[arm-allstar] ASL behind CGNAT.

Carl Swanson cswa20026 at gmail.com
Tue Dec 20 09:14:15 EST 2022


Hive mind,

What is the general consensus for exposing nodes that sit behind CGNAT?
Yeah, I know "getting a real IP address" is the proper option, but what has
the experimenter in you used that worked well and was persistent?

I'ver looked at VPN solutions, but most of them will only expose HTTP/HTTPS
on port 80/443, assuming you're using it for streaming whatever.

Am I really looking for a SOCKS5 proxy?

I'm experimenting with a Cloudflare tunnel right now to see if I can get
that to work, but the initial results aren't too promising (or I'm just too
ham handed with the config)...

What say y'all?

73,

Carl, K6CRS
_____________________________________________
Carl Swanson
cswa20026 at gmail.com


More information about the ARM-allstar mailing list