On Monday 24 July 2006 22:26, Cody Nelson wrote:
Ok right now it is Remote PC's - {internet} - IPCop(firewall) - Server
My server is running several services, the only ones accesable outside are http and ssh. ssh is how I connect into my network remotely, and I use things like VNC, Squid, etc through that.
I don't want to remove the firewall. I just want another layer of security with out adding another machine that only does ssh.
Some how make it so my servers ssh is not open to the outside, because this is a server that has data I don't want to lose. Infact I would rather protect that than my PC.
Have a web/ssl VPN tunnel would be one way.(you would be in the network, but not on my server yet) or chroot/virtual machine is another.
Ahhh. OK, got you now. In that case then, either would work. It would make most sense to set up the VPN stuff on IPCop. (Don't ask, I don't know. I had to move away from IPCop before I wrestled with that little conundrum.) Then your remote machine will have an interface on your home network. You could run a VPN server or ssh on a virtual machine on your server, but any issues with the firewall, server or virtual machine would knock out your access. Better to set up the IPCop VPN. Then you only have one machine to worry about, and that is very specialized and less likely to have issues. -- Steve Boddy -- Check the headers for your unsubscription address For additional commands send e-mail to suse-linux-e-help@suse.com Also check the archives at http://lists.suse.com Please read the FAQs: suse-linux-e-faq@suse.com