Technical

Zero-Trust Gateway

Cloud-Hybrid Mesh Architecture

I moved the "Front Door" of my infrastructure to a remote VPS to ensure my physical hardware has zero public footprint. By decoupling the WAN edge from the on-premise stack, I created a "Silent Perimeter" where services are globally accessible but the home IP remains completely hidden.

Executive Summary

Overview

Cloud Bunker: Deployed Pangolin on a remote VPS to act as the hardened ingress point. All public traffic hits the VPS, not the home network.

NetBird Mesh: Established an encrypted P2P WireGuard mesh between the VPS and on-premise hardware—creating a private lane invisible to the public WAN.

"Drop All" Policy: The home firewall is configured to reject all incoming WAN traffic, accepting requests only via the authenticated NetBird interface.

Why I Built This

The Challenge: Fighting Data Entropy

Standard home-hosting (Nginx + Port Forwarding) is a security liability—exposing a home IP, enabling lateral movement, and constantly fighting CGNAT restrictions.

Public IP Exposure

Broadcasting a home IP on ports 80/443 invites constant bot-scanning and DDoS risks. Standard home-hosting is a security liability, not a feature.

Lateral Movement Risk

If a standard reverse proxy is compromised, the attacker is already inside your local network. There is no perimeter to fall back on.

CGNAT Hurdles

Traditional port forwarding is often blocked or throttled by ISPs at the carrier-grade NAT layer, making reliable remote access a constant nightmare.

Architectural Win

The Solution: Non-Destructive Virtualization

Re-engineered the network stack with a VPS-to-Mesh pipeline: a cloud edge for public ingress, an encrypted P2P tunnel for internal routing, and a "Drop All" firewall for the home perimeter.

The Cloud Bunker

Deployed Pangolin on a remote VPS to act as the hardened, public-facing ingress. All external traffic terminates at the VPS—my home hardware never appears on the public internet.

The NetBird Tunnel

Established a P2P WireGuard mesh using NetBird. This creates an encrypted "private lane" between the VPS and on-premise hardware, bypassing CGNAT entirely.

The "Drop All" Policy

The home firewall is configured to drop all incoming WAN traffic. It only accepts requests arriving through the authenticated NetBird interface—total lateral movement prevention.

Zero open ports on the local network. Zero home IP exposure. Full global accessibility with identity-aware routing enforced at the VPS level before traffic ever reaches the tunnel.