Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CGNAT self hosted Wireguard tunnel #127

Open
saltydk opened this issue Dec 24, 2022 · 1 comment
Open

CGNAT self hosted Wireguard tunnel #127

saltydk opened this issue Dec 24, 2022 · 1 comment
Assignees

Comments

@saltydk
Copy link
Member

saltydk commented Dec 24, 2022

Consider implementing a role that can setup a layer 4 Traefik router with optional tunnel/vpn container that routes traffic to a CGNAT home server.

Chosen solution will be HAProxy with Header and SNI based routing depending on the protocol used (HTTP/HTTPS) and will not be considering other protocols for now. So applications that need open ports outside of regular HTTP/HTTPS will not be covered by this initial implementation.

@saltydk
Copy link
Member Author

saltydk commented Mar 24, 2024

Finally got around to looking at this and first solution will be deploying Wireguard and HAProxy on a server and then have that tunnel be the source of access to Traefik.

I will likely need testers for this to work out any setup kinks as far as usability goes. Feel free to reach out on discord if you are in this target audience and we haven't released this yet.

@saltydk saltydk changed the title Alternate Traefik deployments CGNAT self hosted Wireguard tunnel Mar 24, 2024
@saltydk saltydk self-assigned this Mar 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant