

I’ve used no-ip.com for years without issue.
My NAS supports a few services out of the box. If you have anything like that, see what they support natively first.


I’ve used no-ip.com for years without issue.
My NAS supports a few services out of the box. If you have anything like that, see what they support natively first.


If you have enough IPs then not using NAT makes everything less complicated without any downside to security. If you think otherwise then IPv6 is going to cause you some problems.
Can you hit the port?
Ping,Tracert,Knock on the port with Telnet.
I’m guessing firewall rules related to your vpn.


gestures broadly
/s
There’s nothing wrong with hardware raid. You can probably pass them through as individual drives.
I would use them as is but only buy sata going forward.


You responded to a question with an incorrect answer. I was correcting that.
VPNs shouldn’t need to forward any ports when using ipv6. They can provide an entire ipv6 subnet to you.


Port forwarding is a function of NAT. It’s only needed because there aren’t enough ipv4 addresses for every device, so in most networks a lot of devices share a single ip and specific ports are forwarded to specific internal hosts
IPv6 has a large enough address space that this isn’t needed. You can still do it if you want. But mostly you just need a firewall without any NAT.
There’s more to it than this but you should get the idea.


I use a Reolink camera for this purpose. Its not self hosted but it’s solar capable and doesn’t need an inbound firewall rule.


Is the traffic not already encrypted? What would wire guard be providing here?


What’s the question


50psi is dangerous.
Edit: I mean if a tire blows out when over inflated that much, it becomes a legal problem. Whoever inflated it that much, or their supervisor along with the company, is negligent


It’s selective. You just provide the internal address or the Tailscale host name. All other traffic runs outside of the vpn tunnel.
Honestly it takes 10 mins to set up you should try it out.


Well yes but that’s a one-time setup.


Back in the days of dial up and bbs this was a problem but you would still get robots trying to connect to modems by dialing every phone number possible.


A mix of that and tomato paste, fish oil, garlic, ginger would probably mix things up for you.


I’m guessing you could substitute a 2:1 mix of paprika:cayenne.


Tailscale meets your needs even without an exit node configured.
Lots of text here but a firewall with inbound deny default rule is considerably easier to manage than port and ip address translation. It’s also possible to get unexpected inbound traffic with NAT. It’s how Tailscale works for example. Sounds like a security failure to me.