ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    ZeroTier: is this a good time to use...

    IT Discussion
    zerotier rds rdp vpn
    8
    91
    26.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      Dashrender @dafyre
      last edited by

      @dafyre said:

      @wrx7m said:

      In terms of the gateway feature, is it Linux connector + bridged mode?

      That is supposed to be the way it works, but I haven't been able to get it to work like that. 😞

      If I want it as a "gateway", I just set it up as a router, and add static routes on the physical routers on each site.

      that doesn't allow for ethernet level access - definitely not the same thing at all.

      D 1 Reply Last reply Reply Quote 0
      • D
        dafyre @Dashrender
        last edited by

        @Dashrender said:

        @dafyre said:

        @wrx7m said:

        In terms of the gateway feature, is it Linux connector + bridged mode?

        That is supposed to be the way it works, but I haven't been able to get it to work like that. 😞

        If I want it as a "gateway", I just set it up as a router, and add static routes on the physical routers on each site.

        that doesn't allow for ethernet level access - definitely not the same thing at all.

        Sadly, you are very much correct.

        1 Reply Last reply Reply Quote 0
        • S
          scottalanmiller
          last edited by

          That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

          D 1 Reply Last reply Reply Quote 1
          • D
            Dashrender @scottalanmiller
            last edited by

            @scottalanmiller said:

            That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

            That's what I thought, but @dafyre is saying he's been unable to get it to work.

            D 1 Reply Last reply Reply Quote 0
            • J
              Jason Banned @FATeknollogee
              last edited by

              @FATeknollogee said:

              Type 3: Users (are contractors), they connect via VPN from overseas

              Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

              F 1 Reply Last reply Reply Quote 1
              • D
                dafyre @Dashrender
                last edited by

                @Dashrender said:

                @scottalanmiller said:

                That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

                That's what I thought, but @dafyre is saying he's been unable to get it to work.

                I have not been able to get it to work. I got a post out on their community, but haven't heard anything back yet, lol.

                1 Reply Last reply Reply Quote 0
                • F
                  FATeknollogee @Jason
                  last edited by

                  @Jason said:

                  @FATeknollogee said:

                  Type 3: Users (are contractors), they connect via VPN from overseas

                  Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                  Are you saying access via ZT is not a good idea?

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    scottalanmiller @FATeknollogee
                    last edited by

                    @FATeknollogee said:

                    @Jason said:

                    @FATeknollogee said:

                    Type 3: Users (are contractors), they connect via VPN from overseas

                    Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                    Are you saying access via ZT is not a good idea?

                    Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                    D 1 Reply Last reply Reply Quote 0
                    • D
                      Dashrender @scottalanmiller
                      last edited by

                      @scottalanmiller said:

                      @FATeknollogee said:

                      @Jason said:

                      @FATeknollogee said:

                      Type 3: Users (are contractors), they connect via VPN from overseas

                      Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                      Are you saying access via ZT is not a good idea?

                      Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                      The whole trusted network issue. LAN vs LAN-less

                      As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                      Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                      D 1 Reply Last reply Reply Quote 0
                      • D
                        dafyre @Dashrender
                        last edited by

                        @Dashrender said:

                        @scottalanmiller said:

                        @FATeknollogee said:

                        @Jason said:

                        @FATeknollogee said:

                        Type 3: Users (are contractors), they connect via VPN from overseas

                        Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                        Are you saying access via ZT is not a good idea?

                        Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                        The whole trusted network issue. LAN vs LAN-less

                        As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                        Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                        I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                        D 1 Reply Last reply Reply Quote 0
                        • D
                          Dashrender @dafyre
                          last edited by

                          @dafyre said:

                          @Dashrender said:

                          @scottalanmiller said:

                          @FATeknollogee said:

                          @Jason said:

                          @FATeknollogee said:

                          Type 3: Users (are contractors), they connect via VPN from overseas

                          Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                          Are you saying access via ZT is not a good idea?

                          Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                          The whole trusted network issue. LAN vs LAN-less

                          As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                          Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                          I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                          I go back and forth on using the home networking features that Windows has these days.

                          D 1 Reply Last reply Reply Quote 0
                          • D
                            dafyre @Dashrender
                            last edited by

                            @Dashrender said:

                            @dafyre said:

                            @Dashrender said:

                            @scottalanmiller said:

                            @FATeknollogee said:

                            @Jason said:

                            @FATeknollogee said:

                            Type 3: Users (are contractors), they connect via VPN from overseas

                            Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                            Are you saying access via ZT is not a good idea?

                            Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                            The whole trusted network issue. LAN vs LAN-less

                            As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                            Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                            I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                            I go back and forth on using the home networking features that Windows has these days.

                            I use them because they are there. I also have linux boxes at my house too, so there's that. 😄

                            1 Reply Last reply Reply Quote 0
                            • 1
                            • 2
                            • 3
                            • 4
                            • 5
                            • 5 / 5
                            • First post
                              Last post