- 69
- 117 360
LinuxCloudHacks
Poland
Приєднався 1 кві 2023
Lockdown Your Network: Building a Fortress with Cloudflare Zero Trust
Tired of outdated security models that leave your network vulnerable? This video dives deep into the world of Zero Trust security, showcasing how to implement it using Cloudflare's powerful suite of tools.
Here's what you'll learn:
The limitations of traditional network security: We expose the weaknesses of relying solely on implicit trust based on location and VPNs.
The Zero Trust approach explained: Discover the core principles of Zero Trust, including continuous verification, least privilege access, and granular control.
Building a Zero Trust environment with Cloudflare: We walk you through a step-by-step guide on setting up user authentication, access control, device enrollment, and internal application exposure - all through Cloudflare's platform.
Enhancing security with Zero Trust policies: We demonstrate how to create granular access policies based on user identity, device posture, and network location.
Integrating Microsoft Entra ID with Cloudflare Zero Trust: Learn how to seamlessly integrate your existing identity provider for user authentication.
Whether you're a security professional or just starting your cybersecurity journey, this video can help you:
Understand the benefits of Zero Trust security.
Gain practical knowledge on implementing Zero Trust with Cloudflare.
Enhance your organization's security posture and protect sensitive data.
Plus:
We explore additional features like WARP session identity for streamlined authentication.
We provide clear explanations and demonstrations throughout the video.
Ready to build a fortress around your network? Watch this video and learn how to implement a robust Zero Trust security model with Cloudflare!
P.S. Don't forget to like, subscribe, and leave a comment below if you have any questions!
00:00 Introduction
01:09 Traditional networking model
03:18 What is the issue here?
04:22 What could this look like with Zero Trust?
06:28 Enhancing security
07:49 Further enhancing security
09:44 WARP session identity
10:34 Zero Trust
12:21 How Zero Trust works?
14:38 Integrating Microsoft Entra ID with Cloudflare Zero Trust
17:41 Setting Up Group Mapping
19:54 Adding Devices to Zero Trust
23:52 Exposing Internal Applications via Cloudflare Network
27:07 Access policies
28:57 Additional access policies
Here's what you'll learn:
The limitations of traditional network security: We expose the weaknesses of relying solely on implicit trust based on location and VPNs.
The Zero Trust approach explained: Discover the core principles of Zero Trust, including continuous verification, least privilege access, and granular control.
Building a Zero Trust environment with Cloudflare: We walk you through a step-by-step guide on setting up user authentication, access control, device enrollment, and internal application exposure - all through Cloudflare's platform.
Enhancing security with Zero Trust policies: We demonstrate how to create granular access policies based on user identity, device posture, and network location.
Integrating Microsoft Entra ID with Cloudflare Zero Trust: Learn how to seamlessly integrate your existing identity provider for user authentication.
Whether you're a security professional or just starting your cybersecurity journey, this video can help you:
Understand the benefits of Zero Trust security.
Gain practical knowledge on implementing Zero Trust with Cloudflare.
Enhance your organization's security posture and protect sensitive data.
Plus:
We explore additional features like WARP session identity for streamlined authentication.
We provide clear explanations and demonstrations throughout the video.
Ready to build a fortress around your network? Watch this video and learn how to implement a robust Zero Trust security model with Cloudflare!
P.S. Don't forget to like, subscribe, and leave a comment below if you have any questions!
00:00 Introduction
01:09 Traditional networking model
03:18 What is the issue here?
04:22 What could this look like with Zero Trust?
06:28 Enhancing security
07:49 Further enhancing security
09:44 WARP session identity
10:34 Zero Trust
12:21 How Zero Trust works?
14:38 Integrating Microsoft Entra ID with Cloudflare Zero Trust
17:41 Setting Up Group Mapping
19:54 Adding Devices to Zero Trust
23:52 Exposing Internal Applications via Cloudflare Network
27:07 Access policies
28:57 Additional access policies
Переглядів: 512
Відео
From Zero to Hero Build a Super Secure VPN Exit Node in 2024 (Cloudflare MASQUE)
Переглядів 1,3 тис.14 днів тому
In this video, I’ll show you how to set up a secure, private browsing connection using Cloudflare WARP and the MASQUE protocol, combined with a SOCKS5 proxy on a custom exit node. This setup is perfect for anyone needing a reliable, stealthy connection-ideal for public Wi-Fi or travel situations where typical VPNs might get blocked. With the MASQUE protocol, your traffic appears as regular HTTP...
Cloudflare WARP Complete Guide (2024 Update) - Installation, Config, & Site-to-Site Setup
Переглядів 1,7 тис.21 день тому
🚀 Cloudflare WARP Complete Guide (2024 Update) - Installation, Configuration, and Site-to-Site Setup 🚀 In this updated video, we dive deep into Cloudflare WARP - from installing and configuring it on your devices to setting up advanced peer-to-peer and site-to-site connections. Whether you're new to WARP or looking to update your knowledge with the latest features, this guide covers everything ...
Networking Tools - Part #3 (nping)
Переглядів 1,2 тис.Місяць тому
In this video, we dive into the powerful capabilities of Nping, a versatile network diagnostic tool from the Nmap suite. We'll explore how to leverage Nping in both ICMP and TCP modes to test connectivity and scan networks. You’ll learn about half-open scanning and TCP SYN pings to reveal network latency and reachability while minimizing detection. Whether you’re troubleshooting networks, testi...
Exposing Internal Services with FRP (Fast Reverse Proxy) | Complete Tutorial
Переглядів 2 тис.Місяць тому
In this video, we dive deep into FRP (Fast Reverse Proxy), a powerful tool for exposing internal services to the internet. Whether you're working behind NAT, or a firewall, FRP allows you to easily access your internal network from anywhere. Content: 00:00 Introduction 00:40 Basic FRP example 06:18 Tunnel encryption 07:29 Encryption impact on performance 08:21 Tunnel compression 09:33 Load bala...
Networking Tools - Part #2 (iperf3)
Переглядів 1,3 тис.Місяць тому
Welcome to the second video in my Networking Tools series! In this chapter, we dive deep into iperf3, an essential tool for testing TCP and UDP network performance. If you're looking to understand how to measure bandwidth, throughput, latency, and more, this video will cover it all. We'll explore: - How to perform basic iperf3 tests (upload, download, and two-directional traffic) - Asymmetrical...
Networking Tools - Part #1 (fping, gping, mtr, trippy)
Переглядів 1,1 тис.2 місяці тому
Welcome to the first part of our Networking Tools series! In this video, we introduce four essential tools for diagnosing and troubleshooting network issues: fping, gping, MTR, and Trippy. Whether you're dealing with latency, packet loss, or just want to analyze your network routes, these tools are a must-have for anyone in IT or networking. Here’s what you’ll learn in this video: fping: How to...
GTM: Load Balancing Traffic Between Multiple World Locations (Azure Traffic Manager)
Переглядів 3432 місяці тому
In today’s video, we’re diving into GTM technology using Azure Traffic Manager-a powerful tool that helps you manage your application’s traffic across different regions. Whether you're looking to improve performance, ensure high availability, or balance traffic intelligently, Azure Traffic Manager has you covered. We’ll explore the different routing methods, how to set up traffic management pro...
Calico Network Policies: Beginners guide
Переглядів 4842 місяці тому
Calico Network Policy is a powerful tool for Kubernetes that enables fine-grained control over network traffic. It helps secure your applications by defining rules to allow or deny traffic based on various criteria such as namespaces, labels, and IP addresses. With Calico, you can ensure your network is secure, compliant, and efficient. Whether you're managing a simple application or a complex ...
Linux IP Routing Basics: Routes, Tables, and Policy-Based Routing Explained
Переглядів 4,3 тис.3 місяці тому
Welcome back to the channel! In this video, we’re diving into the fascinating world of Linux IP routing. If you're interested in understanding how network traffic is directed on a Linux system, you're in the right place! In this episode, I’ll cover the foundational concepts of IP routing, including: - Routes: What they are and how they work. - Route Scopes: Understanding the different levels of...
How to Set Up a Site-to-Site VPN with Tailscale | Secure and Simplified Networking
Переглядів 3,1 тис.3 місяці тому
🚀 In this video, I'll show you how to set up a Site-to-Site VPN using Tailscale! 🚀 Are you looking to securely connect multiple networks without the hassle of complex VPN configurations? Tailscale has you covered! Tailscale is a modern VPN solution that leverages the power of WireGuard, making it easy to create secure, private networks with just a few clicks. In this tutorial, you'll learn: 📌 W...
Building a Fully Routed Kubernetes Cluster with Calico CNI | Part 2: Load Balancing with MetalLB
Переглядів 1 тис.3 місяці тому
Welcome back to our Kubernetes series! In this second part, we dive into setting up load balancing with MetalLB in our fully routed Kubernetes cluster using Calico CNI. Follow along as we configure and test MetalLB, ensuring efficient and reliable load balancing for your cluster. Chapters: 00:00 Introduction 00:47 Where we left off 02:28 Why do we need a load balancer? 04:39 Installing MetalLB ...
MINIO 101: Comprehensive S3 Object Storage Guide for Beginners
Переглядів 1,2 тис.4 місяці тому
Welcome to our comprehensive tutorial on MINIO! In this video, we'll walk you through everything you need to know about using MINIO, from installation to advanced operations. Whether you're a beginner or an experienced user, this guide will help you make the most out of MINIO. Chapters: 00:00 Introduction 00:44 What MINIO is? 02:13 Installing MINIO 05:05 Connecting to the service with MINIO Cli...
How to Set Up a WireGuard Exit Node with WireGuard Easy GUI: Step-by-Step Guide
Переглядів 1,3 тис.4 місяці тому
Welcome to our channel! In this video, we'll guide you through the process of setting up a WireGuard exit node using the WG-EASY GUI. Whether you're a beginner or an experienced user, our step-by-step instructions will help you get your WireGuard exit node up and running smoothly. 📋 Video Chapters: 00:00 Introduction 01:12 What is needed 02:18 Installing Docker 03:25 Docker compose configuratio...
Building a Fully Routed Kubernetes Cluster with Calico CNI | Part 1: Cluster Setup & BGP Routing
Переглядів 1,8 тис.4 місяці тому
Hello, networking enthusiasts! Welcome to the first part of our in-depth series on building a fully routed Kubernetes cluster using Calico CNI. In this video, we'll walk you through the process of setting up a robust Kubernetes cluster and peering it with an external router to expose Kubernetes workloads. What You'll Learn: - How to set up a fully routed Kubernetes cluster - The fundamentals of...
Secure Web SSH: OAuth, Tunnels & Short-Lived Certs & Google Identity
Переглядів 1,4 тис.5 місяців тому
Secure Web SSH: OAuth, Tunnels & Short-Lived Certs & Google Identity
Site-to-Site VPN with Cloudflare WARP
Переглядів 9 тис.5 місяців тому
Site-to-Site VPN with Cloudflare WARP
Self-Host Your Entire ZeroTier Network (Root Server & Controller)
Переглядів 4,2 тис.5 місяців тому
Self-Host Your Entire ZeroTier Network (Root Server & Controller)
Beginners Guide to ZeroTier Full Tunnel Mode (ZeroTier Exit Node)
Переглядів 3,4 тис.6 місяців тому
Beginners Guide to ZeroTier Full Tunnel Mode (ZeroTier Exit Node)
Demystifying GCP Networking: Part 1: VPCs and Subnets
Переглядів 1536 місяців тому
Demystifying GCP Networking: Part 1: VPCs and Subnets
Deploy a Dual Stack Kubernetes Cluster (v1.30) on Ubuntu 24.04 LTS!
Переглядів 1,4 тис.6 місяців тому
Deploy a Dual Stack Kubernetes Cluster (v1.30) on Ubuntu 24.04 LTS!
DNS Explained: Demystifying Domain Names, Resolvers & Secure Lookups (DoT & DNSSEC)
Переглядів 5256 місяців тому
DNS Explained: Demystifying Domain Names, Resolvers & Secure Lookups (DoT & DNSSEC)
Linux Security for Beginners #1: Passwords (quality, history, aging, locking)
Переглядів 3037 місяців тому
Linux Security for Beginners #1: Passwords (quality, history, aging, locking)
Zerotier Explained: The Future of VPNs?
Переглядів 1,8 тис.7 місяців тому
Zerotier Explained: The Future of VPNs?
Learn IPv6 Now! Part 2: Dual Stack, DNS, Subnetting, DHCPv6 Prefix Delegation
Переглядів 4647 місяців тому
Learn IPv6 Now! Part 2: Dual Stack, DNS, Subnetting, DHCPv6 Prefix Delegation
Cloudflare: Securely Access Your Docker Application Without a Public IP
Переглядів 8788 місяців тому
Cloudflare: Securely Access Your Docker Application Without a Public IP
Learn IPv6 Now! Part 1: Addresses, NDP, SLAAC, EUI-64
Переглядів 4498 місяців тому
Learn IPv6 Now! Part 1: Addresses, NDP, SLAAC, EUI-64
Kubernetes: Service Types, External Exposure & MetalLB Load Balancing [Dual Stack Bare Metal K8s]
Переглядів 2,8 тис.8 місяців тому
Kubernetes: Service Types, External Exposure & MetalLB Load Balancing [Dual Stack Bare Metal K8s]
MikroTik RouterOS 7: Using Containers for Pi-Hole (Step-by-Step Guide)
Переглядів 3 тис.8 місяців тому
MikroTik RouterOS 7: Using Containers for Pi-Hole (Step-by-Step Guide)
Super content. Why the face editting though?
Please make a video about vrf in linux!
Hi! Yes it's on my todo list. Will do!
Może udałoby się nagrać więcej materiału o IPv6. Np. coś o tym jak zrobić sieć lokalną IPv6 only z dostępem do internetu IPv4 i IPv6. Chodzi mi o NAT64. Może coś o prefix delegation u polskich operatorów (choć to już takie mało uniwersalne dla innych odbiorców ze świata).
Nawet mam coś takiego rozgrzebane tylko muszę dokończyć (tunnelbroker.net/ oraz www.tunnelbroker.ch/). Tworzenie tunelu, konfiguracja sieci, itd. Nie wiem tylko czy pokazać to dla Linuxa czy dla Mikrotika, itd. bo każdy ma inny router.
next videos: Headscale & Tailscale network. :)
Will do!
Agree !
++
Thanks!
Hi Filp. Any idea how to pass real ip of client to server ? Case: use mail server behind FRP. Thanks for answer. regards
I need to check but I believe it's not possible. For sure it can pass IP in X-Forwarded-For but that's HTTP. Will get back to you.
@@LinuxCloudHacks thx
Great insights 😊 1. Doesn't the free Cloudflare account restrict bandwidth, as, even with the server based Dante Socks5 proxy, you still need the Cloudflare network with the WARP endpoints? 2. To avoid static IP, can't we just use free DDNS to access the VPN server? 3. What is a Masque VPN? My understanding is that Masque ( beta) is just setting up http3/quic within a proxy like Caddy or nginx, that can obfuscate VON traffic from DPI scans.
Thanks! 1. I don't believe they restrict bandwidth in free tier but it's a shared infrastructure so no SLA. Moreover in free tier they don't offer you all of their POPs. But from my experience is pretty solid. BTW I did play with routing only (no socks5) but it's a pain to setup. 2. Sure you can do DDNS but folks don't always have access to the router (sometimes it's owned by ISP). 3. Not exactly. As per documentation it's an extension to http3 that allows you to tunnel tcp/udp/ip. You can look at FRC9484 for more information or Cloudflare docs.
+1 THanks!
Welcome!
O meu é uma RB3011 e NÃO estou conseguindo instalar o pi-hole nela ela dá erro para baixar do docker hub eu não consegui usar esse script ou não sei usar ele.
What is the exact command you are running and what error are you getting?
@@LinuxCloudHacks /container/add file=usb1/images/pihole.tar envlist=pihole interface=veth1 logging=yes mounts=etc_pihole,dnsmasq_pihole root-dir=usb1/pihole start-on-boot=yes Ele começa a descompactar e dá erro.
@@LinuxCloudHacks /container/print 0 name="85fec326-98a6-420b-9399-c914a059bf84" tag="pihole/pihole:latest" os="" arch="" interface=veth1 envlist="pihole_envs" root-dir=usb1-part1/pihole mounts=etc_pihole,dnsmasq_pihole status=error
How to use Quic procol between client and server? I wanted to have socks5 over that. Is it possible?
Hi! To setup a QUIC tunnel between Server and Client please do - on the server: bindPort = 7000 quicBindPort = 7000 On the client: serverAddr = "a.b.c.d" serverPort = 7000 transport.protocol = "quic" Then you define reguar [[proxies]] section. Not sure what are you trying to do but I have a video on building a quic/masque tunnel for socks5 here ua-cam.com/video/oiqc5xbNmks/v-deo.htmlsi=JN42i2nWdynBObJq
Köszönjük!
Köszönöm szépen! Kérem, tudassa velem, ha van ötlete a Kubernetes videóhoz.
Dude do another video where you mention how some retarded gov like india and UAE has now banned cloudflare wrap
I'm planning to do a video on ShadowSocks/V2Ray/Xray etc.
amazing tutorial my friends, keep the good content going. thank you.
Thank you! Will do!
headscale please video
Hi! It's on my todo list! Cheers.
Is this feature similar to Netbird or Tailscale?
Hi! At first sight they may look similar (as both use Wireguard) but they use different concept. Tailscale/Netbird is a mesh vpn - it tries to establish a direct connection between the sites using UDP hole-punching vs WARP connects to the nearest Cloudflare datacenter and routes the traffic via Cloudflare infrastructure (like a hub and spoke). If Tailscale/Netbird is unable to perform hole-punching it will relay the traffic through one of the relay servers (that's usually slower). Cloudflare on the other hand will always work with the same performance as the connection is outgoing from the client to the Cloudflare datacenter. Moreover once you connect to Cloudflare your Internet traffic will go out via their gateways (you'll have a public IP from Cloudflare's network). WARP also has this concept of ZeroTrust and allows you to perform network, DNS and HTTP filtering, AV scanning, SSO, protection of applications etc. It can also support MASQUE VPN that is harder to detect and block vs Wireguard (as it uses HTTP/QUIC). By no means I'm trying to discourage Tailscale/Netbird as those are fantastic products, where you can setup exit node or site to site VPN in 3 minutes. I'm just saying those two are similar but at the end of the day have different concept/assumptions or how to call it :) When you have few moments please look at this ua-cam.com/video/6z2yvDPc-og/v-deo.htmlsi=KUwkmKXOYpW2Kl0J
awlsome video
Thank you!
Awesome video!!!!!
Thanks for the visit!
i just redirected 1M watchers to u. let's check how g00gle works ))
Appreciate it!
Tak Polskie wersje byłyby super
Myślałem nad tym, ale na razie brak czasu :(
thank you for this video! I have two ideas, the first one I would like to learn more about how to assign access to different destinations like ips of the infrastructure connected to the cloudflare network via warp tunnel to different user group like dev team, accountants team, and others. Another thing that I want to learn is how to add a certificate to a windows pc where there is a plex server so Cloudflare allows traffic to it. I have access to the server, I can ping it, but I couldn't manage to set the certificate into Plex and because of that, Cloudflare is blocking the access to that ip:32400/web/index.html
Hi! Both are great ideas and I'll work on both videos. I'm working on Zero Trust model already where different groups/users have access to different things + Google Authentication to protect apps. As far exposing PLEX to the Internet via CloudflareD, please watch my video ua-cam.com/video/2RF7hTSYU24/v-deo.htmlsi=JzEQrCJkjb9_1cIF You need to set PLEX to use HTTP only and then in the Cloudflare SSL/TLS options select Encryption Mode = Flexible.
Please check my latest video - it shows how to use groups ua-cam.com/video/7wO-qbMo1nw/v-deo.htmlsi=ECVy-LwX8r0MSYl5
great video, What is the terminal used in this video?
Hi, I'm using Kitty and also sometimes Alacritty. It's more about terminal multiplexer. I'm using TMUX. Here's a video on how to set it up ua-cam.com/video/IefbabgRpSg/v-deo.html and ua-cam.com/video/h-kitk6enyw/v-deo.htmlsi=0TCq_BlfE09of8H4
Tailscale. 😎
Hi! At first sight they may look similar (as both use Wireguard) but they use different concept. Tailscale is a mesh vpn - it tries to establish a direct connection between the sites using UDP hole-punching vs WARP connects to the nearest Cloudflare datacenter and routes the traffic via Cloudflare infrastructure (like a hub and spoke). If Tailscale is unable to perform hole-punching it will relay the traffic through one of the DERP servers (that's usually slower). Cloudflare on the other hand will always work as the connection is outgoing from the client to the Cloudflare datacenter. Moreover once you connect to Cloudflare your Internet traffic will go out via their gateways (you'll have a public IP from Cloudflare's network). WARP also has this concept of ZeroTrust and allows you to perform network, DNS and HTTP filtering, AV scanning, SSO, protection of applications etc. It can also support MASQUE VPN that is harder to detect and block vs Wireguard. By no means I'm trying to discourage Tailscale as it's a fantastic product, where you can setup exit node or site to site VPN in 3 minutes. I'm just saying those two are similar but at the end of the day have different concept/assumptions or how to call it :) When you have few moments please look at this ua-cam.com/video/6z2yvDPc-og/v-deo.htmlsi=KUwkmKXOYpW2Kl0J and ua-cam.com/video/oiqc5xbNmks/v-deo.htmlsi=Vjm33As_dHekLvSz
Love the content and delivery, tyvm
Thank you so much! our support really means a lot and helps me keep creating quality content.
Świetne filmy robisz. Polska wersja byłaby super (lub chociaż polskie napisy). Kilka razy trafiłem na Twój kanał, ale zawsze mi się wydawało, że to kolejna indyjska produkcja, która zwykle jest niskiej jakości i porusza podstawowe tematy. Nigdy w to głębiej nie wchodziłem, aż zacząłem oglądać materiał o NFT. Dla mnie bomba.
Dzięki! Probuje jakoś rozkręcić kanał, ale na razie marnie mi idzie :) Pomyślę nad polską wersją (pewnie nowy kanał) w przyszłości.
@@LinuxCloudHacks Tematy raczej trudne więc i popularność chyba nie będzie wielka. Kiedyś były filmy OneMarcFifty ale się skończyły (te były jakby bardziej na moim poziomie). Jest Apalard's adventures, ale męczę się tam z angielskim-amerykańskim. W sumie z wartych uwagi jest jeszcze tylko Jim's garage i tyle. Reszta to mniej lub bardziej reklamy produktów. Trzymam kciuki bo robisz świetną robotę. Im więcej oglądam tym bardziej jestem pod wrażeniem. Kolejny odcinek o ipv6 byłby dobry. Ten apalarda jest dla mnie za szybki.
Kanały o których wspomniałeś, super, ale bardziej nastawione na budowanie homelabu, domowego firewalla etc. Ja dalej szukam swojej niszy :) ale celuje w przecięcie szerokopojętej sieci oraz linuxa, cloudu, serwisów, etc. itp. bardziej od strony profesjonalnej a nie homelab. Native speakerzy mają dużo łatwiej by się przebić, a też mechanizm promowania filmów przez YT jest jaki jest :) No nic. Walczymy :)
Hi Filip. Do you plan to tell about Xray/V2Ray Vless/Reality VPN configurations?
Hi! Yes, it's on my todo list so please stay tuned!
Thank you very much well explian easy to understand, but could you explain how to make bridging in windows 10 so i can reach devices in the same LAN
Hi! So for example you have one Windows PC is the office and one at home and would like to access all office network from the home PC?
Would you kindly make a video of Cloudflare's Remote Browser Isolation (RBI)? Thank you in advance.
Hi! I'll need to reach out to Cloudflare as this feature is non-free. We'll see if they allow me to test that in a youtube video.
Thank You Sir ❤ your content 🙏 👏 🙌 lot of learning
Glad to hear that! Thanks!
++
Thanks!
Thanks!
Glad you liked it!
Very, very comprehensive content, sir! Thank you.
Glad you enjoyed it!
Thanks!
Welcome!
Nice video! But as always this example just shows basic HTTP traffic. I wonder if the HA setup would also work with long living TCP streams. I know that haproxy can proxy TCP too but I wonder if the socket of the client will still be intact in case one node/process goes down.
Hi! Please look at 'lvs_sync_daemon' option of keepalived. It allows you to synchronize connection states between primary and backup load balancers (assuming you are doing IPVS). I'll try to find some time to make a video about it. In the meantime you can look at my IPVS video ua-cam.com/video/DzCBp2CXsYQ/v-deo.htmlsi=ss-Qvwdi7objdk9_
Great video and Explanation , I have one query instead of routing node to node specific bgp peer can't we do that also via router only so we can have better scalability
Hi! Thanks! To your question - sure we can use a BGP route reflector but I just wanted to show the most basic setup.
Glad that I turned to UA-cam & found this video. Cloudflare documentation is a nightmare & the climax of this video is all I wanted. Many Thanks again! Highly appreciated. Have you got these short-lived SSH certificates working from terminal as well? Their docs say it's supported but I am still struggling to get that working. No errors on Cloudflared, warp-cli & on target server apart from `origin auth failed`.
Thanks! Let me play with it and get back to you.
Do I need a Linux OS to do the same thing whose network packet forwarding to other networks is allowed if I want to enable ssh from a warp tunnel agent to computers that belong to another network?
Hi! Not sure if I get the question right. You need Linux with packet forwarding enabled if you want your WARP agent to act as a gateway between the WARP tunnel and the target network. If you are only the client then it does not have to be Linux. For example: Windows WARP agent -------------> Linux WARP agent ----------> Private Network
@@LinuxCloudHacks I successfully configured warp tunnel and confirmed I can ssh from my Windows computer with WARP client installed to WARP agent server by designating IP address assigned by Cloudflare WARP as ssh destination address! I appreciate your help
Great!
Excellent video. Greetings from Paraguay I will do a performance comparison to see if I replace my current TAILSCALE
Thanks! Tailscale is using WireGuard under the hood so if you establish direct connection (not via relay) it will always be faster than ZeroTier.
thank you for the video! Can you do the gateway video you promised?
Hi! Thanks! You mean enforcing network policies using Cloudflare Gateway? Or there's something else you'd be interested in?
@@LinuxCloudHacks I am enjoying your videos a lot. I am in the progress of ingressing a tailscale connection to headscale via a Cloudflare tunnel, because in Cloudflare I can have only 50 devices. My plan is to use tailscale for my team, and warp for the clients, but I'd like that the exit of the local vlan would be Cloudflare, so both the team and clients could have the same exit. I am planning to use as many resources from Cloudflare as possible becasue thanks to you I discovered the new stuff. When you mentioned the Zero Trust Gateway in the previous video, that put me to research but I think I still have pieces missing, anyway thanks to this last one I am building the network. Basically I am planning to set the gateway of my network to Zero Trust using the Warp client. Thank you again!
Hi. I'm planning to do a video on how to implement a ZeroTrust model as it's not only about accessing the internet but also connecting to internal servers, protecting applications etc. so please stay tuned. As far as 50 users limit - it's only for the free version. Higher plans don't have that limit. This is a popular business model :) you start using a product, you like it, then you company grows and all of a sudden you either need to change to something else or pay. And usually you pay :)
@@LinuxCloudHacks wow that is amazing. We actually use several cloudflare warp tunnel containers in our infra, one for each client, so each one of them can use the 50 devices limit, and we have one for our own access, plus other tools like the nginx proxy manager to allow access only to that client needs. That part that you just mentioned would be amazing to fill some doubts that we still have, how to protect applications for instance for different departments like accounting, dev, and others :) thank you!!!!
Thanks!, awesome explanation !
You are welcome!
Seriously I have struggled with this concept. You cleared so much up for me! Really appreciate your videos.
Happy to help!
Thank you Philip for such useful and well made video.I'm waiting for the more in depth graphana+telegraph+influx db iperf data video-tutorial...thank you again and continue in thia direction..best regards from italy.Paul.
Thank you! Yes, it's on my TODO list. I'm planning to show Grafana Cloud/Loki among few other things.
It was nice! You're rock.
Thank you so much! I'm glad you enjoyed it!
Your videos are amazing!
Thank you so much!
The video I wished for! Perfect timing 👍
Hope you enjoyed it!
Great!
Thanks! Glad you like it!
Hi, thanks pretty clear! Made them all and it works! Just a question, how can i update Pihole once it is on a Mikrotik container? I've triead via SSH but it refuses the connection, i've tried from the Windows terminal or Winbox terminal but there is no way to make it happen? Any suggestion? I wouldn't like to make it from scrap just to update it....have no meaning....Thanks
Hi! Usually in container based environment you don't modify the container but destroy it and deploy an updated version. However if you'd like to get to the container shell please try logging in to your Mikrotik device, starting console and running "/container/shell 0" command? (or whatever number the container is - you can check the number with /container/print". Let me know if that works.
@@LinuxCloudHacks Hi! Thanks for your answer!!!! This is the print out about my container env: [Andrea74@MikroTik] > cont [Andrea74@MikroTik] /container> print 0 name="3ad77d62-75f4-437d-9817-6cd4ce6d1f09" tag="pihole/pihole:latest" os="linux" arch="arm" interface=pihole_VETH envlist="pihole_envs" root-dir=/usb1/pihole mounts=pihole,dnsmasq start-on-boot=yes status=running
@@LinuxCloudHacks [Andrea74@MikroTik] /container> shell 0 root@MikroTik:/# from this may i use the ssh commands?
@@LinuxCloudHacks [Andrea74@MikroTik] /container> shell 0 root@MikroTik:/# pihole -up Function not supported in Docker images everythink works but the -up command!!!! 😭😭😭
Unfortunately that is true. If you want to update container based installation you need to remove the container and deploy a new one (with newer version). Need to check if it's possible to do it in automated manner.
Thanks dude
Happy to help!
interesting! keep up the great works! is it possible to host email server behind that cloudflare tunnel?
Hello! Unfortunately it's not possible. Cloudflare WARP is primarily a VPN service that allows you to securely access Internet, apply policies, SSO, interconnect nodes or sites etc. There's yet another service called CloudflareD that allows you to expose services to the Internet but it's only for HTTP/HTTPS.
++
Thanks!
Everything worked except when trying to start the container. I am using arm64 mikrotik hAP ax^3 hardware running 7.16.1 (stable). I think pihole/arm64 may be broken or 7.16.1 is broken. docker pull --platform linux/arm64 pihole/pihole --> digest 0def896a596e8d45780b6359dbf82fc8c75ef05b97e095452e67a0a4ccc95377 pihole.tar md5sum --> 0214cb9ed0208009939bb26b95288670 from logging, system reports: item added by ssh:admin@192.168.88.11 (*2 = /container add envlist=pihole file=usb1/images/pihole.tar interface=veth1 logging=yes mounts=etc_pihole,dnsmasq_pihole root-dir=usb1/pihole) container reports: error: failed to extract was unable to import, container 1abb8e54-b73e-4c93-a3e9-09c50d2e790f
Come to find out the usb drive needs to be formatted with ext4. Works now - thanks 🙂
Glad you figured it out. And I'm sorry. Forgot to mention that Mikrotik only supports ex4, exfat and fat32.