Network Security
Your content here
Firewall
opnsense
boot environment
SSH
ssh tunnel
ssh -i C:\Users\jdede\.ssh\id_ed25519_serge -v -p 33301 -L 1443:10.0.0.139:1443 -L 33301:10.0.0.1:9000 root@serverhome.info
ssh -p 33301 -L 9000:10.0.0.1:9000 jdedev@serverhome.info
ssh -p 33301 -L 22:10.0.0.10:22 jdedev@serverhome.info
ssh -p 33301 -L 1443:10.0.0.139:1443 jdedev@serverhome.info
ssh -p 33301 -L 9000:10.0.0.1:9000 jdedev@serverhome.info
sshfs
# mount remote file system
sudo sshfs -o IdentityFile=/volume1/homes/jdedev/.ssh/id_ed25519_serge ubuntu@152.69.179.52:/ /volume1/mount/ocihost001
VPN
Wireguard
content
Tailscale
pfsense
outbound NAT rules
install tailscale
Settings -> Keys -> Auth keys -> Generate auth key (reusable, expiration, ...) -> Generate key -> Copy tskey
tailscale synology
https://tailscale.com/kb/1131/synology/
/var/packages/Tailscale/target/bin/tailscale configure-host; synosystemctl restart pkgctl-Tailscale.service
sudo synosystemctl restart pkgctl-Tailscale.service
Reverse Proxy
Traefik
content
Cloudflare Tunnels
setup application (authentication)
Required for authentication
Example : Github
start cloudflared tunnel
confugure public hostnames
Configure hosts at https://one.dash.cloudflare.com/
host1.domain : connection type . url:port

