<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cloud &#8211; AbsTechServices.co.uk</title>
	<atom:link href="https://web.abstechservices.co.uk/category/cloud/feed/" rel="self" type="application/rss+xml" />
	<link>https://web.abstechservices.co.uk</link>
	<description>IT Support</description>
	<lastBuildDate>Fri, 05 Sep 2025 13:16:02 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://web.abstechservices.co.uk/wp-content/uploads/2025/02/cropped-AbsTechIconLarge-32x32.png</url>
	<title>Cloud &#8211; AbsTechServices.co.uk</title>
	<link>https://web.abstechservices.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Reduce your Network Exposure to the Internet</title>
		<link>https://web.abstechservices.co.uk/2025/09/05/how-to-reduce-your-network-exposure-to-the-internet/</link>
					<comments>https://web.abstechservices.co.uk/2025/09/05/how-to-reduce-your-network-exposure-to-the-internet/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 13:14:29 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Network]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=477</guid>

					<description><![CDATA[1. Twingate In testing a lot of the solutions today for remote access, I have settled on Twingate for secure remote access for home lab. It is really easy to setup and they have a free account which is great for home labs. With the free account, it is free for 5 users, you get [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p><strong>1. Twingate</strong></p>



<p>In testing a lot of the solutions today for remote access, I have settled on Twingate for secure remote access for home lab. It is really easy to setup and they have a free account which is great for home labs. With the free account, it is free for 5 users, you get the enterprise connectors, split tunneling, and conditional access policies.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="576" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-1024x576.webp" alt="" class="wp-image-482" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-1024x576.webp 1024w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-300x169.webp 300w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-768x432.webp 768w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-1536x864.webp 1536w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea.webp 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Some may not like the fact that it is a paid solution with a proprietary cloud dashboard, but so far, this has not been a show stopper for me. The cloud dashboard actually makes it easier to manage from wherever you are and since it is free as part of the solution, this is an added bonus in my opinion.</p>



<p>Also, since you can spin up the connectors that you run on-premises using Docker, Raspberry Pi or many other options that are available. I have these spread out through my network on different devices, including:</p>



<ul class="wp-block-list">
<li>Running a connector on my Synology NAS.</li>



<li>Running a connector on one of my Docker hosts.</li>



<li>I have one also running in a dedicated virtual machine.</li>



<li>A Raspberry Pi which I can plug into any network with an internet connection.</li>
</ul>



<p><strong>What is Twingate?</strong></p>



<p>Twingate is more of a hybrid of VPN and proxy technology. Compared to traditional VPN solutions, it has a much more modern approach to segmentation, access control, and other features like zero-trust.</p>



<p><strong>Reasons I use it:</strong></p>



<ul class="wp-block-list">
<li><strong>No open ports</strong> on my firewall – How? Well, the traffic is established <strong>from</strong> the connector so as long as it can egress, it can establish the tunnel</li>



<li>Granular access control per user and device</li>



<li>Easy to deploy on Docker, VMs, or Raspberry Pi</li>



<li>Works great with dynamic IPs or CGNAT</li>



<li>Built-in DNS resolution for internal services you may be hosting</li>
</ul>



<p>Even when I am traveling, I can hit any internal service in my home lab. This includes Proxmox dashboard, pfSense, Netdata, Gitea, Portainer, etc, just like I was local on the LAN.</p>



<p>Twingate also lets me separate services. I can restrict certain resources to certain devices or accounts. This is perfect if I want to allow read-only access to others (or segment off something sensitive).</p>



<p><strong>2. Tailscale mesh VPN built on Wireguard</strong></p>



<p>One of the other very popular choices in this space is Tailscale. It is a mesh VPN that is built on Wireguard. Home labbers love the solution because it is dead simple. You install the agent on your devices, sign into it, and when you do, everything is connected with each other. Each device that is on the Tailscale network gets a private IP address in the 100.x.x.x range. Using this IP address, between devices, you can talk to other devices directly.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="682" height="383" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image.png" alt="" class="wp-image-478" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image.png 682w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-300x168.png 300w" sizes="(max-width: 682px) 100vw, 682px" /></figure>



<p><strong>What makes Tailscale awesome to use:</strong></p>



<ul class="wp-block-list">
<li>No port forwarding is required</li>



<li>It works behind NAT, CGNAT, double NAT</li>



<li>It supports ACLs, MagicDNS, subnet routers</li>



<li>Free for up to 100 devices at this time</li>
</ul>



<p>Tailscale is great if you want an always-on private network where your laptop, phone, Raspberry Pi, and server all “see” each other like they’re on the same LAN.</p>



<p>I’ve used Tailscale to:</p>



<ul class="wp-block-list">
<li>Connect remote machines together without hassle</li>



<li>Connect to Home Assistant remotely</li>



<li>Access Proxmox web GUI on my phone</li>
</ul>



<p>It just works and the WireGuard-based performance is excellent. The main trade-off is that all devices must use Tailscale to communicate.</p>



<p><strong>3. Plain WireGuard</strong></p>



<p>For those that want a totally vanilla VPN solution, <a href="https://www.wireguard.com" target="_blank" rel="noreferrer noopener">WireGuard </a>is a great option. It’s the leanest, fastest VPN protocol out there. In fact many of the other solutions that we know and love are using Wireguard under the hood. And the great thing is that it is totally free and open-source.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="656" height="141" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-1.png" alt="" class="wp-image-479" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-1.png 656w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-1-300x64.png 300w" sizes="(max-width: 656px) 100vw, 656px" /></figure>



<p>You can use it to:</p>



<ul class="wp-block-list">
<li>Install it on Linux, routers, Docker containers</li>



<li>Set up point-to-site or site-to-site tunnels</li>



<li>Build roaming VPNs with static peers or dynamic endpoints</li>
</ul>



<p><strong>Why choose vanilla WireGuard:</strong></p>



<ul class="wp-block-list">
<li>Full control over the config</li>



<li>Zero cloud dependencies</li>



<li>Extremely fast and secure</li>



<li>Tiny footprint</li>
</ul>



<p>WireGuard is the most “bare metal” of the solutions here. If you’re comfortable editing config files and managing keys, it’s rock solid. <strong>WG-Easy </strong>is a solution I have written about before that makes configuring Wireguard much easier.</p>



<p><strong>4. Cloudflare Tunnel</strong></p>



<p>If you have a web service that you want to make available over the public Internet but you want to do this securely, Cloudflare tunnel is probably the right tool to use. Instead of opening ports like we have always done through the firewall, Cloudflare tunnels has you run a lightweight agent inside your home network (much like Twingate) that establishes a websockets over HTTPS tunnel outbound.</p>



<p>The cool thing is Cloudflare Tunnel can connect more than just HTTP web servers. It can connect&nbsp;SSH servers,&nbsp;remote desktops, and other protocols. Your “origin” servers serve the traffic through Cloudflare without being vulnerable to attacks that bypass Cloudflare. It then handles all the incoming requests made and routes them back to your internal network service.</p>



<p>If you want to make a service accessible via the public Internet, Cloudflare Tunnel is probably the right tool.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="694" height="433" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-2.png" alt="" class="wp-image-480" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-2.png 694w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-2-300x187.png 300w" sizes="(max-width: 694px) 100vw, 694px" /></figure>



<p><strong>Why it’s awesome to use:</strong></p>



<ul class="wp-block-list">
<li>No open ports, no NAT config</li>



<li>Built-in DDoS protection behind Cloudflare’s network</li>



<li>Automatic SSL with Let’s Encrypt</li>



<li>Supports access rules with Cloudflare Access</li>
</ul>



<p>With Cloudflare Tunnel, you can expose a service like Gitea, Portainer, or Grafana at https://myapp.mydomain.com, but only allow access to certain users or IPs. You can even integrate it with identity providers like GitHub or Google.</p>



<p>I’ve used this to:</p>



<ul class="wp-block-list">
<li>Share dashboards with others</li>



<li>Demos</li>



<li>Access services from mobile without VPN connections</li>



<li>Test webhooks or third-party integrations</li>
</ul>



<p>Just remember, with Cloudflare tunnels, this <strong>is still exposing your service to the public</strong>, but through a heavily protected proxy. It’s better than port-forwarding, but not as private as Twingate or Tailscale.</p>



<p><strong>Conclusion</strong></p>



<p>Exposing your home lab to the Internet is sometimes a sledgehammer approach that can work to get your services out there quickly, but from a security perspective, it is not worth it. I have self-hosted a few things that I have exposed directly to the Internet with firewall rules and other hardening, but given enough time and persistence, attackers can find a way to get into a machine, especially for dangerous services like RDP, etc.</p>



<p>Since there are great tools available out there for secure remote access for home lab, this is why I stopped exposing my home lab entirely. The services we have covered are what I think are some of the best and each has its strong suite. Whatever tool you choose, stop punching holes in your firewall and start using one of these modern solutions.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/09/05/how-to-reduce-your-network-exposure-to-the-internet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remote Monitoring and Management (RMM)</title>
		<link>https://web.abstechservices.co.uk/2025/07/09/remote-monitoring-and-management-rmm/</link>
					<comments>https://web.abstechservices.co.uk/2025/07/09/remote-monitoring-and-management-rmm/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Wed, 09 Jul 2025 20:55:04 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Remote]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=409</guid>

					<description><![CDATA[Advantages and Disadvantages In an increasingly digital and remote-first world, IT service providers and internal IT departments need efficient ways to monitor, maintain, and manage networks and endpoints. Remote Monitoring and Management (RMM) software has become an essential tool in achieving this, enabling IT professionals to proactively support systems without being physically present. RMM tools [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<h2 class="wp-block-heading"> Advantages and Disadvantages</h2>



<p>In an increasingly digital and remote-first world, IT service providers and internal IT departments need efficient ways to monitor, maintain, and manage networks and endpoints. Remote Monitoring and Management (RMM) software has become an essential tool in achieving this, enabling IT professionals to proactively support systems without being physically present.<br><br>RMM tools have become especially vital in the wake of hybrid and remote work models. They provide IT teams with the visibility and control necessary to support a distributed workforce, manage endpoints across different geographies, and maintain strong cybersecurity hygiene from a central console.</p>



<h2 class="wp-block-heading">What is RMM?</h2>



<p>RMM stands for Remote Monitoring and Management. It is a type of software designed to help IT professionals monitor client endpoints, networks, and computers remotely. With RMM tools, administrators can track performance, deploy updates, manage patches, automate maintenance tasks, and address issues before they impact users.<br><br>Commonly used by Managed Service Providers (MSPs), RMM platforms are also increasingly adopted by internal IT teams to improve efficiency and reduce downtime.<br><br>At its core, RMM software acts as the digital eyes and hands of IT professionals. It not only monitors the health and performance of systems but also provides the ability to apply patches, reboot machines, install software, and run scripts — all without interrupting the end-user experience. This makes it an indispensable tool for both reactive troubleshooting and proactive system health management.</p>



<h2 class="wp-block-heading">Advantages of RMM</h2>



<ul class="wp-block-list">
<li>Proactive Maintenance: RMM tools allow for continuous monitoring of systems, enabling issues to be detected and resolved before they cause significant disruption.</li>



<li>Increased Efficiency: Automation of tasks like software updates, patch management, and system scans saves time and reduces manual workload.</li>



<li>Remote Access and Support: Technicians can troubleshoot and resolve problems without needing to be on-site, speeding up resolution times.</li>



<li>Improved Security: RMM software helps ensure that devices are always updated and compliant with security standards, reducing vulnerability exposure.</li>



<li>Scalability: As businesses grow, RMM tools make it easier to manage a larger number of endpoints without a proportional increase in IT staff.</li>



<li>Cost Savings: Reduces the need for on-site visits, travel costs, and reactive fixes — leading to long-term savings.</li>
</ul>



<h2 class="wp-block-heading">Disadvantages of RMM</h2>



<ul class="wp-block-list">
<li>Initial Setup Complexity: Deploying RMM tools can be technically complex and time-consuming, especially in larger or more diverse environments.</li>



<li>Cost of Licensing: High-quality RMM platforms often come with significant subscription or licensing costs.</li>



<li>Learning Curve: IT teams may need training to fully utilize all the features and capabilities of the RMM solution.</li>



<li>Potential Privacy Concerns: Remote access capabilities may raise concerns among employees about monitoring and data privacy.</li>



<li>False Positives and Alert Fatigue: Misconfigured alerts can result in excessive notifications, making it difficult to identify genuine threats or issues.</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p>RMM solutions are a cornerstone of modern IT support strategies, offering a range of benefits from proactive monitoring to cost savings. However, they are not without challenges, and organisations should weigh the pros and cons carefully. When implemented correctly and with the right training, RMM tools can dramatically improve IT service delivery, reduce downtime, and enhance user satisfaction.</p>



<p>RMM tools are particularly beneficial for Managed Service Providers (MSPs), allowing them to support dozens or hundreds of client environments efficiently. For internal IT departments, RMM systems help manage infrastructure with minimal resources, which is crucial in today’s landscape where many teams are expected to do more with less.<br><br>Before implementing an RMM solution, it&#8217;s important to assess your specific needs, compare feature sets, ensure integration with existing tools, and provide adequate training. Done right, an RMM strategy can future-proof your IT operations, improve service levels, and enable more strategic use of technical resources.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/07/09/remote-monitoring-and-management-rmm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
