I reside in an apartment complex where the internet services are not controlled by the management, but instead, they are managed by our ISP, Telcom. Unfortunately, Telcom restricts certain functionalities for users, such as not helping with the opening of ports or providing the admin username/password for my router. Additionally, my router doesn’t appear on the network tab of file explorer. Given this situation, what options do I have to address these limitations to port forward?

  • @[email protected]
    link
    fedilink
    English
    61 year ago

    One solution would be sending email requesting for them to open ports for you, you can tell them that you need open ports for security cameras and use that port for reverse proxy. That way you dont need more than one open port. Second option is cloudflare tunnels, they do not require open ports at all, but they do require for you to buy domain though. Last option would be to use VPN like tailscale which also do not require open ports at all. All you need is clients installed on devices and connect them on the same network.

    Hope some of these help, i actually use all methods for different situations and each of them have pros and cons, but those are all reliable methods.

    • HousePanther
      link
      fedilink
      English
      81 year ago

      The better way to go about it is using Cloudflare tunnels or Tailscale.

      • @ezekielmudd
        link
        English
        61 year ago

        Tailscale will walk right past those ISP restrictions like a ghost passing through a wall.

        • @spez_
          link
          English
          21 year ago

          I can confirm, because I use Tailscale on my GL.iNet travel router, which is connected behind a router I have no access to. I’m able to access all my services anywhere in the world

        • HousePanther
          link
          fedilink
          English
          11 year ago

          The only way it would not would be if the ISP only allowed TCP ports 80, 143, 443, 465, 587, 993, and 995. Many public hotspots in my area do this plus deep packet inspection. You would need OpenVPN or SSH for a TCP-based VPN and then a means to disguise your traffic to look like an https session, over say, port 443. It’s not easy to defeat but very doable.