The last piece (I think) of my connectivity puzzle is the remote access back into my network when I’m away from home. This is really handy when stuff doesn’t work, and by using a Virtual Private Connection (VPN) also provides an added layer of security when I’m using an untrusted WiFi network.
I have an openVPN server running, you guessed it, in a freenas1 jail and use TunnelBlick on macOS and OpenVPN on iOS to connect to it and through it to the internet enabling me to use a connection which I know is secure, rather than one I don’t trust. Maybe I’m starting to sound a little paranoid, but I figure the more things I can do protect myself, the less chance I am to become another cyber security statistic which can’t be a bad thing 😉
Anyway, VPN is built directly into eOS and is simple to configure in the Network settings. I simply opened my openVPN configuration file and it appeared to connect successfully. This is actually difficult to validate whilst I’m already connected to my LAN, so I’ll try and check it out later in the week when I’m away from home, but everything looks like it should work fine. As I won’t be using this as my daily driver, I probably won’t use this a great deal, but it’s nice to know how easy it was to setup (unlike configuring the openVPN server in FreeBSD, to begin with!)
That pretty much wraps up my connectivity requirements, as I can now access everything at home and (hopefully) away. There are a few things that can make that a little easier though…
Recent Comments