![]() Can I just omit installing OpenVPN + IPFW Killswitch and only install Transmission in a generic jail and route the traffic for transmission through the "upcoming" Pfsense VPN client or is this not the right approach? I noticed this guide: FreeNAS 11 Jails mentioned installing transmission together with OpenVPN + IPFW Killswitch. Might eventually route all my traffic through the VPN, not sure if this is a good idea though.Ībout "Transmission", I still need to setup a Transmission jail inside FreeNAS, but since i don't have any VPN setup atm I wanted to wait. I am not exactly sure what and what not to route through my "upcoming" VPN client yet, but was primarily thinking about: Plex, Nextcloud (When trying to access from a remote location) & Transmission (Internally while downloading) I have read a few topics about DIY Pfsense router builds (which is definitely is an option), but feel like the: Qotom Q355G4 will be able to do everything I require for a decent price and with the ease of just installing Pfsense and having a compact system. I know about the possibility to install Pfsense in a VM on my NAS, but feel more secure seperating my VPN / Firewall from my files system a.k.a NAS. Want to be able to run the latest Pfsense version, as well as being future proof for atleast a couple of yearsįirst off i have to select what hardware to use.Setup multiple VLans: Internal (FreeNAS), Family, Guests, etc.USB (for OS) : Sandisk Ultra Fit 16GB Zwart I have no experience using Pfsense whatsoever, so any advice is highly appreciated! My idea is to setup a secure VPN connection using Pfsense. Now I have my FreeNAS box pretty much setup, I want to be able to access it remotely in a secure manner.Ĭurrently I am running: Nextcloud, Plex, Plexpy, Sabnzbd, Sonarr, Radarr, Headphones, NzbHydra, Jackett & Organizr as generic jails. ![]()
0 Comments
Leave a Reply. |