I’m pretty new to selfhosting and homelabs, and I would appreciate a simple-worded explanation here. Details are always welcome!

So, I have a home network with a dynamic external IP address. I already have my Synology NAS exposed to the Internet with DDNS - this was done using the interface, so didn’t require much technical knowledge.

Now, I would like to add another server (currently testing with Raspberry Pi) in the same LAN that would also be externally reachable, either through a subdomain (preferable), or through specific ports. How do I go about it?

P.S. Apparently, what I’ve tried on the router does work, it’s just that my NAS was sitting in the DMZ. Now it works!

  • jacksquat@what.forfi.win
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    3
    ·
    2 days ago

    Honestly Cloudflare Tunnels could be a very simple way to do it. I’ve always had tremendous luck with it. By using CF you can let them do all the heavy lifting instead of hosting your own… as long as you trust them.

    • BroBot9000@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      2 days ago

      They are a plague with how prevalent they have become.

      The internet shouldn’t put all its eggs into one basket.

      It’s just another centralized entity which will lead to monopolized power. It goes against what we are trying to do with federated networks like Lemmy and mastodon.

      • aspoleczny@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        edit-2
        1 day ago

        I prefer to use products and services before inevitable enshittification, not after the curve. Refusing to use them won’t change their fate.

      • Flax@feddit.uk
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 days ago

        What’s a better alternative that offer good ddos protection and tunnels

      • aspoleczny@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        It’s definitely not the same thing. I do understand reservations behind usage free-tier services from Big Bad Corp., but I don’t understand malicious reduction of valid arguments for usage of those services.

          • aspoleczny@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            10 hours ago

            No public server required at all

            • CF: Yes

            • frp: No

            DDoS protection, WAF, and automatic SSL

            • CF: Yes

            • frp: No

            Access controls and auth

            • CF: built-in Zero Trust

            • frp: manual setup of token/OIDC

            Managed DNS

            • CF: Yes

            • frp: No

            Built in security tools

            • CF: Yes

            • frp: No


            Just like I said - prevalent reduction of valid arguments for usage of those services.

      • aspoleczny@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        Again, attack targets end users, not Cloudflare tunnel operators: It abuses Cloudflare Tunnels as a delivery mechanism for malware payloads, not as a method to compromise or attack people who are self-hosting their own services through Cloudflare Tunnels.