoming traffic by its properties. most consumer home routers don’t expose the firewall settings

https://sh.itjust.works/comment/23953095
Reply
$$3826
https://lemmy.zip/u/kratoz29 posted on Feb 24, 2026 21:30
In reply to: https://sopuli.xyz/comment/22074005

Ah, if only Oracle could take at least one of my multiple credit/debit cards.

https://lemmy.zip/comment/24859425
Reply
$$4152
https://sopuli.xyz/u/vaionko posted on Feb 25, 2026 16:15
In reply to: https://lemmy.zip/comment/24859425

That’s a bummer. It’s great for this stuff, don’t need processing power or memory, and I don’t really care if it got nuked for some reason

https://sopuli.xyz/comment/22099049
Reply
$$5263
https://lemmy.world/u/kaotic posted on Feb 28, 2026 10:39
In reply to: https://lemmy.ml/comment/24131221

This is the best option if you don’t want to manage your own VPN server.

https://lemmy.world/comment/22392925
Reply