Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
docker_notes:vpn [2024-12-07 Sat wk49 10:05] – created baumkpdocker_notes:vpn [2024-12-07 Sat wk49 19:15] (current) – [Privatebin] baumkp
Line 1: Line 1:
 +{{tag>linux docker wireguard openvpn}}
 +======Private LAN VPN Access======
 +The scope here concerns use of VPN (Virtual Private Network) to gain secure access from the public network to a local private network.  It relates to private secure access and use from the public network.  It does not consider public VPNs setup for public use.
  
 +There have been considered 3 different levels of access as described by the applications used:
 +  * Nextcloud - a full privately hosted publicly accessible file shareing application, with many additional features
 +  * Privatebin - An encrypted file publicly accessible file sharing server
 +  * Syncthing - A files synchronising system
 +  * Wireguard - A VPN server
  
-<- docker_notes:docker-dns|Back ^ docker_notes:index|Start page ^ docker_notes:fileshare|Next ->+These applications and their scope are described further below. 
 + 
 +=====Nextcloud===== 
 +Nextcloud is an open source content collaboration platform.  At its core is file-sharing, but it has many other core functions as well as extensibility with additional installed applications.  While Nextcloud can securely share files it is not focused as a **simple**, public, and secure file-sharing platform. 
 + 
 +I have been using Nextcloud and before that Owncloud from which Nextcloud was forked since circa 2013.  My server setup is described here: 
 +  *kptree  [[https://wiki.kptree.net/doku.php?id=docker_notes:docker-nextcloud|nextcloud]] is Docker based setup, that I currently use, since 2022. 
 +  *kptree [[https://wiki.kptree.net/doku.php?id=home_server:web_server_setup#nextcloud_setup|nextcloud]] is a VM setup previously I used. 
 + 
 +=====Privatebin===== 
 + 
 +  *[[https://privatebin.info/|PrivateBin]] 
 +  *[[https://github.com/PrivateBin|Github Privatebin]] 
 +  *[[https://github.com/JamesTurland/JimsGarage/blob/main/PrivateBin/docker-compose.yaml|Jims Garage PrivateBin/docker-compose.yaml]] 
 +=====Syncthing===== 
 + 
 +  *[[https://syncthing.net/|Syncthing]] 
 +    *[[https://docs.syncthing.net/intro/getting-started.html|getting started]] 
 +  *[[https://docs.syncthing.net/intro/getting-started.html|Syncthing Getting  Started]] 
 + 
 +=====Unison===== 
 + 
 +  *The Linux Code [[https://thelinuxcode.com/unison-file-synchronization-between-two-servers/|How to Use Unison for Seamless File Synchronization Between Servers]] 
 +  *Arch Linux [[https://man.archlinux.org/man/unison.1.en|Unison manual]] 
 +  *[[https://www.cyberciti.biz/faq/unison-file-synchronizer-tool/|UNIX / Linux: HowTo Use unison File Synchronizer]] 
 +  *[[https://github.com/bcpierce00/unison/blob/master/README.md|GIT Unison]] 
 +  *[[https://www.cis.upenn.edu/~bcpierce/unison/|Unison Website]] superseded 
 + 
 +=====inotify===== 
 + 
 +  *[[https://www.cyberciti.biz/faq/linux-inotify-examples-to-replicate-directories/|Linux incrond inotify Monitor Directories For Changes And Take Action]] 
 +  * 
 + 
 +=====Wireguard===== 
 +I previously successfully setup [[https://wiki.kptree.net/doku.php?id=linux_router:wireguard|wireguard]] on my router.  This was installed on "bare metal" as was the nftable based router firewall. I later installed Bind9 DNS and Kea DHCP programs in Docker containers.  I always run Docker in a VM to prevent Docker's packet filtering from affecting the bare metal firewall rules.  I did not move Wireguard to a Docker container as I did not have the need at the time. 
 + 
 +---- 
 + 
 +<- docker_notes:docker-dhcp|Back ^ docker_notes:index|Start page ^ docker_notes:fileshare|Next ->