Skip to content

Commit

Permalink
Embed inlets-cloud sshmux video
Browse files Browse the repository at this point in the history
Signed-off-by: Alex Ellis (OpenFaaS Ltd) <alexellis2@gmail.com>
  • Loading branch information
alexellis committed Oct 17, 2024
1 parent 29eb55c commit efaa7fc
Showing 1 changed file with 7 additions and 0 deletions.
7 changes: 7 additions & 0 deletions blog/_posts/2024-10-17-ssh-with-inlets-cloud.md
Original file line number Diff line number Diff line change
Expand Up @@ -180,10 +180,14 @@ The port override for `443` is not necessary since the .ssh/config file will han

You've now got a secure way to access any host on your network, without needing to host a tunnel server, or to set up a VPN. This is a great way to access your home network, or to provide support to friends and family.

**Adding extra hosts**

Any time you want to add or remove a host, you can do so via the inlets-cloud dashboard, by navigating to the "Tunnels" page and editing the list of domains. Then make sure you have an entry in your sshmux config file, and restart it with the new configuration.

Access is completely private, there is no way to decrypt the SSH traffic, and it gets passed directly on to your own machine inside your local network.

**IP filtering/allow list**

For taking things further, sshmux also supports an IP allow list, which will be available in inlets-cloud shortly, or which you can use already today with the self-hosted version of inlets-pro.

If the IP for your mobile hotspot was 35.202.222.154, you could write the following to restrict access to `nuc.example.com` to only yourself:
Expand All @@ -196,3 +200,6 @@ upstreams:
- 35.202.222.154
```
Watch a video walk-through of this tutorial:
{% include youtube.html id="ws3-VlL2884" %}

0 comments on commit efaa7fc

Please sign in to comment.