VMware

Secure Cloudflare Tunnels with vLANs and an Internal

Secure Cloudflare Tunnels with vLANs and an Internal Firewall Before It’s Too Late!

#Secure #Cloudflare #Tunnels #vLANs #Internal

“Jim’s Garage”

Shoutout to @christianlempa

Cloudflare Tunnels are great, but they come at a cost. Cloudflare sees all of your data, and if you’re not careful you’ll only have a single layer of defence in your network. In this video I show you how to reintroduce some of those layers by segmenting your…

source

 

To see the full content, share this page by clicking one of the buttons below

Related Articles

31 Comments

  1. You're one of the few channels that has given me a better outlook on my homelab and how to make it all tick. Many content creators only scratch the surface, but you manage to go in depth and explain how this is all set up, why it should be set up, the pros and cons, and specifics like what rules you should be setting up in your firewall. Keep up the great work!!

  2. Would adding a user defined bridge network be just as secure? I have my cloudflare docker on a bridge network that only communicates with Traefik.

    All of my docker services have their own user defined bridge network that communicates with Traefik. The goal is that none of my services can be aware of the others and that all traffic must go through Traefik with crowdsec monitoring.

    Is there a flaw in my understanding of these bridge networks?

  3. Really interesting video! Seems like Cloudflare tunnel is not the solution I was hoping for.
    I just need the option to grant different specific external people access to very specific devices of my home network (with 2FA/passkey etc.) .
    Do you know of a solution that is halfway user friendly (as near to plug and play as possible)?

    Thanks a lot!

  4. Dude aewesome video. Iknow it’s lots of work but could you make a tutorial of implementing this on a casaos environment? I have one server with all my apps and I want to set another one to run firewall tunnels and monitoring. As I’m not a security professional I need more details on it lol.if you can point ,e to a tutorial or create one would be amazing

  5. When you say you're punchunig a hole in your home security, do you understand that no one has any security rather than anything standard included. And I don't even know if anything is included in macos by default

  6. Great tutorial! However at 02:38 you mentioned not getting the visitor IP through the tunnel, is this not still exposed via the Cf-Connecting-Ip HTTP header similar to when using a standard Cloudflare proxy without the tunnel?

  7. But the problem here is, what to do, where to start? I was also looking into Cloudflare, and thought it was safe. But now you put an extra layer on top of it. And you’re even having Traefik (I think it was?) also??
    I’m confused. What to do? Where to start? And end?!

  8. Really excellent job explaining. You can’t explain everything in one video and everyone is on a different part of the learning journey. You approach that challenge intentionally by adding brief explanations for each component and referencing other content for further explanation.

    Well done, sir.

  9. How would you set something similar on a cloud where you don't have the possibility to filter the traffic between devices (like hetzner)?
    Any way to achieve something similar with subnets?

  10. Hide secret information(token) from envs to secrets:
    conf.yml
    tunnel: 8…2
    credentials-file: /etc/cloudflared/token.json

    ingress:
    – hostname: someservice.example.com
    service: https://traefik
    – service: http_status:404

    token.json
    {
    "AccountTag": "8…d",
    "TunnelSecret": "Z…Vk",
    "TunnelID": "8c…02"
    }

    cloudflared tunnel token –cred-file ~/token.json 8c-tinnel-id-ca02

    and finally

    version: "3.8"

    services:
    cloudflared:
    image: cloudflare/cloudflared:latest
    command: tunnel –no-autoupdate –config /etc/cloudflared/config.yml run

  11. Very interesting video. Now I have to realize how setup this without docker, as I installed CF tunnel for a Jellyfin service hosted in my proxmox server. I wonder if proxmox firewall could also be used for this. 🤔

  12. I have an internal reverse proxy (traefik) that routes all of my internal hosts by name

    i.e:
    proxmox.local.home.lan
    docker.local.home.lan
    portainer.local.home.lan

    Which is great as I don't have to put in port numbers or anything and everything all the time is https even inside my network.

    Is it more secure to point my cloudflare tunnel at one of those?

    In other words I would like to set this up exactly as you have outlined here (great job by the way) but not go to the actual server just go to my interal proxy. Is this better? Does cloudflare still see my traffic this way?

  13. Nice idea, still all traffic going through cloudflare tunnel will also be readable by cloudflare. Cloudflare tunnels act as a man in the middle attack. The sub domain from the subnetwork might not be available to others but it's available to cloudflare.

  14. I too use an XG firewall, i have CF tunnel working with Nginx. Unfortunately when i put the tunnel on it own vlan the tunnel now report error TLS handshake timeout, cannot reach origin server. I have the firewall rule setup to allow traffic from the tunnel vlan to NPM vlan just like the video. I can ping my Nginx proxy from the tunnel vlan. Not sure why its not working when they are on separate vlan.

Leave a Reply