Hi, guys. Like in the title. I have orangepi5 with some services like nextcloud or grafana. I would like to access to those instances from outside - but I don’t want to open ports.

Could you guys point me how can I achieve that?

Do I need to set domain for home services? I have heard that people recommends cloudfare tunnel, but I think cloudfare tunnel does not work with subdomain like duckdns. Do I need to buy domain for my case? One more think, if I set this tunnel or maybe other solution- should I go with https (lets encrypt) solution?

Thank You

  • @[email protected]
    link
    fedilink
    English
    191 year ago

    If you don’t want it publicly exposed to the internet you can use a vpn. Tailscale is probably the easiest.

    • @karcioOP
      link
      31 year ago

      for this I am using zerotier - and I can connect from outside but … using IPs which is not great. Would like to use domains

      • @[email protected]
        link
        fedilink
        7
        edit-2
        1 year ago

        Sounds like you want to set up DDNS (dynamic DNS). Basically run a little script on your router or server that occasionally updates a domain name with your IP address.

        Many free options. DuckDNS, Cloudflare, etc.

      • @[email protected]
        link
        fedilink
        31 year ago

        I’m using PiHole with my tailscale to use their MagicDNS.
        This shares the PiHole among all the devices connected to the tailnet, and in the PiHole you can configure your local DNS to point your domains to your tailIP.
        My setup has several services in a single machine, so there’s also the issue of ports, for that I use caddy as a reverse proxy, which also allows me to have HTTPS only configuring the key to my registrar for the DNS challenge

    • @karcioOP
      link
      31 year ago

      I did not - thank you will try

      • @PeachMan
        link
        21 year ago

        Any self-hosted VPN will work, tailscale just happens to be the easiest to set up. Wireguard and OpenVPN are also popular choices. You only need to use things like CloudFlare tunnels if you want to allow OTHER people to access your stuff without having to use your VPN.

  • EP51L0N
    link
    fedilink
    3
    edit-2
    1 year ago

    using a reverse proxy is prob your best bet. something like nginx (nginxproxymanager for easier configuration)

    • @karcioOP
      link
      2
      edit-2
      1 year ago

      nginxproxymanager

      Well, I was trying to play with nginx proxy manager, was able to set this but still, could connect only from home network - not from outside

      • EP51L0N
        link
        fedilink
        61 year ago

        nginxpm still requires ports to be open, but only 2: 80 and 443. a lot better than opening every port for every service you have

  • snowe
    link
    fedilink
    31 year ago

    You’ve really got two options here. Tailscale, which will give you named dns routes for your machines, based on the machine name, or dynamic DNS with a reverse proxy like SWAG.

  • @[email protected]
    link
    fedilink
    31 year ago

    I use zerotier for that kind of stuff, mostly because it runs native on my router (mikrotik) and is zero config so easy to run on a random mobile device I might have on me.

  • @pixxelkick
    link
    31 year ago

    You will need to open some ports, but ideally you just open up 1 port for a VPN and call it a day.

    If you want a really easy solution you can buy one of the mid to high end routers that comes with a built in OpenVPN you can enable, and you just do the process to have it be the router for your network (usually by setting your modem to pass through mode and then have your personal router immediately next in line, and it becomes the actual router of the network)

    If you do a search you should find a few decent models out there with OpenVPN support, and then its just a matter of enabling the feature in the router’s interface and following its guide and then installing OpenVPN on your mobile phone(s)

    • @karcioOP
      link
      11 year ago

      Thank you for this tip, actually I have second router connected to my main router(from provider) and on this second router I have openwrt - I think I have seen there openvpn option - will check

      • @pixxelkick
        link
        11 year ago

        No problem, the mode you are looking for is called Bridge Mode, and what you’ll need to ensure your setup is, is:

        ISP -> ISP Router -> Your Router -> Rest of the network

        It’s crucial you only have your router as the only thing plugged into the ISP Router, and you want it to be typically plugged into port 1. You’ll need to either look up the paperwork or talk to your ISP about how bridge mode works for their modem model.

        Keep in mind once bridge mode is enabled on the ISP router, it loses its wifi network so the only way after you can connect to it to configure it is by a physical connection, so if you mess it up you’ll need to have a laptop or smartphone you can physically connect via ethernet to port 1 of the isp router to be able to access its interface again.

        But once you get bridge mode working your private router will now get a public IP assigned to it instead and it will act as the “real” router of your network.

  • @[email protected]
    link
    fedilink
    21 year ago

    you could use cloudflare zero-trust, i use it with a docker container which runs cloudflared. it tunnels your services through without a single port open. there are a couple youtube tutorials which are pretty good.