ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    ZeroTier: is this a good time to use...

    Scheduled Pinned Locked Moved IT Discussion
    zerotierrdsrdpvpn
    91 Posts 8 Posters 26.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @Alex Sage
      last edited by

      @anonymous said:

      What? Then how do addresses get assigned?

      Via the client. Remember that the client talks to the server. No need for something like DHCP.

      dafyreD 1 Reply Last reply Reply Quote 2
      • dafyreD
        dafyre @scottalanmiller
        last edited by

        @scottalanmiller said:

        @anonymous said:

        What? Then how do addresses get assigned?

        Via the client. Remember that the client talks to the server. No need for something like DHCP.

        Scott is correct here. If you check a Windows system with ZT installed, and look at the ipv4 properties of the adapter, you will see that by default the IP address & DNS boxes are set to "static" but they are blank.

        1 Reply Last reply Reply Quote 4
        • DashrenderD
          Dashrender
          last edited by

          Cool - OK then you can effectively say that the IP assigned on the ZT will never change 🙂

          1 Reply Last reply Reply Quote 1
          • wrx7mW
            wrx7m
            last edited by

            In terms of the gateway feature, is it Linux connector + bridged mode?

            dafyreD 1 Reply Last reply Reply Quote 0
            • dafyreD
              dafyre @wrx7m
              last edited by dafyre

              @wrx7m said:

              In terms of the gateway feature, is it Linux connector + bridged mode?

              That is supposed to be the way it works, but I haven't been able to get it to work like that. 😞

              If I want it as a "gateway", I just set it up as a router, and add static routes on the physical routers on each site.

              DashrenderD 1 Reply Last reply Reply Quote 2
              • DashrenderD
                Dashrender @dafyre
                last edited by

                @dafyre said:

                @wrx7m said:

                In terms of the gateway feature, is it Linux connector + bridged mode?

                That is supposed to be the way it works, but I haven't been able to get it to work like that. 😞

                If I want it as a "gateway", I just set it up as a router, and add static routes on the physical routers on each site.

                that doesn't allow for ethernet level access - definitely not the same thing at all.

                dafyreD 1 Reply Last reply Reply Quote 0
                • dafyreD
                  dafyre @Dashrender
                  last edited by

                  @Dashrender said:

                  @dafyre said:

                  @wrx7m said:

                  In terms of the gateway feature, is it Linux connector + bridged mode?

                  That is supposed to be the way it works, but I haven't been able to get it to work like that. 😞

                  If I want it as a "gateway", I just set it up as a router, and add static routes on the physical routers on each site.

                  that doesn't allow for ethernet level access - definitely not the same thing at all.

                  Sadly, you are very much correct.

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

                    DashrenderD 1 Reply Last reply Reply Quote 1
                    • DashrenderD
                      Dashrender @scottalanmiller
                      last edited by

                      @scottalanmiller said:

                      That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

                      That's what I thought, but @dafyre is saying he's been unable to get it to work.

                      dafyreD 1 Reply Last reply Reply Quote 0
                      • J
                        Jason Banned @FATeknollogee
                        last edited by

                        @FATeknollogee said:

                        Type 3: Users (are contractors), they connect via VPN from overseas

                        Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                        FATeknollogeeF 1 Reply Last reply Reply Quote 1
                        • dafyreD
                          dafyre @Dashrender
                          last edited by

                          @Dashrender said:

                          @scottalanmiller said:

                          That's why ZT refers to it as a bridge, not a router. It's true bridging functionality that is needed to make it work as intended.

                          That's what I thought, but @dafyre is saying he's been unable to get it to work.

                          I have not been able to get it to work. I got a post out on their community, but haven't heard anything back yet, lol.

                          1 Reply Last reply Reply Quote 0
                          • FATeknollogeeF
                            FATeknollogee @Jason
                            last edited by

                            @Jason said:

                            @FATeknollogee said:

                            Type 3: Users (are contractors), they connect via VPN from overseas

                            Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                            Are you saying access via ZT is not a good idea?

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @FATeknollogee
                              last edited by

                              @FATeknollogee said:

                              @Jason said:

                              @FATeknollogee said:

                              Type 3: Users (are contractors), they connect via VPN from overseas

                              Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                              Are you saying access via ZT is not a good idea?

                              Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                              DashrenderD 1 Reply Last reply Reply Quote 0
                              • DashrenderD
                                Dashrender @scottalanmiller
                                last edited by

                                @scottalanmiller said:

                                @FATeknollogee said:

                                @Jason said:

                                @FATeknollogee said:

                                Type 3: Users (are contractors), they connect via VPN from overseas

                                Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                Are you saying access via ZT is not a good idea?

                                Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                The whole trusted network issue. LAN vs LAN-less

                                As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                                Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                                dafyreD 1 Reply Last reply Reply Quote 0
                                • dafyreD
                                  dafyre @Dashrender
                                  last edited by

                                  @Dashrender said:

                                  @scottalanmiller said:

                                  @FATeknollogee said:

                                  @Jason said:

                                  @FATeknollogee said:

                                  Type 3: Users (are contractors), they connect via VPN from overseas

                                  Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                  Are you saying access via ZT is not a good idea?

                                  Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                  The whole trusted network issue. LAN vs LAN-less

                                  As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                                  Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                                  I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                                  DashrenderD 1 Reply Last reply Reply Quote 0
                                  • DashrenderD
                                    Dashrender @dafyre
                                    last edited by

                                    @dafyre said:

                                    @Dashrender said:

                                    @scottalanmiller said:

                                    @FATeknollogee said:

                                    @Jason said:

                                    @FATeknollogee said:

                                    Type 3: Users (are contractors), they connect via VPN from overseas

                                    Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                    Are you saying access via ZT is not a good idea?

                                    Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                    The whole trusted network issue. LAN vs LAN-less

                                    As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                                    Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                                    I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                                    I go back and forth on using the home networking features that Windows has these days.

                                    dafyreD 1 Reply Last reply Reply Quote 0
                                    • dafyreD
                                      dafyre @Dashrender
                                      last edited by

                                      @Dashrender said:

                                      @dafyre said:

                                      @Dashrender said:

                                      @scottalanmiller said:

                                      @FATeknollogee said:

                                      @Jason said:

                                      @FATeknollogee said:

                                      Type 3: Users (are contractors), they connect via VPN from overseas

                                      Seems like a bad idea. Usually employees are given VPN access from company owned devices. a VPN is too much exposure for non-company owned devices and for people who aren't full employees. I would look into some other form of access, RD Gateway with RDS or Ctirix etc for these people.

                                      Are you saying access via ZT is not a good idea?

                                      Correct. ZT is a VPN. VPNs from arbitrary devices is normally a bad idea. The only exception to this is when you would have happily exposed the LAN to the Internet and this is purely a handy control of IP addresses. If security is your goal, you are bypassing security using a VPN in this role. VPNs are very dangerous because they are about exposure.

                                      The whole trusted network issue. LAN vs LAN-less

                                      As more and more things move to networks that are not local to our computers, we're changing seeing how we trust things.

                                      Traditionally we trust machines that are on our local LAN, but, if flip that on its ear and trust nothing, and always setup authenticated/trusted communications no matter where device is in comparison to us, then we are much safer.

                                      I think that it is beyond time that we stop trusting machines on our local lan. Even my home network has the service discovery disabled, and each machine has its firewall turned on for that very reason.

                                      I go back and forth on using the home networking features that Windows has these days.

                                      I use them because they are there. I also have linux boxes at my house too, so there's that. 😄

                                      1 Reply Last reply Reply Quote 0
                                      • 1
                                      • 2
                                      • 3
                                      • 4
                                      • 5
                                      • 5 / 5
                                      • First post
                                        Last post