F5F Stay Refreshed Power Users Networks Setting up an internet connection for a home network... Ideal for enjoying Minecraft with children.

Setting up an internet connection for a home network... Ideal for enjoying Minecraft with children.

Setting up an internet connection for a home network... Ideal for enjoying Minecraft with children.

Pages (2): Previous 1 2
A
AutyThePheonix
Junior Member
12
12-02-2023, 10:58 PM
#11
I don’t want to set up a Minecraft server because it limits you to just one option. I like the freedom to explore other ideas. The more I research, the more I realize I should opt for a monthly subscription instead of committing to a single game. Yuck...
A
AutyThePheonix
12-02-2023, 10:58 PM #11

I don’t want to set up a Minecraft server because it limits you to just one option. I like the freedom to explore other ideas. The more I research, the more I realize I should opt for a monthly subscription instead of committing to a single game. Yuck...

D
darkly_Hunter
Junior Member
12
12-03-2023, 03:15 AM
#12
You may face slow UDP attacks that disrupt your network intermittently, making it vulnerable to further exploitation. Even with ample bandwidth for these packets to reach your firewall without overwhelming your switch, they can still overwhelm your defenses. Using a proxy server to mask your IP through DDoS scrubbing is advisable if you expect multiple users due to conflict. For example, an admin who believes they were unfairly demoted might launch a DDoS attack on the server. If your device lacks sufficient LAN power to handle packet processing, even minor attacks can cripple it. Hardware routers offer greater capacity and can endure IPv6 DOS assaults. Additionally, exposing certain ports can expose you to risks like smurf packets. With a correctly set firewall, specific threats can be reduced.
D
darkly_Hunter
12-03-2023, 03:15 AM #12

You may face slow UDP attacks that disrupt your network intermittently, making it vulnerable to further exploitation. Even with ample bandwidth for these packets to reach your firewall without overwhelming your switch, they can still overwhelm your defenses. Using a proxy server to mask your IP through DDoS scrubbing is advisable if you expect multiple users due to conflict. For example, an admin who believes they were unfairly demoted might launch a DDoS attack on the server. If your device lacks sufficient LAN power to handle packet processing, even minor attacks can cripple it. Hardware routers offer greater capacity and can endure IPv6 DOS assaults. Additionally, exposing certain ports can expose you to risks like smurf packets. With a correctly set firewall, specific threats can be reduced.

W
Wither01
Member
201
12-03-2023, 04:51 AM
#13
You can run PFSense on a vintage machine and configure an open VPN server there, directing traffic to your local network.
W
Wither01
12-03-2023, 04:51 AM #13

You can run PFSense on a vintage machine and configure an open VPN server there, directing traffic to your local network.

D
DREIKOVER
Junior Member
2
12-08-2023, 05:40 PM
#14
Various self-hosted VPN solutions are available depending on your budget. To keep your computer online only when necessary, consider using a 1GB Raspberry Pi 4 with full gigabit ports as your VPN gateway. Ensure it’s configured to block all traffic except for a specific account with a strong password or better yet, implement certificate-based authentication. Searching online provides detailed instructions, including how to forward ports—often using non-standard ports for added security through obscurity.
D
DREIKOVER
12-08-2023, 05:40 PM #14

Various self-hosted VPN solutions are available depending on your budget. To keep your computer online only when necessary, consider using a 1GB Raspberry Pi 4 with full gigabit ports as your VPN gateway. Ensure it’s configured to block all traffic except for a specific account with a strong password or better yet, implement certificate-based authentication. Searching online provides detailed instructions, including how to forward ports—often using non-standard ports for added security through obscurity.

S
spectroz
Junior Member
3
12-08-2023, 06:21 PM
#15
Rpis perform well, but their capability with heavy loads and real-time encryption remains uncertain. Expect significant challenges without robust cooling solutions.
S
spectroz
12-08-2023, 06:21 PM #15

Rpis perform well, but their capability with heavy loads and real-time encryption remains uncertain. Expect significant challenges without robust cooling solutions.

S
strelley13
Junior Member
3
12-09-2023, 12:33 AM
#16
It might not be optimized for full gigabit performance, but it should work well under typical conditions. The average speed seems around 200 Mbps, which is sufficient for Op’s requirements.
S
strelley13
12-09-2023, 12:33 AM #16

It might not be optimized for full gigabit performance, but it should work well under typical conditions. The average speed seems around 200 Mbps, which is sufficient for Op’s requirements.

T
Thumps209LV
Member
226
12-14-2023, 06:53 AM
#17
For the VPN I prefer is less than AES-256-GCM, though I’m curious about the typical performance and latency.
T
Thumps209LV
12-14-2023, 06:53 AM #17

For the VPN I prefer is less than AES-256-GCM, though I’m curious about the typical performance and latency.

N
NationIce
Junior Member
1
12-14-2023, 10:15 AM
#18
It seems the delay effect is minimal at best. For typical usage, it should match the upper limit. However, with just 50 or 100 Mbps upload speeds, it becomes largely unimportant.
N
NationIce
12-14-2023, 10:15 AM #18

It seems the delay effect is minimal at best. For typical usage, it should match the upper limit. However, with just 50 or 100 Mbps upload speeds, it becomes largely unimportant.

S
setupy
Junior Member
10
12-22-2023, 07:51 AM
#19
Have you tried this before? What requirements are there for maintaining cooling during long durations?
S
setupy
12-22-2023, 07:51 AM #19

Have you tried this before? What requirements are there for maintaining cooling during long durations?

S
Streiyn
Posting Freak
768
12-26-2023, 02:07 PM
#20
I own a unit with an active fan, which means it can vary in volume depending on the model. Adding to this, there are cases such as the flirc case that feature a metal body connecting directly to the CPU, serving as a passive cooling solution. I’m leaning toward that option more. The model I currently use remains quiet thanks to its fan, while another is extremely loud. It’s disappointing because they’re identical fans and cases. However, since I have servers at home, I can install this equipment when required. I mainly play with Pi boards, which are enjoyable to experiment with. Still, the Pi hole is essential, and with a 4GB Pi 4 you could integrate IDS/IPS systems if you have access to data (like via a span port). *more talking* Personally, I’m trying to set up my own SIEM at home using ELK. If I can achieve proper correlation, placing an IP ID before and after the router would be ideal. If I manage to configure an MX sandbox, it could monitor incoming emails. All I need is to ensure emails route correctly into O365. Security matters, but for a teenager it’s almost essential.
S
Streiyn
12-26-2023, 02:07 PM #20

I own a unit with an active fan, which means it can vary in volume depending on the model. Adding to this, there are cases such as the flirc case that feature a metal body connecting directly to the CPU, serving as a passive cooling solution. I’m leaning toward that option more. The model I currently use remains quiet thanks to its fan, while another is extremely loud. It’s disappointing because they’re identical fans and cases. However, since I have servers at home, I can install this equipment when required. I mainly play with Pi boards, which are enjoyable to experiment with. Still, the Pi hole is essential, and with a 4GB Pi 4 you could integrate IDS/IPS systems if you have access to data (like via a span port). *more talking* Personally, I’m trying to set up my own SIEM at home using ELK. If I can achieve proper correlation, placing an IP ID before and after the router would be ideal. If I manage to configure an MX sandbox, it could monitor incoming emails. All I need is to ensure emails route correctly into O365. Security matters, but for a teenager it’s almost essential.

Pages (2): Previous 1 2