This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. {{tag>linux docker wireguard openvpn}} ======Private LAN VPN Access====== The scope here concerns use of VPN (Virtual Private Network) to gain secure access from the public network to a local private network. It relates to private secure access and use from the public network. It does not consider public VPNs setup for public use. There have been considered 3 different levels of access as described by the applications used: * Nextcloud - a full privately hosted publicly accessible file shareing application, with many additional features * Privatebin - An encrypted file publicly accessible file sharing server * Syncthing - A files synchronising system * Wireguard - A VPN server These applications and their scope are described further below. =====Nextcloud===== Nextcloud is an open source content collaboration platform. At its core is file-sharing, but it has many other core functions as well as extensibility with additional installed applications. While Nextcloud can securely share files it is not focused as a **simple**, public, and secure file-sharing platform. I have been using Nextcloud and before that Owncloud from which Nextcloud was forked since circa 2013. My server setup is described here: *kptree [[https://wiki.kptree.net/doku.php?id=docker_notes:docker-nextcloud|nextcloud]] is Docker based setup, that I currently use, since 2022. *kptree [[https://wiki.kptree.net/doku.php?id=home_server:web_server_setup#nextcloud_setup|nextcloud]] is a VM setup previously I used. =====Privatebin===== *[[https://privatebin.info/|PrivateBin]] *[[https://github.com/PrivateBin|Github Privatebin]] *[[https://github.com/JamesTurland/JimsGarage/blob/main/PrivateBin/docker-compose.yaml|Jims Garage PrivateBin/docker-compose.yaml]] =====Syncthing===== *[[https://syncthing.net/|Syncthing]] *[[https://docs.syncthing.net/intro/getting-started.html|getting started]] *[[https://docs.syncthing.net/intro/getting-started.html|Syncthing Getting Started]] =====Unison===== *The Linux Code [[https://thelinuxcode.com/unison-file-synchronization-between-two-servers/|How to Use Unison for Seamless File Synchronization Between Servers]] *Arch Linux [[https://man.archlinux.org/man/unison.1.en|Unison manual]] *[[https://www.cyberciti.biz/faq/unison-file-synchronizer-tool/|UNIX / Linux: HowTo Use unison File Synchronizer]] *[[https://github.com/bcpierce00/unison/blob/master/README.md|GIT Unison]] *[[https://www.cis.upenn.edu/~bcpierce/unison/|Unison Website]] superseded =====inotify===== *[[https://www.cyberciti.biz/faq/linux-inotify-examples-to-replicate-directories/|Linux incrond inotify Monitor Directories For Changes And Take Action]] * =====Wireguard===== I previously successfully setup [[https://wiki.kptree.net/doku.php?id=linux_router:wireguard|wireguard]] on my router. This was installed on "bare metal" as was the nftable based router firewall. I later installed Bind9 DNS and Kea DHCP programs in Docker containers. I always run Docker in a VM to prevent Docker's packet filtering from affecting the bare metal firewall rules. I did not move Wireguard to a Docker container as I did not have the need at the time. ---- <- docker_notes:docker-dhcp|Back ^ docker_notes:index|Start page ^ docker_notes:fileshare|Next ->