top | item 21424397

(no title)

krazykringle | 6 years ago

Zerotier (mentioned below) is perfect for this!

To expand a little bit: it provides an (almost) zero-configuration way to set up a private 'layer 2' network that you can connect your home server to, and any other machines that you want to be able to connect to it or to each other. It handles NAT traversal completely transparently.

In practice, it means that if I have a (say) NFS server connected to a Zerotier network I control, I can connect to it transparently from anywhere from another machine on that network, no matter what NATs / firewalls either machine is behind, even if they change. Perfect for phones, roving laptops, etc. I've gone to a model where I do most of my development (over mosh/tmux) on my home machine, from wherever I happen to be.

No home firewall configuration needed at all.

discuss

order

johntash|6 years ago

+1 for Zerotier. I really like wireguard, but Zerotier is so much easier and quicker to set up from scratch. If wireguard had ACLs and ipam built-in, it probably would probably win me over.

finchisko|6 years ago

Maybe because it's not open source, only free for personal use?

politelemon|6 years ago

According to their pricing page,

> ZeroTier’s software is open source and free to use for most purposes including personal use, internal use within a business or academic institution, and evaluation for uses that require commercial licensing.

I was able to find this: https://github.com/zerotier/ZeroTierOne

tbyehl|6 years ago

I've long been confused about Wireguard getting all the attention over ZeroTier. ZT is so good at finding a communications path that I had to figure out how to block it from traversing one of my IPSec tunnels.