ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    ZeroTier: is this a good time to use...

    IT Discussion
    zerotier rds rdp vpn
    8
    91
    26.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      Alex Sage @scottalanmiller
      last edited by

      @scottalanmiller said:

      There is no ZT DHCP.

      What? Then how do addresses get assigned?

      scottalanmillerS 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @Alex Sage
        last edited by

        @anonymous said:

        What? Then how do addresses get assigned?

        Via the client. Remember that the client talks to the server. No need for something like DHCP.

        dafyreD 1 Reply Last reply Reply Quote 2
        • dafyreD
          dafyre @scottalanmiller
          last edited by

          @scottalanmiller said:

          @anonymous said:

          What? Then how do addresses get assigned?

          Via the client. Remember that the client talks to the server. No need for something like DHCP.

          Scott is correct here. If you check a Windows system with ZT installed, and look at the ipv4 properties of the adapter, you will see that by default the IP address & DNS boxes are set to "static" but they are blank.

          1 Reply Last reply Reply Quote 4
          • DashrenderD
            Dashrender
            last edited by

            Cool - OK then you can effectively say that the IP assigned on the ZT will never change 🙂

            1 Reply Last reply Reply Quote 1
            • wrx7mW
              wrx7m
              last edited by

              In terms of the gateway feature, is it Linux connector + bridged mode?

              dafyreD 1 Reply Last reply Reply Quote 0
              • dafyreD
                dafyre @wrx7m
                last edited by dafyre

                @wrx7m said:

                In terms of the gateway feature, is it Linux connector + bridged mode?

                That is supposed to be the way it works, but I haven't been able to get it to work like that. 😞

                If I want it as a "gateway", I just set it up as a router, and add static routes on the physical routers on each site.

                DashrenderD 1 Reply Last reply Reply Quote 2
                • DashrenderD
                  Dashrender @dafyre
                  last edited by

                  @dafyre said:

                  @wrx7m said:

                  In terms of the gateway feature, is it Linux connector + bridged mode?

                  That is supposed to be the way it works, but I haven't been able to get it to work like that. 😞

                  If I want it as a "gateway", I just set it up as a router, and add static routes on the physical routers on each site.

                  that doesn't allow for ethernet level access - definitely not the same thing at all.

                  dafyreD 1 Reply Last reply Reply Quote 0
                  • dafyreD
                    dafyre @Dashrender
                    last edited by

                    @Dashrender said:

                    @dafyre said:

                    @wrx7m said:

                    In terms of the gateway feature, is it Linux connector + bridged mode?

                    That is supposed to be the way it works, but I haven't been able to get it to work like that. 😞

                    If I want it as a "gateway", I just set it up as a router, and add static routes on the physical routers on each site.

                    that doesn't allow for ethernet level access - definitely not the same thing at all.

                    Sadly, you are very much correct.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller
                      last edited by

                      That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

                      DashrenderD 1 Reply Last reply Reply Quote 1
                      • DashrenderD
                        Dashrender @scottalanmiller
                        last edited by

                        @scottalanmiller said:

                        That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

                        That's what I thought, but @dafyre is saying he's been unable to get it to work.

                        dafyreD 1 Reply Last reply Reply Quote 0
                        • J
                          Jason Banned @FATeknollogee
                          last edited by

                          @FATeknollogee said:

                          Type 3: Users (are contractors), they connect via VPN from overseas

                          Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                          FATeknollogeeF 1 Reply Last reply Reply Quote 1
                          • dafyreD
                            dafyre @Dashrender
                            last edited by

                            @Dashrender said:

                            @scottalanmiller said:

                            That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

                            That's what I thought, but @dafyre is saying he's been unable to get it to work.

                            I have not been able to get it to work. I got a post out on their community, but haven't heard anything back yet, lol.

                            1 Reply Last reply Reply Quote 0
                            • FATeknollogeeF
                              FATeknollogee @Jason
                              last edited by

                              @Jason said:

                              @FATeknollogee said:

                              Type 3: Users (are contractors), they connect via VPN from overseas

                              Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                              Are you saying access via ZT is not a good idea?

                              scottalanmillerS 1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @FATeknollogee
                                last edited by

                                @FATeknollogee said:

                                @Jason said:

                                @FATeknollogee said:

                                Type 3: Users (are contractors), they connect via VPN from overseas

                                Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                Are you saying access via ZT is not a good idea?

                                Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                DashrenderD 1 Reply Last reply Reply Quote 0
                                • DashrenderD
                                  Dashrender @scottalanmiller
                                  last edited by

                                  @scottalanmiller said:

                                  @FATeknollogee said:

                                  @Jason said:

                                  @FATeknollogee said:

                                  Type 3: Users (are contractors), they connect via VPN from overseas

                                  Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                  Are you saying access via ZT is not a good idea?

                                  Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                  The whole trusted network issue. LAN vs LAN-less

                                  As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                                  Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                                  dafyreD 1 Reply Last reply Reply Quote 0
                                  • dafyreD
                                    dafyre @Dashrender
                                    last edited by

                                    @Dashrender said:

                                    @scottalanmiller said:

                                    @FATeknollogee said:

                                    @Jason said:

                                    @FATeknollogee said:

                                    Type 3: Users (are contractors), they connect via VPN from overseas

                                    Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                    Are you saying access via ZT is not a good idea?

                                    Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                    The whole trusted network issue. LAN vs LAN-less

                                    As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                                    Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                                    I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                                    DashrenderD 1 Reply Last reply Reply Quote 0
                                    • DashrenderD
                                      Dashrender @dafyre
                                      last edited by

                                      @dafyre said:

                                      @Dashrender said:

                                      @scottalanmiller said:

                                      @FATeknollogee said:

                                      @Jason said:

                                      @FATeknollogee said:

                                      Type 3: Users (are contractors), they connect via VPN from overseas

                                      Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                      Are you saying access via ZT is not a good idea?

                                      Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                      The whole trusted network issue. LAN vs LAN-less

                                      As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                                      Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                                      I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                                      I go back and forth on using the home networking features that Windows has these days.

                                      dafyreD 1 Reply Last reply Reply Quote 0
                                      • dafyreD
                                        dafyre @Dashrender
                                        last edited by

                                        @Dashrender said:

                                        @dafyre said:

                                        @Dashrender said:

                                        @scottalanmiller said:

                                        @FATeknollogee said:

                                        @Jason said:

                                        @FATeknollogee said:

                                        Type 3: Users (are contractors), they connect via VPN from overseas

                                        Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                        Are you saying access via ZT is not a good idea?

                                        Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                        The whole trusted network issue. LAN vs LAN-less

                                        As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                                        Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                                        I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                                        I go back and forth on using the home networking features that Windows has these days.

                                        I use them because they are there. I also have linux boxes at my house too, so there's that. 😄

                                        1 Reply Last reply Reply Quote 0
                                        • 1
                                        • 2
                                        • 3
                                        • 4
                                        • 5
                                        • 5 / 5
                                        • First post
                                          Last post