9

Hi! I used to run Plex and forward a port through my vpn so I could access the service outside my network, like on vacation. This meant I could keep my vpn on and still access my content. I use Cloudflared to access other services in this way.

Now that my vpn has stopped allowing port forwarding, how can I again access my content while keeping my network private and secure?

top 11 comments
sorted by: hot top controversial new old
[-] Wooly@lemmy.world 4 points 1 year ago

You don't need to port forward or anything for Plex to work outside your network, right? That's the whole point of Plex. All my friends can access my server wherever.

[-] trijste@lemmy.world 1 points 1 year ago

Are you using aVPN? I have Mullvad running

[-] Wooly@lemmy.world 2 points 1 year ago
[-] RotaryKeyboard@lemmy.ninja 4 points 1 year ago

First, you don't really need a VPN to view Plex content. Plex can be configured to require a secure connection. That ought to be enough. But if you want the VPN tunnel for some reason, the answer is simple: self-host your own VPN server. I recommend OpenVPN or Wireguard.

[-] trijste@lemmy.world 1 points 1 year ago

The vpn was a general privacy and security addition. I just have it on all the time. I’ll look into wireguard.

[-] meisme@lemmy.world 2 points 1 year ago

You can also try tailscale which is easy to set up, but their wireguard implementation is quite a bit slower (latency).

[-] elghoto@lemmy.world 2 points 1 year ago

You had your Plex open to the public with that setup. That's not secure at all, unless you wanted anyone to access it.

If you can port forward from your own IP and it's kind of stable, you can run a wire guard server to access your network and Plex.

If you can't portforward you can try a mesh network like tailscale.. there are other solutions as well. The fastest apparently is netwmaker, but you need to have a server with public IP. You can use a cheap VPS.

[-] notfromhere@lemmy.one 2 points 1 year ago

Tailscale would take less than 30 minutes to set up including software install and login on server and any client device (phone, laptop, etc). It uses wireguard, it just hosts the public part for connection management.

I've used wireguard for a few years. The container isn't essential, but I prefer to have all my service configs contained and separate from the host OS.

So basically you'll just have one WAN->LAN port forward for Wireguard. Connect to that remotely, and you'll be able to access everything inside your LAN.

[-] CanOpener@sh.itjust.works 0 points 1 year ago
[-] Lucid5603@lemmy.dbzer0.com 1 points 1 year ago

This was my recommendation too. Simplest setup you could ask for to create a VPN connection between devices with wireguard as the base.

this post was submitted on 11 Jul 2023
9 points (90.9% liked)

Selfhosted

40347 readers
202 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS