GET https://kbin.spritesserver.nl/m/selfhosted@lemmy.world/t/31321/VPN-to-home-network-options/active

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
0.35 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.04 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
App\Entity\Entry {#2388
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +magazine: App\Entity\Magazine {#266
    +icon: Proxies\__CG__\App\Entity\Image {#247 …}
    +name: "selfhosted@lemmy.world"
    +title: "selfhosted"
    +description: """
      A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
      \n
      Rules:\n
      \n
      - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
      - No spam posting.\n
      - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
      - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
      - No trolling.\n
      \n
      Resources:\n
      \n
      - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
      - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
      - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
      \n
      > Any issues on the community? Report it using the report flag.\n
      \n
      > Questions? DM the mods!
      """
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 222
    +entryCommentCount: 3916
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1729582735 {#276
      date: 2024-10-22 09:38:55.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#238 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
    +entries: Doctrine\ORM\PersistentCollection {#181 …}
    +posts: Doctrine\ORM\PersistentCollection {#139 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
    +bans: Doctrine\ORM\PersistentCollection {#118 …}
    +reports: Doctrine\ORM\PersistentCollection {#104 …}
    +badges: Doctrine\ORM\PersistentCollection {#82 …}
    +logs: Doctrine\ORM\PersistentCollection {#72 …}
    +awards: Doctrine\ORM\PersistentCollection {#61 …}
    +categories: Doctrine\ORM\PersistentCollection {#1820 …}
    -id: 120
    +apId: "selfhosted@lemmy.world"
    +apProfileId: "https://lemmy.world/c/selfhosted"
    +apPublicUrl: "https://lemmy.world/c/selfhosted"
    +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
    +apInboxUrl: "https://lemmy.world/inbox"
    +apDomain: "lemmy.world"
    +apPreferredUsername: "selfhosted"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703473826 {#270
      date: 2023-12-25 04:10:26.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703473826 {#272
      date: 2023-12-25 04:10:26.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "VPN-to-home-network-options"
  +title: "VPN to home network options"
  +url: null
  +body: """
    I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
    \n
    I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 22
  +favouriteCount: 10
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1705642568 {#2410
    date: 2024-01-19 06:36:08.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1866 …}
  +votes: Doctrine\ORM\PersistentCollection {#1978 …}
  +reports: Doctrine\ORM\PersistentCollection {#1946 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
  +badges: Doctrine\ORM\PersistentCollection {#2426 …}
  +children: []
  -id: 31321
  -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
  -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705613475
  +visibility: "visible             "
  +apId: "https://lemmy.ml/post/10682638"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705527075 {#1850
    date: 2024-01-17 22:31:15.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
App\Entity\Entry {#2388
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +magazine: App\Entity\Magazine {#266
    +icon: Proxies\__CG__\App\Entity\Image {#247 …}
    +name: "selfhosted@lemmy.world"
    +title: "selfhosted"
    +description: """
      A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
      \n
      Rules:\n
      \n
      - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
      - No spam posting.\n
      - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
      - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
      - No trolling.\n
      \n
      Resources:\n
      \n
      - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
      - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
      - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
      \n
      > Any issues on the community? Report it using the report flag.\n
      \n
      > Questions? DM the mods!
      """
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 222
    +entryCommentCount: 3916
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1729582735 {#276
      date: 2024-10-22 09:38:55.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#238 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
    +entries: Doctrine\ORM\PersistentCollection {#181 …}
    +posts: Doctrine\ORM\PersistentCollection {#139 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
    +bans: Doctrine\ORM\PersistentCollection {#118 …}
    +reports: Doctrine\ORM\PersistentCollection {#104 …}
    +badges: Doctrine\ORM\PersistentCollection {#82 …}
    +logs: Doctrine\ORM\PersistentCollection {#72 …}
    +awards: Doctrine\ORM\PersistentCollection {#61 …}
    +categories: Doctrine\ORM\PersistentCollection {#1820 …}
    -id: 120
    +apId: "selfhosted@lemmy.world"
    +apProfileId: "https://lemmy.world/c/selfhosted"
    +apPublicUrl: "https://lemmy.world/c/selfhosted"
    +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
    +apInboxUrl: "https://lemmy.world/inbox"
    +apDomain: "lemmy.world"
    +apPreferredUsername: "selfhosted"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703473826 {#270
      date: 2023-12-25 04:10:26.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703473826 {#272
      date: 2023-12-25 04:10:26.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "VPN-to-home-network-options"
  +title: "VPN to home network options"
  +url: null
  +body: """
    I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
    \n
    I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 22
  +favouriteCount: 10
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1705642568 {#2410
    date: 2024-01-19 06:36:08.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1866 …}
  +votes: Doctrine\ORM\PersistentCollection {#1978 …}
  +reports: Doctrine\ORM\PersistentCollection {#1946 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
  +badges: Doctrine\ORM\PersistentCollection {#2426 …}
  +children: []
  -id: 31321
  -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
  -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705613475
  +visibility: "visible             "
  +apId: "https://lemmy.ml/post/10682638"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705527075 {#1850
    date: 2024-01-17 22:31:15.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
App\Entity\Entry {#2388
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +magazine: App\Entity\Magazine {#266
    +icon: Proxies\__CG__\App\Entity\Image {#247 …}
    +name: "selfhosted@lemmy.world"
    +title: "selfhosted"
    +description: """
      A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
      \n
      Rules:\n
      \n
      - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
      - No spam posting.\n
      - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
      - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
      - No trolling.\n
      \n
      Resources:\n
      \n
      - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
      - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
      - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
      \n
      > Any issues on the community? Report it using the report flag.\n
      \n
      > Questions? DM the mods!
      """
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 222
    +entryCommentCount: 3916
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1729582735 {#276
      date: 2024-10-22 09:38:55.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#238 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
    +entries: Doctrine\ORM\PersistentCollection {#181 …}
    +posts: Doctrine\ORM\PersistentCollection {#139 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
    +bans: Doctrine\ORM\PersistentCollection {#118 …}
    +reports: Doctrine\ORM\PersistentCollection {#104 …}
    +badges: Doctrine\ORM\PersistentCollection {#82 …}
    +logs: Doctrine\ORM\PersistentCollection {#72 …}
    +awards: Doctrine\ORM\PersistentCollection {#61 …}
    +categories: Doctrine\ORM\PersistentCollection {#1820 …}
    -id: 120
    +apId: "selfhosted@lemmy.world"
    +apProfileId: "https://lemmy.world/c/selfhosted"
    +apPublicUrl: "https://lemmy.world/c/selfhosted"
    +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
    +apInboxUrl: "https://lemmy.world/inbox"
    +apDomain: "lemmy.world"
    +apPreferredUsername: "selfhosted"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703473826 {#270
      date: 2023-12-25 04:10:26.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703473826 {#272
      date: 2023-12-25 04:10:26.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
  +slug: "VPN-to-home-network-options"
  +title: "VPN to home network options"
  +url: null
  +body: """
    I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
    \n
    I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 22
  +favouriteCount: 10
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1705642568 {#2410
    date: 2024-01-19 06:36:08.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1866 …}
  +votes: Doctrine\ORM\PersistentCollection {#1978 …}
  +reports: Doctrine\ORM\PersistentCollection {#1946 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
  +badges: Doctrine\ORM\PersistentCollection {#2426 …}
  +children: []
  -id: 31321
  -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
  -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1705613475
  +visibility: "visible             "
  +apId: "https://lemmy.ml/post/10682638"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705527075 {#1850
    date: 2024-01-17 22:31:15.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\EntryComment {#4016
  +user: App\Entity\User {#3964 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
    \n
    I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 3
  +score: 0
  +lastActive: DateTime @1726598490 {#4025
    date: 2024-09-17 20:41:30.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4014 …}
  +nested: Doctrine\ORM\PersistentCollection {#4012 …}
  +votes: Doctrine\ORM\PersistentCollection {#4010 …}
  +reports: Doctrine\ORM\PersistentCollection {#4008 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
  -id: 317762
  -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://programming.dev/comment/6564594"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705531297 {#3961
    date: 2024-01-17 23:41:37.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\EntryComment {#4016
  +user: App\Entity\User {#3964 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
    \n
    I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 3
  +score: 0
  +lastActive: DateTime @1726598490 {#4025
    date: 2024-09-17 20:41:30.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4014 …}
  +nested: Doctrine\ORM\PersistentCollection {#4012 …}
  +votes: Doctrine\ORM\PersistentCollection {#4010 …}
  +reports: Doctrine\ORM\PersistentCollection {#4008 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
  -id: 317762
  -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://programming.dev/comment/6564594"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705531297 {#3961
    date: 2024-01-17 23:41:37.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\EntryComment {#4016
  +user: App\Entity\User {#3964 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
    \n
    I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 3
  +score: 0
  +lastActive: DateTime @1726598490 {#4025
    date: 2024-09-17 20:41:30.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4014 …}
  +nested: Doctrine\ORM\PersistentCollection {#4012 …}
  +votes: Doctrine\ORM\PersistentCollection {#4010 …}
  +reports: Doctrine\ORM\PersistentCollection {#4008 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
  -id: 317762
  -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://programming.dev/comment/6564594"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705531297 {#3961
    date: 2024-01-17 23:41:37.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
10 DENIED moderate
App\Entity\EntryComment {#4764
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4016
    +user: App\Entity\User {#3964 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
      \n
      I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 3
    +score: 0
    +lastActive: DateTime @1726598490 {#4025
      date: 2024-09-17 20:41:30.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4014 …}
    +nested: Doctrine\ORM\PersistentCollection {#4012 …}
    +votes: Doctrine\ORM\PersistentCollection {#4010 …}
    +reports: Doctrine\ORM\PersistentCollection {#4008 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
    -id: 317762
    -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://programming.dev/comment/6564594"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705531297 {#3961
      date: 2024-01-17 23:41:37.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "That’s looks handy. Thanks!"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705532492 {#4762
    date: 2024-01-18 00:01:32.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4765 …}
  +nested: Doctrine\ORM\PersistentCollection {#4767 …}
  +votes: Doctrine\ORM\PersistentCollection {#4769 …}
  +reports: Doctrine\ORM\PersistentCollection {#4771 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4773 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4775 …}
  -id: 317801
  -bodyTs: "'handi':4 'look':3 'thank':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7481726"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705532492 {#4763
    date: 2024-01-18 00:01:32.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
11 DENIED edit
App\Entity\EntryComment {#4764
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4016
    +user: App\Entity\User {#3964 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
      \n
      I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 3
    +score: 0
    +lastActive: DateTime @1726598490 {#4025
      date: 2024-09-17 20:41:30.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4014 …}
    +nested: Doctrine\ORM\PersistentCollection {#4012 …}
    +votes: Doctrine\ORM\PersistentCollection {#4010 …}
    +reports: Doctrine\ORM\PersistentCollection {#4008 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
    -id: 317762
    -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://programming.dev/comment/6564594"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705531297 {#3961
      date: 2024-01-17 23:41:37.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "That’s looks handy. Thanks!"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705532492 {#4762
    date: 2024-01-18 00:01:32.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4765 …}
  +nested: Doctrine\ORM\PersistentCollection {#4767 …}
  +votes: Doctrine\ORM\PersistentCollection {#4769 …}
  +reports: Doctrine\ORM\PersistentCollection {#4771 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4773 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4775 …}
  -id: 317801
  -bodyTs: "'handi':4 'look':3 'thank':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7481726"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705532492 {#4763
    date: 2024-01-18 00:01:32.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
12 DENIED moderate
App\Entity\EntryComment {#4764
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4016
    +user: App\Entity\User {#3964 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
      \n
      I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 3
    +score: 0
    +lastActive: DateTime @1726598490 {#4025
      date: 2024-09-17 20:41:30.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4014 …}
    +nested: Doctrine\ORM\PersistentCollection {#4012 …}
    +votes: Doctrine\ORM\PersistentCollection {#4010 …}
    +reports: Doctrine\ORM\PersistentCollection {#4008 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
    -id: 317762
    -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://programming.dev/comment/6564594"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705531297 {#3961
      date: 2024-01-17 23:41:37.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "That’s looks handy. Thanks!"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705532492 {#4762
    date: 2024-01-18 00:01:32.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4765 …}
  +nested: Doctrine\ORM\PersistentCollection {#4767 …}
  +votes: Doctrine\ORM\PersistentCollection {#4769 …}
  +reports: Doctrine\ORM\PersistentCollection {#4771 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4773 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4775 …}
  -id: 317801
  -bodyTs: "'handi':4 'look':3 'thank':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7481726"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705532492 {#4763
    date: 2024-01-18 00:01:32.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
13 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
14 DENIED moderate
App\Entity\EntryComment {#4779
  +user: Proxies\__CG__\App\Entity\User {#4780 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4016
    +user: App\Entity\User {#3964 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
      \n
      I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 3
    +score: 0
    +lastActive: DateTime @1726598490 {#4025
      date: 2024-09-17 20:41:30.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4014 …}
    +nested: Doctrine\ORM\PersistentCollection {#4012 …}
    +votes: Doctrine\ORM\PersistentCollection {#4010 …}
    +reports: Doctrine\ORM\PersistentCollection {#4008 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
    -id: 317762
    -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://programming.dev/comment/6564594"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705531297 {#3961
      date: 2024-01-17 23:41:37.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "I set it up manually using [this](https://www.linuxserver.io/blog/advanced-wireguard-container-routing) as a guide. It was a lot of work because I had to adapt it to my use case (not using a VPS), so I couldn’t just follow the guide, but I learned a lot in the process and it works well."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705619545 {#4777
    date: 2024-01-19 00:12:25.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4781 …}
  +nested: Doctrine\ORM\PersistentCollection {#4783 …}
  +votes: Doctrine\ORM\PersistentCollection {#4785 …}
  +reports: Doctrine\ORM\PersistentCollection {#4787 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4789 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4791 …}
  -id: 320731
  -bodyTs: "'/blog/advanced-wireguard-container-routing)':10 'adapt':24 'case':29 'couldn':36 'follow':39 'guid':13,41 'learn':44 'lot':17,46 'manual':5 'process':49 'set':2 'use':6,28,31 'vps':33 'well':53 'work':19,52 'www.linuxserver.io':9 'www.linuxserver.io/blog/advanced-wireguard-container-routing)':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://discuss.tchncs.de/comment/6591177"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705619545 {#4778
    date: 2024-01-19 00:12:25.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
15 DENIED edit
App\Entity\EntryComment {#4779
  +user: Proxies\__CG__\App\Entity\User {#4780 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4016
    +user: App\Entity\User {#3964 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
      \n
      I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 3
    +score: 0
    +lastActive: DateTime @1726598490 {#4025
      date: 2024-09-17 20:41:30.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4014 …}
    +nested: Doctrine\ORM\PersistentCollection {#4012 …}
    +votes: Doctrine\ORM\PersistentCollection {#4010 …}
    +reports: Doctrine\ORM\PersistentCollection {#4008 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
    -id: 317762
    -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://programming.dev/comment/6564594"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705531297 {#3961
      date: 2024-01-17 23:41:37.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "I set it up manually using [this](https://www.linuxserver.io/blog/advanced-wireguard-container-routing) as a guide. It was a lot of work because I had to adapt it to my use case (not using a VPS), so I couldn’t just follow the guide, but I learned a lot in the process and it works well."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705619545 {#4777
    date: 2024-01-19 00:12:25.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4781 …}
  +nested: Doctrine\ORM\PersistentCollection {#4783 …}
  +votes: Doctrine\ORM\PersistentCollection {#4785 …}
  +reports: Doctrine\ORM\PersistentCollection {#4787 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4789 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4791 …}
  -id: 320731
  -bodyTs: "'/blog/advanced-wireguard-container-routing)':10 'adapt':24 'case':29 'couldn':36 'follow':39 'guid':13,41 'learn':44 'lot':17,46 'manual':5 'process':49 'set':2 'use':6,28,31 'vps':33 'well':53 'work':19,52 'www.linuxserver.io':9 'www.linuxserver.io/blog/advanced-wireguard-container-routing)':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://discuss.tchncs.de/comment/6591177"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705619545 {#4778
    date: 2024-01-19 00:12:25.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
16 DENIED moderate
App\Entity\EntryComment {#4779
  +user: Proxies\__CG__\App\Entity\User {#4780 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4016
    +user: App\Entity\User {#3964 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
      \n
      I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 3
    +score: 0
    +lastActive: DateTime @1726598490 {#4025
      date: 2024-09-17 20:41:30.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4014 …}
    +nested: Doctrine\ORM\PersistentCollection {#4012 …}
    +votes: Doctrine\ORM\PersistentCollection {#4010 …}
    +reports: Doctrine\ORM\PersistentCollection {#4008 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
    -id: 317762
    -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://programming.dev/comment/6564594"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705531297 {#3961
      date: 2024-01-17 23:41:37.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "I set it up manually using [this](https://www.linuxserver.io/blog/advanced-wireguard-container-routing) as a guide. It was a lot of work because I had to adapt it to my use case (not using a VPS), so I couldn’t just follow the guide, but I learned a lot in the process and it works well."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705619545 {#4777
    date: 2024-01-19 00:12:25.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4781 …}
  +nested: Doctrine\ORM\PersistentCollection {#4783 …}
  +votes: Doctrine\ORM\PersistentCollection {#4785 …}
  +reports: Doctrine\ORM\PersistentCollection {#4787 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4789 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4791 …}
  -id: 320731
  -bodyTs: "'/blog/advanced-wireguard-container-routing)':10 'adapt':24 'case':29 'couldn':36 'follow':39 'guid':13,41 'learn':44 'lot':17,46 'manual':5 'process':49 'set':2 'use':6,28,31 'vps':33 'well':53 'work':19,52 'www.linuxserver.io':9 'www.linuxserver.io/blog/advanced-wireguard-container-routing)':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://discuss.tchncs.de/comment/6591177"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705619545 {#4778
    date: 2024-01-19 00:12:25.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
17 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
18 DENIED moderate
App\Entity\EntryComment {#4909
  +user: App\Entity\User {#3964 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4779
    +user: Proxies\__CG__\App\Entity\User {#4780 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4016
      +user: App\Entity\User {#3964 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: """
        I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
        \n
        I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 3
      +score: 0
      +lastActive: DateTime @1726598490 {#4025
        date: 2024-09-17 20:41:30.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4014 …}
      +nested: Doctrine\ORM\PersistentCollection {#4012 …}
      +votes: Doctrine\ORM\PersistentCollection {#4010 …}
      +reports: Doctrine\ORM\PersistentCollection {#4008 …}
      +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
      +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
      -id: 317762
      -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://programming.dev/comment/6564594"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705531297 {#3961
        date: 2024-01-17 23:41:37.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4016}
    +body: "I set it up manually using [this](https://www.linuxserver.io/blog/advanced-wireguard-container-routing) as a guide. It was a lot of work because I had to adapt it to my use case (not using a VPS), so I couldn’t just follow the guide, but I learned a lot in the process and it works well."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1705619545 {#4777
      date: 2024-01-19 00:12:25.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@CameronDev@programming.dev"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4781 …}
    +nested: Doctrine\ORM\PersistentCollection {#4783 …}
    +votes: Doctrine\ORM\PersistentCollection {#4785 …}
    +reports: Doctrine\ORM\PersistentCollection {#4787 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4789 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4791 …}
    -id: 320731
    -bodyTs: "'/blog/advanced-wireguard-container-routing)':10 'adapt':24 'case':29 'couldn':36 'follow':39 'guid':13,41 'learn':44 'lot':17,46 'manual':5 'process':49 'set':2 'use':6,28,31 'vps':33 'well':53 'work':19,52 'www.linuxserver.io':9 'www.linuxserver.io/blog/advanced-wireguard-container-routing)':8"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://discuss.tchncs.de/comment/6591177"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705619545 {#4778
      date: 2024-01-19 00:12:25.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "I had something manual setup originally as well, but it became a bit of a maintenance hassle. Moving configs to devices was a bit of a pain, and generating keys wasnt easy."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705642568 {#4907
    date: 2024-01-19 06:36:08.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
    "@CumBroth@discuss.tchncs.de"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4910 …}
  +nested: Doctrine\ORM\PersistentCollection {#4912 …}
  +votes: Doctrine\ORM\PersistentCollection {#4914 …}
  +reports: Doctrine\ORM\PersistentCollection {#4916 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4918 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4920 …}
  -id: 321617
  -bodyTs: "'becam':11 'bit':13,24 'config':19 'devic':21 'easi':32 'generat':29 'hassl':17 'key':30 'mainten':16 'manual':4 'move':18 'origin':6 'pain':27 'setup':5 'someth':3 'wasnt':31 'well':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://programming.dev/comment/6602084"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705642568 {#4908
    date: 2024-01-19 06:36:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
19 DENIED edit
App\Entity\EntryComment {#4909
  +user: App\Entity\User {#3964 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4779
    +user: Proxies\__CG__\App\Entity\User {#4780 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4016
      +user: App\Entity\User {#3964 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: """
        I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
        \n
        I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 3
      +score: 0
      +lastActive: DateTime @1726598490 {#4025
        date: 2024-09-17 20:41:30.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4014 …}
      +nested: Doctrine\ORM\PersistentCollection {#4012 …}
      +votes: Doctrine\ORM\PersistentCollection {#4010 …}
      +reports: Doctrine\ORM\PersistentCollection {#4008 …}
      +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
      +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
      -id: 317762
      -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://programming.dev/comment/6564594"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705531297 {#3961
        date: 2024-01-17 23:41:37.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4016}
    +body: "I set it up manually using [this](https://www.linuxserver.io/blog/advanced-wireguard-container-routing) as a guide. It was a lot of work because I had to adapt it to my use case (not using a VPS), so I couldn’t just follow the guide, but I learned a lot in the process and it works well."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1705619545 {#4777
      date: 2024-01-19 00:12:25.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@CameronDev@programming.dev"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4781 …}
    +nested: Doctrine\ORM\PersistentCollection {#4783 …}
    +votes: Doctrine\ORM\PersistentCollection {#4785 …}
    +reports: Doctrine\ORM\PersistentCollection {#4787 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4789 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4791 …}
    -id: 320731
    -bodyTs: "'/blog/advanced-wireguard-container-routing)':10 'adapt':24 'case':29 'couldn':36 'follow':39 'guid':13,41 'learn':44 'lot':17,46 'manual':5 'process':49 'set':2 'use':6,28,31 'vps':33 'well':53 'work':19,52 'www.linuxserver.io':9 'www.linuxserver.io/blog/advanced-wireguard-container-routing)':8"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://discuss.tchncs.de/comment/6591177"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705619545 {#4778
      date: 2024-01-19 00:12:25.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "I had something manual setup originally as well, but it became a bit of a maintenance hassle. Moving configs to devices was a bit of a pain, and generating keys wasnt easy."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705642568 {#4907
    date: 2024-01-19 06:36:08.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
    "@CumBroth@discuss.tchncs.de"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4910 …}
  +nested: Doctrine\ORM\PersistentCollection {#4912 …}
  +votes: Doctrine\ORM\PersistentCollection {#4914 …}
  +reports: Doctrine\ORM\PersistentCollection {#4916 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4918 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4920 …}
  -id: 321617
  -bodyTs: "'becam':11 'bit':13,24 'config':19 'devic':21 'easi':32 'generat':29 'hassl':17 'key':30 'mainten':16 'manual':4 'move':18 'origin':6 'pain':27 'setup':5 'someth':3 'wasnt':31 'well':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://programming.dev/comment/6602084"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705642568 {#4908
    date: 2024-01-19 06:36:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
20 DENIED moderate
App\Entity\EntryComment {#4909
  +user: App\Entity\User {#3964 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4779
    +user: Proxies\__CG__\App\Entity\User {#4780 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4016
      +user: App\Entity\User {#3964 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: """
        I run a wireguard vpn into my home, and i can access my local services. It was a small matter of setting up routing properly.\n
        \n
        I am using [www.firezone.dev](https://www.firezone.dev/) to set it up and manage it, but i believe it can be done manually if desired.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 3
      +score: 0
      +lastActive: DateTime @1726598490 {#4025
        date: 2024-09-17 20:41:30.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4014 …}
      +nested: Doctrine\ORM\PersistentCollection {#4012 …}
      +votes: Doctrine\ORM\PersistentCollection {#4010 …}
      +reports: Doctrine\ORM\PersistentCollection {#4008 …}
      +favourites: Doctrine\ORM\PersistentCollection {#3976 …}
      +notifications: Doctrine\ORM\PersistentCollection {#3980 …}
      -id: 317762
      -bodyTs: "'/)':32 'access':12 'believ':42 'desir':49 'done':46 'home':8 'local':14 'manag':38 'manual':47 'matter':20 'proper':25 'rout':24 'run':2 'servic':15 'set':22,34 'small':19 'use':28 'vpn':5 'wireguard':4 'www.firezone.dev':29,31 'www.firezone.dev/)':30"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://programming.dev/comment/6564594"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705531297 {#3961
        date: 2024-01-17 23:41:37.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4016}
    +body: "I set it up manually using [this](https://www.linuxserver.io/blog/advanced-wireguard-container-routing) as a guide. It was a lot of work because I had to adapt it to my use case (not using a VPS), so I couldn’t just follow the guide, but I learned a lot in the process and it works well."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1705619545 {#4777
      date: 2024-01-19 00:12:25.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@CameronDev@programming.dev"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4781 …}
    +nested: Doctrine\ORM\PersistentCollection {#4783 …}
    +votes: Doctrine\ORM\PersistentCollection {#4785 …}
    +reports: Doctrine\ORM\PersistentCollection {#4787 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4789 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4791 …}
    -id: 320731
    -bodyTs: "'/blog/advanced-wireguard-container-routing)':10 'adapt':24 'case':29 'couldn':36 'follow':39 'guid':13,41 'learn':44 'lot':17,46 'manual':5 'process':49 'set':2 'use':6,28,31 'vps':33 'well':53 'work':19,52 'www.linuxserver.io':9 'www.linuxserver.io/blog/advanced-wireguard-container-routing)':8"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://discuss.tchncs.de/comment/6591177"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705619545 {#4778
      date: 2024-01-19 00:12:25.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4016}
  +body: "I had something manual setup originally as well, but it became a bit of a maintenance hassle. Moving configs to devices was a bit of a pain, and generating keys wasnt easy."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705642568 {#4907
    date: 2024-01-19 06:36:08.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@CameronDev@programming.dev"
    "@CumBroth@discuss.tchncs.de"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4910 …}
  +nested: Doctrine\ORM\PersistentCollection {#4912 …}
  +votes: Doctrine\ORM\PersistentCollection {#4914 …}
  +reports: Doctrine\ORM\PersistentCollection {#4916 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4918 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4920 …}
  -id: 321617
  -bodyTs: "'becam':11 'bit':13,24 'config':19 'devic':21 'easi':32 'generat':29 'hassl':17 'key':30 'mainten':16 'manual':4 'move':18 'origin':6 'pain':27 'setup':5 'someth':3 'wasnt':31 'well':8"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://programming.dev/comment/6602084"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705642568 {#4908
    date: 2024-01-19 06:36:08.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
21 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
22 DENIED moderate
App\Entity\EntryComment {#4048
  +user: App\Entity\User {#4037 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1726353993 {#4054
    date: 2024-09-15 00:46:33.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4053 …}
  +nested: Doctrine\ORM\PersistentCollection {#4052 …}
  +votes: Doctrine\ORM\PersistentCollection {#4043 …}
  +reports: Doctrine\ORM\PersistentCollection {#4046 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
  -id: 317900
  -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.max-p.me/comment/1917806"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705536012 {#4059
    date: 2024-01-18 01:00:12.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
23 DENIED edit
App\Entity\EntryComment {#4048
  +user: App\Entity\User {#4037 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1726353993 {#4054
    date: 2024-09-15 00:46:33.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4053 …}
  +nested: Doctrine\ORM\PersistentCollection {#4052 …}
  +votes: Doctrine\ORM\PersistentCollection {#4043 …}
  +reports: Doctrine\ORM\PersistentCollection {#4046 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
  -id: 317900
  -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.max-p.me/comment/1917806"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705536012 {#4059
    date: 2024-01-18 01:00:12.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
24 DENIED moderate
App\Entity\EntryComment {#4048
  +user: App\Entity\User {#4037 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1726353993 {#4054
    date: 2024-09-15 00:46:33.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4053 …}
  +nested: Doctrine\ORM\PersistentCollection {#4052 …}
  +votes: Doctrine\ORM\PersistentCollection {#4043 …}
  +reports: Doctrine\ORM\PersistentCollection {#4046 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
  -id: 317900
  -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.max-p.me/comment/1917806"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705536012 {#4059
    date: 2024-01-18 01:00:12.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
25 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
26 DENIED moderate
App\Entity\EntryComment {#4810
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4048
    +user: App\Entity\User {#4037 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726353993 {#4054
      date: 2024-09-15 00:46:33.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4053 …}
    +nested: Doctrine\ORM\PersistentCollection {#4052 …}
    +votes: Doctrine\ORM\PersistentCollection {#4043 …}
    +reports: Doctrine\ORM\PersistentCollection {#4046 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
    -id: 317900
    -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.max-p.me/comment/1917806"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705536012 {#4059
      date: 2024-01-18 01:00:12.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4048}
  +body: "Well, I didn’t realize that was an option to be honest, lol. I am having some issues with that box at the moment though so having a pi or my router acting as the gateway appealed to me with it’s longer uptime"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705537608 {#4808
    date: 2024-01-18 01:26:48.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Max_P@lemmy.max-p.me"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4811 …}
  +nested: Doctrine\ORM\PersistentCollection {#4813 …}
  +votes: Doctrine\ORM\PersistentCollection {#4815 …}
  +reports: Doctrine\ORM\PersistentCollection {#4817 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4819 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4821 …}
  -id: 317968
  -bodyTs: "'act':33 'appeal':37 'box':21 'didn':3 'gateway':36 'honest':12 'issu':18 'lol':13 'longer':43 'moment':24 'option':9 'pi':29 'realiz':5 'router':32 'though':25 'uptim':44 'well':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7483629"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705537608 {#4809
    date: 2024-01-18 01:26:48.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
27 DENIED edit
App\Entity\EntryComment {#4810
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4048
    +user: App\Entity\User {#4037 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726353993 {#4054
      date: 2024-09-15 00:46:33.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4053 …}
    +nested: Doctrine\ORM\PersistentCollection {#4052 …}
    +votes: Doctrine\ORM\PersistentCollection {#4043 …}
    +reports: Doctrine\ORM\PersistentCollection {#4046 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
    -id: 317900
    -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.max-p.me/comment/1917806"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705536012 {#4059
      date: 2024-01-18 01:00:12.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4048}
  +body: "Well, I didn’t realize that was an option to be honest, lol. I am having some issues with that box at the moment though so having a pi or my router acting as the gateway appealed to me with it’s longer uptime"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705537608 {#4808
    date: 2024-01-18 01:26:48.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Max_P@lemmy.max-p.me"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4811 …}
  +nested: Doctrine\ORM\PersistentCollection {#4813 …}
  +votes: Doctrine\ORM\PersistentCollection {#4815 …}
  +reports: Doctrine\ORM\PersistentCollection {#4817 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4819 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4821 …}
  -id: 317968
  -bodyTs: "'act':33 'appeal':37 'box':21 'didn':3 'gateway':36 'honest':12 'issu':18 'lol':13 'longer':43 'moment':24 'option':9 'pi':29 'realiz':5 'router':32 'though':25 'uptim':44 'well':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7483629"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705537608 {#4809
    date: 2024-01-18 01:26:48.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
28 DENIED moderate
App\Entity\EntryComment {#4810
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4048
    +user: App\Entity\User {#4037 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726353993 {#4054
      date: 2024-09-15 00:46:33.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4053 …}
    +nested: Doctrine\ORM\PersistentCollection {#4052 …}
    +votes: Doctrine\ORM\PersistentCollection {#4043 …}
    +reports: Doctrine\ORM\PersistentCollection {#4046 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
    -id: 317900
    -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.max-p.me/comment/1917806"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705536012 {#4059
      date: 2024-01-18 01:00:12.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4048}
  +body: "Well, I didn’t realize that was an option to be honest, lol. I am having some issues with that box at the moment though so having a pi or my router acting as the gateway appealed to me with it’s longer uptime"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705537608 {#4808
    date: 2024-01-18 01:26:48.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Max_P@lemmy.max-p.me"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4811 …}
  +nested: Doctrine\ORM\PersistentCollection {#4813 …}
  +votes: Doctrine\ORM\PersistentCollection {#4815 …}
  +reports: Doctrine\ORM\PersistentCollection {#4817 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4819 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4821 …}
  -id: 317968
  -bodyTs: "'act':33 'appeal':37 'box':21 'didn':3 'gateway':36 'honest':12 'issu':18 'lol':13 'longer':43 'moment':24 'option':9 'pi':29 'realiz':5 'router':32 'though':25 'uptim':44 'well':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7483629"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705537608 {#4809
    date: 2024-01-18 01:26:48.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
29 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
30 DENIED moderate
App\Entity\EntryComment {#4825
  +user: Proxies\__CG__\App\Entity\User {#4826 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4048
    +user: App\Entity\User {#4037 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726353993 {#4054
      date: 2024-09-15 00:46:33.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4053 …}
    +nested: Doctrine\ORM\PersistentCollection {#4052 …}
    +votes: Doctrine\ORM\PersistentCollection {#4043 …}
    +reports: Doctrine\ORM\PersistentCollection {#4046 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
    -id: 317900
    -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.max-p.me/comment/1917806"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705536012 {#4059
      date: 2024-01-18 01:00:12.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4048}
  +body: "This is how I use it and it’s been rock solid for ages! Can even pass pihole through it so you get no ads when out and about."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705570304 {#4823
    date: 2024-01-18 10:31:44.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Max_P@lemmy.max-p.me"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4827 …}
  +nested: Doctrine\ORM\PersistentCollection {#4829 …}
  +votes: Doctrine\ORM\PersistentCollection {#4831 …}
  +reports: Doctrine\ORM\PersistentCollection {#4833 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4835 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4837 …}
  -id: 318775
  -bodyTs: "'ad':25 'age':14 'even':16 'get':23 'pass':17 'pihol':18 'rock':11 'solid':12 'use':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7492159"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705570304 {#4824
    date: 2024-01-18 10:31:44.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
31 DENIED edit
App\Entity\EntryComment {#4825
  +user: Proxies\__CG__\App\Entity\User {#4826 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4048
    +user: App\Entity\User {#4037 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726353993 {#4054
      date: 2024-09-15 00:46:33.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4053 …}
    +nested: Doctrine\ORM\PersistentCollection {#4052 …}
    +votes: Doctrine\ORM\PersistentCollection {#4043 …}
    +reports: Doctrine\ORM\PersistentCollection {#4046 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
    -id: 317900
    -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.max-p.me/comment/1917806"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705536012 {#4059
      date: 2024-01-18 01:00:12.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4048}
  +body: "This is how I use it and it’s been rock solid for ages! Can even pass pihole through it so you get no ads when out and about."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705570304 {#4823
    date: 2024-01-18 10:31:44.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Max_P@lemmy.max-p.me"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4827 …}
  +nested: Doctrine\ORM\PersistentCollection {#4829 …}
  +votes: Doctrine\ORM\PersistentCollection {#4831 …}
  +reports: Doctrine\ORM\PersistentCollection {#4833 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4835 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4837 …}
  -id: 318775
  -bodyTs: "'ad':25 'age':14 'even':16 'get':23 'pass':17 'pihol':18 'rock':11 'solid':12 'use':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7492159"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705570304 {#4824
    date: 2024-01-18 10:31:44.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
32 DENIED moderate
App\Entity\EntryComment {#4825
  +user: Proxies\__CG__\App\Entity\User {#4826 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4048
    +user: App\Entity\User {#4037 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Any reason the VPN can’t stay as-is? Unless you don’t want it on the unraid box at all anymore. But going to unraid over VPN then out the rest of the network from there is a perfectly valid use case."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726353993 {#4054
      date: 2024-09-15 00:46:33.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4053 …}
    +nested: Doctrine\ORM\PersistentCollection {#4052 …}
    +votes: Doctrine\ORM\PersistentCollection {#4043 …}
    +reports: Doctrine\ORM\PersistentCollection {#4046 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4041 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4039 …}
    -id: 317900
    -bodyTs: "'anymor':23 'as-i':8 'box':20 'case':44 'go':25 'network':36 'perfect':41 'reason':2 'rest':33 'stay':7 'unless':11 'unraid':19,27 'use':43 'valid':42 'vpn':4,29 'want':15"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.max-p.me/comment/1917806"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705536012 {#4059
      date: 2024-01-18 01:00:12.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4048}
  +body: "This is how I use it and it’s been rock solid for ages! Can even pass pihole through it so you get no ads when out and about."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705570304 {#4823
    date: 2024-01-18 10:31:44.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Max_P@lemmy.max-p.me"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4827 …}
  +nested: Doctrine\ORM\PersistentCollection {#4829 …}
  +votes: Doctrine\ORM\PersistentCollection {#4831 …}
  +reports: Doctrine\ORM\PersistentCollection {#4833 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4835 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4837 …}
  -id: 318775
  -bodyTs: "'ad':25 'age':14 'even':16 'get':23 'pass':17 'pihol':18 'rock':11 'solid':12 'use':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7492159"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705570304 {#4824
    date: 2024-01-18 10:31:44.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
33 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
34 DENIED moderate
App\Entity\EntryComment {#4134
  +user: App\Entity\User {#4147 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Pivpn"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1726335872 {#4129
    date: 2024-09-14 19:44:32.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4135 …}
  +nested: Doctrine\ORM\PersistentCollection {#4137 …}
  +votes: Doctrine\ORM\PersistentCollection {#4139 …}
  +reports: Doctrine\ORM\PersistentCollection {#4141 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4143 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4145 …}
  -id: 318319
  -bodyTs: "'pivpn':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6790746"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705547455 {#4130
    date: 2024-01-18 04:10:55.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
35 DENIED edit
App\Entity\EntryComment {#4134
  +user: App\Entity\User {#4147 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Pivpn"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1726335872 {#4129
    date: 2024-09-14 19:44:32.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4135 …}
  +nested: Doctrine\ORM\PersistentCollection {#4137 …}
  +votes: Doctrine\ORM\PersistentCollection {#4139 …}
  +reports: Doctrine\ORM\PersistentCollection {#4141 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4143 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4145 …}
  -id: 318319
  -bodyTs: "'pivpn':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6790746"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705547455 {#4130
    date: 2024-01-18 04:10:55.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
36 DENIED moderate
App\Entity\EntryComment {#4134
  +user: App\Entity\User {#4147 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Pivpn"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 4
  +score: 0
  +lastActive: DateTime @1726335872 {#4129
    date: 2024-09-14 19:44:32.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4135 …}
  +nested: Doctrine\ORM\PersistentCollection {#4137 …}
  +votes: Doctrine\ORM\PersistentCollection {#4139 …}
  +reports: Doctrine\ORM\PersistentCollection {#4141 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4143 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4145 …}
  -id: 318319
  -bodyTs: "'pivpn':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6790746"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705547455 {#4130
    date: 2024-01-18 04:10:55.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
37 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
38 DENIED moderate
App\Entity\EntryComment {#4841
  +user: Proxies\__CG__\App\Entity\User {#4842 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4134
    +user: App\Entity\User {#4147 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Pivpn"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726335872 {#4129
      date: 2024-09-14 19:44:32.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4135 …}
    +nested: Doctrine\ORM\PersistentCollection {#4137 …}
    +votes: Doctrine\ORM\PersistentCollection {#4139 …}
    +reports: Doctrine\ORM\PersistentCollection {#4141 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4143 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4145 …}
    -id: 318319
    -bodyTs: "'pivpn':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.world/comment/6790746"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705547455 {#4130
      date: 2024-01-18 04:10:55.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4134}
  +body: "+1"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705564036 {#4839
    date: 2024-01-18 08:47:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@cybersandwich@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4843 …}
  +nested: Doctrine\ORM\PersistentCollection {#4845 …}
  +votes: Doctrine\ORM\PersistentCollection {#4847 …}
  +reports: Doctrine\ORM\PersistentCollection {#4849 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4851 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4853 …}
  -id: 318654
  -bodyTs: "'+1':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6794233"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705564036 {#4840
    date: 2024-01-18 08:47:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
39 DENIED edit
App\Entity\EntryComment {#4841
  +user: Proxies\__CG__\App\Entity\User {#4842 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4134
    +user: App\Entity\User {#4147 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Pivpn"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726335872 {#4129
      date: 2024-09-14 19:44:32.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4135 …}
    +nested: Doctrine\ORM\PersistentCollection {#4137 …}
    +votes: Doctrine\ORM\PersistentCollection {#4139 …}
    +reports: Doctrine\ORM\PersistentCollection {#4141 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4143 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4145 …}
    -id: 318319
    -bodyTs: "'pivpn':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.world/comment/6790746"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705547455 {#4130
      date: 2024-01-18 04:10:55.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4134}
  +body: "+1"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705564036 {#4839
    date: 2024-01-18 08:47:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@cybersandwich@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4843 …}
  +nested: Doctrine\ORM\PersistentCollection {#4845 …}
  +votes: Doctrine\ORM\PersistentCollection {#4847 …}
  +reports: Doctrine\ORM\PersistentCollection {#4849 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4851 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4853 …}
  -id: 318654
  -bodyTs: "'+1':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6794233"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705564036 {#4840
    date: 2024-01-18 08:47:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
40 DENIED moderate
App\Entity\EntryComment {#4841
  +user: Proxies\__CG__\App\Entity\User {#4842 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4134
    +user: App\Entity\User {#4147 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Pivpn"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 4
    +score: 0
    +lastActive: DateTime @1726335872 {#4129
      date: 2024-09-14 19:44:32.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4135 …}
    +nested: Doctrine\ORM\PersistentCollection {#4137 …}
    +votes: Doctrine\ORM\PersistentCollection {#4139 …}
    +reports: Doctrine\ORM\PersistentCollection {#4141 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4143 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4145 …}
    -id: 318319
    -bodyTs: "'pivpn':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.world/comment/6790746"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705547455 {#4130
      date: 2024-01-18 04:10:55.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4134}
  +body: "+1"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705564036 {#4839
    date: 2024-01-18 08:47:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@cybersandwich@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4843 …}
  +nested: Doctrine\ORM\PersistentCollection {#4845 …}
  +votes: Doctrine\ORM\PersistentCollection {#4847 …}
  +reports: Doctrine\ORM\PersistentCollection {#4849 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4851 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4853 …}
  -id: 318654
  -bodyTs: "'+1':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/6794233"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705564036 {#4840
    date: 2024-01-18 08:47:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
41 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
42 DENIED moderate
App\Entity\EntryComment {#4208
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1726206278 {#4202
    date: 2024-09-13 07:44:38.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4209 …}
  +nested: Doctrine\ORM\PersistentCollection {#4211 …}
  +votes: Doctrine\ORM\PersistentCollection {#4213 …}
  +reports: Doctrine\ORM\PersistentCollection {#4215 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
  -id: 317804
  -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6471780"
  +editedAt: DateTimeImmutable @1726123617 {#4203
    date: 2024-09-12 08:46:57.0 +02:00
  }
  +createdAt: DateTimeImmutable @1705532639 {#4204
    date: 2024-01-18 00:03:59.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
43 DENIED edit
App\Entity\EntryComment {#4208
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1726206278 {#4202
    date: 2024-09-13 07:44:38.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4209 …}
  +nested: Doctrine\ORM\PersistentCollection {#4211 …}
  +votes: Doctrine\ORM\PersistentCollection {#4213 …}
  +reports: Doctrine\ORM\PersistentCollection {#4215 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
  -id: 317804
  -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6471780"
  +editedAt: DateTimeImmutable @1726123617 {#4203
    date: 2024-09-12 08:46:57.0 +02:00
  }
  +createdAt: DateTimeImmutable @1705532639 {#4204
    date: 2024-01-18 00:03:59.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
44 DENIED moderate
App\Entity\EntryComment {#4208
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1726206278 {#4202
    date: 2024-09-13 07:44:38.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4209 …}
  +nested: Doctrine\ORM\PersistentCollection {#4211 …}
  +votes: Doctrine\ORM\PersistentCollection {#4213 …}
  +reports: Doctrine\ORM\PersistentCollection {#4215 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
  -id: 317804
  -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6471780"
  +editedAt: DateTimeImmutable @1726123617 {#4203
    date: 2024-09-12 08:46:57.0 +02:00
  }
  +createdAt: DateTimeImmutable @1705532639 {#4204
    date: 2024-01-18 00:03:59.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
45 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
46 DENIED moderate
App\Entity\EntryComment {#4795
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4208
    +user: App\Entity\User {#4221 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1726206278 {#4202
      date: 2024-09-13 07:44:38.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4209 …}
    +nested: Doctrine\ORM\PersistentCollection {#4211 …}
    +votes: Doctrine\ORM\PersistentCollection {#4213 …}
    +reports: Doctrine\ORM\PersistentCollection {#4215 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
    -id: 317804
    -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ca/comment/6471780"
    +editedAt: DateTimeImmutable @1726123617 {#4203
      date: 2024-09-12 08:46:57.0 +02:00
    }
    +createdAt: DateTimeImmutable @1705532639 {#4204
      date: 2024-01-18 00:03:59.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: """
    Yeah I know some of those words…\n
    \n
    I’m still a newb but I’ll have a look at that link, thanks!
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705537685 {#4793
    date: 2024-01-18 01:28:05.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4796 …}
  +nested: Doctrine\ORM\PersistentCollection {#4798 …}
  +votes: Doctrine\ORM\PersistentCollection {#4800 …}
  +reports: Doctrine\ORM\PersistentCollection {#4802 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
  -id: 317971
  -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7483650"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705537685 {#4794
    date: 2024-01-18 01:28:05.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
47 DENIED edit
App\Entity\EntryComment {#4795
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4208
    +user: App\Entity\User {#4221 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1726206278 {#4202
      date: 2024-09-13 07:44:38.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4209 …}
    +nested: Doctrine\ORM\PersistentCollection {#4211 …}
    +votes: Doctrine\ORM\PersistentCollection {#4213 …}
    +reports: Doctrine\ORM\PersistentCollection {#4215 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
    -id: 317804
    -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ca/comment/6471780"
    +editedAt: DateTimeImmutable @1726123617 {#4203
      date: 2024-09-12 08:46:57.0 +02:00
    }
    +createdAt: DateTimeImmutable @1705532639 {#4204
      date: 2024-01-18 00:03:59.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: """
    Yeah I know some of those words…\n
    \n
    I’m still a newb but I’ll have a look at that link, thanks!
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705537685 {#4793
    date: 2024-01-18 01:28:05.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4796 …}
  +nested: Doctrine\ORM\PersistentCollection {#4798 …}
  +votes: Doctrine\ORM\PersistentCollection {#4800 …}
  +reports: Doctrine\ORM\PersistentCollection {#4802 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
  -id: 317971
  -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7483650"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705537685 {#4794
    date: 2024-01-18 01:28:05.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
48 DENIED moderate
App\Entity\EntryComment {#4795
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4208
    +user: App\Entity\User {#4221 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1726206278 {#4202
      date: 2024-09-13 07:44:38.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4209 …}
    +nested: Doctrine\ORM\PersistentCollection {#4211 …}
    +votes: Doctrine\ORM\PersistentCollection {#4213 …}
    +reports: Doctrine\ORM\PersistentCollection {#4215 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
    -id: 317804
    -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ca/comment/6471780"
    +editedAt: DateTimeImmutable @1726123617 {#4203
      date: 2024-09-12 08:46:57.0 +02:00
    }
    +createdAt: DateTimeImmutable @1705532639 {#4204
      date: 2024-01-18 00:03:59.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: """
    Yeah I know some of those words…\n
    \n
    I’m still a newb but I’ll have a look at that link, thanks!
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705537685 {#4793
    date: 2024-01-18 01:28:05.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4796 …}
  +nested: Doctrine\ORM\PersistentCollection {#4798 …}
  +votes: Doctrine\ORM\PersistentCollection {#4800 …}
  +reports: Doctrine\ORM\PersistentCollection {#4802 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
  -id: 317971
  -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7483650"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705537685 {#4794
    date: 2024-01-18 01:28:05.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
49 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
50 DENIED moderate
App\Entity\EntryComment {#4894
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4795
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4208
      +user: App\Entity\User {#4221 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
      +lang: "en"
      +isAdult: false
      +favouriteCount: 2
      +score: 0
      +lastActive: DateTime @1726206278 {#4202
        date: 2024-09-13 07:44:38.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4209 …}
      +nested: Doctrine\ORM\PersistentCollection {#4211 …}
      +votes: Doctrine\ORM\PersistentCollection {#4213 …}
      +reports: Doctrine\ORM\PersistentCollection {#4215 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
      -id: 317804
      -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ca/comment/6471780"
      +editedAt: DateTimeImmutable @1726123617 {#4203
        date: 2024-09-12 08:46:57.0 +02:00
      }
      +createdAt: DateTimeImmutable @1705532639 {#4204
        date: 2024-01-18 00:03:59.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4208}
    +body: """
      Yeah I know some of those words…\n
      \n
      I’m still a newb but I’ll have a look at that link, thanks!
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1705537685 {#4793
      date: 2024-01-18 01:28:05.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@BCsven@lemmy.ca"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4796 …}
    +nested: Doctrine\ORM\PersistentCollection {#4798 …}
    +votes: Doctrine\ORM\PersistentCollection {#4800 …}
    +reports: Doctrine\ORM\PersistentCollection {#4802 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
    -id: 317971
    -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7483650"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705537685 {#4794
      date: 2024-01-18 01:28:05.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: """
    If you are totally new to wireguard setup, I found that reviewing all of these links gave me a better understanding of how the configuration setup worked. No one site seemed to cover it all, and each on had some good tips or explanation about a certain part of wireguard.\n
    \n
    [golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)\n
    \n
    [emanuelduss.ch/…/wireguard-vpn-road-warrior-setup…](https://emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)\n
    \n
    [docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)\n
    \n
    This Stavros one has the post-up/down IP table modifications for forwarding traffic and your wg device masquerading as any device on the LAN\n
    \n
    [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)\n
    \n
    [www.linode.com/…/set-up-wireguard-vpn-on-ubuntu/](https://www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705539347 {#4892
    date: 2024-01-18 01:55:47.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4895 …}
  +nested: Doctrine\ORM\PersistentCollection {#4897 …}
  +votes: Doctrine\ORM\PersistentCollection {#4899 …}
  +reports: Doctrine\ORM\PersistentCollection {#4901 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4903 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4905 …}
  -id: 318015
  -bodyTs: "'/2018/09/wireguard-vpn-road-warrior-setup/)':58 '/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':53 '/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':95 '/down':70 '/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':90 '/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':61 '/set-up-wireguard-vpn-on-ubuntu':92 '/wireguard-vpn-road-warrior-setup':55 'better':20 'certain':47 'configur':25 'cover':33 'devic':80,84 'docs.sweeting.me':60 'docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':59 'emanuelduss.ch':54,57 'emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)':56 'explan':44 'forward':75 'found':10 'gave':17 'golb.hplar.ch':52 'golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':51 'good':41 'ip':71 'lan':87 'link':16 'masquerad':81 'modif':73 'new':5 'one':29,64 'part':48 'post':68 'post-up':67 'review':12 'seem':31 'setup':8,26 'site':30 'stavro':63 'tabl':72 'tip':42 'total':4 'traffic':76 'understand':21 'wg':79 'wireguard':7,50 'work':27 'www.linode.com':91,94 'www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':93 'www.stavros.io':89 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':88"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6474014"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705539347 {#4893
    date: 2024-01-18 01:55:47.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
51 DENIED edit
App\Entity\EntryComment {#4894
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4795
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4208
      +user: App\Entity\User {#4221 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
      +lang: "en"
      +isAdult: false
      +favouriteCount: 2
      +score: 0
      +lastActive: DateTime @1726206278 {#4202
        date: 2024-09-13 07:44:38.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4209 …}
      +nested: Doctrine\ORM\PersistentCollection {#4211 …}
      +votes: Doctrine\ORM\PersistentCollection {#4213 …}
      +reports: Doctrine\ORM\PersistentCollection {#4215 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
      -id: 317804
      -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ca/comment/6471780"
      +editedAt: DateTimeImmutable @1726123617 {#4203
        date: 2024-09-12 08:46:57.0 +02:00
      }
      +createdAt: DateTimeImmutable @1705532639 {#4204
        date: 2024-01-18 00:03:59.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4208}
    +body: """
      Yeah I know some of those words…\n
      \n
      I’m still a newb but I’ll have a look at that link, thanks!
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1705537685 {#4793
      date: 2024-01-18 01:28:05.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@BCsven@lemmy.ca"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4796 …}
    +nested: Doctrine\ORM\PersistentCollection {#4798 …}
    +votes: Doctrine\ORM\PersistentCollection {#4800 …}
    +reports: Doctrine\ORM\PersistentCollection {#4802 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
    -id: 317971
    -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7483650"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705537685 {#4794
      date: 2024-01-18 01:28:05.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: """
    If you are totally new to wireguard setup, I found that reviewing all of these links gave me a better understanding of how the configuration setup worked. No one site seemed to cover it all, and each on had some good tips or explanation about a certain part of wireguard.\n
    \n
    [golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)\n
    \n
    [emanuelduss.ch/…/wireguard-vpn-road-warrior-setup…](https://emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)\n
    \n
    [docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)\n
    \n
    This Stavros one has the post-up/down IP table modifications for forwarding traffic and your wg device masquerading as any device on the LAN\n
    \n
    [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)\n
    \n
    [www.linode.com/…/set-up-wireguard-vpn-on-ubuntu/](https://www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705539347 {#4892
    date: 2024-01-18 01:55:47.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4895 …}
  +nested: Doctrine\ORM\PersistentCollection {#4897 …}
  +votes: Doctrine\ORM\PersistentCollection {#4899 …}
  +reports: Doctrine\ORM\PersistentCollection {#4901 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4903 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4905 …}
  -id: 318015
  -bodyTs: "'/2018/09/wireguard-vpn-road-warrior-setup/)':58 '/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':53 '/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':95 '/down':70 '/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':90 '/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':61 '/set-up-wireguard-vpn-on-ubuntu':92 '/wireguard-vpn-road-warrior-setup':55 'better':20 'certain':47 'configur':25 'cover':33 'devic':80,84 'docs.sweeting.me':60 'docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':59 'emanuelduss.ch':54,57 'emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)':56 'explan':44 'forward':75 'found':10 'gave':17 'golb.hplar.ch':52 'golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':51 'good':41 'ip':71 'lan':87 'link':16 'masquerad':81 'modif':73 'new':5 'one':29,64 'part':48 'post':68 'post-up':67 'review':12 'seem':31 'setup':8,26 'site':30 'stavro':63 'tabl':72 'tip':42 'total':4 'traffic':76 'understand':21 'wg':79 'wireguard':7,50 'work':27 'www.linode.com':91,94 'www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':93 'www.stavros.io':89 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':88"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6474014"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705539347 {#4893
    date: 2024-01-18 01:55:47.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
52 DENIED moderate
App\Entity\EntryComment {#4894
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4795
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4208
      +user: App\Entity\User {#4221 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
      +lang: "en"
      +isAdult: false
      +favouriteCount: 2
      +score: 0
      +lastActive: DateTime @1726206278 {#4202
        date: 2024-09-13 07:44:38.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4209 …}
      +nested: Doctrine\ORM\PersistentCollection {#4211 …}
      +votes: Doctrine\ORM\PersistentCollection {#4213 …}
      +reports: Doctrine\ORM\PersistentCollection {#4215 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
      -id: 317804
      -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ca/comment/6471780"
      +editedAt: DateTimeImmutable @1726123617 {#4203
        date: 2024-09-12 08:46:57.0 +02:00
      }
      +createdAt: DateTimeImmutable @1705532639 {#4204
        date: 2024-01-18 00:03:59.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4208}
    +body: """
      Yeah I know some of those words…\n
      \n
      I’m still a newb but I’ll have a look at that link, thanks!
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1705537685 {#4793
      date: 2024-01-18 01:28:05.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@BCsven@lemmy.ca"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4796 …}
    +nested: Doctrine\ORM\PersistentCollection {#4798 …}
    +votes: Doctrine\ORM\PersistentCollection {#4800 …}
    +reports: Doctrine\ORM\PersistentCollection {#4802 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
    -id: 317971
    -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7483650"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705537685 {#4794
      date: 2024-01-18 01:28:05.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: """
    If you are totally new to wireguard setup, I found that reviewing all of these links gave me a better understanding of how the configuration setup worked. No one site seemed to cover it all, and each on had some good tips or explanation about a certain part of wireguard.\n
    \n
    [golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)\n
    \n
    [emanuelduss.ch/…/wireguard-vpn-road-warrior-setup…](https://emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)\n
    \n
    [docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)\n
    \n
    This Stavros one has the post-up/down IP table modifications for forwarding traffic and your wg device masquerading as any device on the LAN\n
    \n
    [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)\n
    \n
    [www.linode.com/…/set-up-wireguard-vpn-on-ubuntu/](https://www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705539347 {#4892
    date: 2024-01-18 01:55:47.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4895 …}
  +nested: Doctrine\ORM\PersistentCollection {#4897 …}
  +votes: Doctrine\ORM\PersistentCollection {#4899 …}
  +reports: Doctrine\ORM\PersistentCollection {#4901 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4903 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4905 …}
  -id: 318015
  -bodyTs: "'/2018/09/wireguard-vpn-road-warrior-setup/)':58 '/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':53 '/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':95 '/down':70 '/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':90 '/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':61 '/set-up-wireguard-vpn-on-ubuntu':92 '/wireguard-vpn-road-warrior-setup':55 'better':20 'certain':47 'configur':25 'cover':33 'devic':80,84 'docs.sweeting.me':60 'docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':59 'emanuelduss.ch':54,57 'emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)':56 'explan':44 'forward':75 'found':10 'gave':17 'golb.hplar.ch':52 'golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':51 'good':41 'ip':71 'lan':87 'link':16 'masquerad':81 'modif':73 'new':5 'one':29,64 'part':48 'post':68 'post-up':67 'review':12 'seem':31 'setup':8,26 'site':30 'stavro':63 'tabl':72 'tip':42 'total':4 'traffic':76 'understand':21 'wg':79 'wireguard':7,50 'work':27 'www.linode.com':91,94 'www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':93 'www.stavros.io':89 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':88"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6474014"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705539347 {#4893
    date: 2024-01-18 01:55:47.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
53 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
54 DENIED moderate
App\Entity\EntryComment {#4928
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4894
    +user: App\Entity\User {#4221 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4795
      +user: Proxies\__CG__\App\Entity\User {#1943 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: App\Entity\EntryComment {#4208
        +user: App\Entity\User {#4221 …}
        +entry: App\Entity\Entry {#2388}
        +magazine: App\Entity\Magazine {#266}
        +image: null
        +parent: null
        +root: null
        +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
        +lang: "en"
        +isAdult: false
        +favouriteCount: 2
        +score: 0
        +lastActive: DateTime @1726206278 {#4202
          date: 2024-09-13 07:44:38.0 +02:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@Father_Redbeard@lemmy.ml"
          "@Father_Redbeard@lemmy.ml"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4209 …}
        +nested: Doctrine\ORM\PersistentCollection {#4211 …}
        +votes: Doctrine\ORM\PersistentCollection {#4213 …}
        +reports: Doctrine\ORM\PersistentCollection {#4215 …}
        +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
        +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
        -id: 317804
        -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://lemmy.ca/comment/6471780"
        +editedAt: DateTimeImmutable @1726123617 {#4203
          date: 2024-09-12 08:46:57.0 +02:00
        }
        +createdAt: DateTimeImmutable @1705532639 {#4204
          date: 2024-01-18 00:03:59.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4208}
      +body: """
        Yeah I know some of those words…\n
        \n
        I’m still a newb but I’ll have a look at that link, thanks!
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1705537685 {#4793
        date: 2024-01-18 01:28:05.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
        "@BCsven@lemmy.ca"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4796 …}
      +nested: Doctrine\ORM\PersistentCollection {#4798 …}
      +votes: Doctrine\ORM\PersistentCollection {#4800 …}
      +reports: Doctrine\ORM\PersistentCollection {#4802 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
      -id: 317971
      -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/7483650"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705537685 {#4794
        date: 2024-01-18 01:28:05.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4208}
    +body: """
      If you are totally new to wireguard setup, I found that reviewing all of these links gave me a better understanding of how the configuration setup worked. No one site seemed to cover it all, and each on had some good tips or explanation about a certain part of wireguard.\n
      \n
      [golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)\n
      \n
      [emanuelduss.ch/…/wireguard-vpn-road-warrior-setup…](https://emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)\n
      \n
      [docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)\n
      \n
      This Stavros one has the post-up/down IP table modifications for forwarding traffic and your wg device masquerading as any device on the LAN\n
      \n
      [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)\n
      \n
      [www.linode.com/…/set-up-wireguard-vpn-on-ubuntu/](https://www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1705539347 {#4892
      date: 2024-01-18 01:55:47.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@BCsven@lemmy.ca"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4895 …}
    +nested: Doctrine\ORM\PersistentCollection {#4897 …}
    +votes: Doctrine\ORM\PersistentCollection {#4899 …}
    +reports: Doctrine\ORM\PersistentCollection {#4901 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4903 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4905 …}
    -id: 318015
    -bodyTs: "'/2018/09/wireguard-vpn-road-warrior-setup/)':58 '/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':53 '/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':95 '/down':70 '/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':90 '/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':61 '/set-up-wireguard-vpn-on-ubuntu':92 '/wireguard-vpn-road-warrior-setup':55 'better':20 'certain':47 'configur':25 'cover':33 'devic':80,84 'docs.sweeting.me':60 'docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':59 'emanuelduss.ch':54,57 'emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)':56 'explan':44 'forward':75 'found':10 'gave':17 'golb.hplar.ch':52 'golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':51 'good':41 'ip':71 'lan':87 'link':16 'masquerad':81 'modif':73 'new':5 'one':29,64 'part':48 'post':68 'post-up':67 'review':12 'seem':31 'setup':8,26 'site':30 'stavro':63 'tabl':72 'tip':42 'total':4 'traffic':76 'understand':21 'wg':79 'wireguard':7,50 'work':27 'www.linode.com':91,94 'www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':93 'www.stavros.io':89 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':88"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ca/comment/6474014"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705539347 {#4893
      date: 2024-01-18 01:55:47.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: "That great, thanks for the info. I was able to get Wireguard setup in unraid but they make it pretty easy, so I didn’t have a problem. I just didn’t think about connecting to the entire network, not just the server."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705542451 {#4927
    date: 2024-01-18 02:47:31.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4931 …}
  +nested: Doctrine\ORM\PersistentCollection {#4936 …}
  +votes: Doctrine\ORM\PersistentCollection {#4932 …}
  +reports: Doctrine\ORM\PersistentCollection {#4938 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4940 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4942 …}
  -id: 318113
  -bodyTs: "'abl':9 'connect':35 'didn':24,31 'easi':21 'entir':38 'get':11 'great':2 'info':6 'make':18 'network':39 'pretti':20 'problem':28 'server':43 'setup':13 'thank':3 'think':33 'unraid':15 'wireguard':12"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7485357"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705542451 {#4924
    date: 2024-01-18 02:47:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
55 DENIED edit
App\Entity\EntryComment {#4928
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4894
    +user: App\Entity\User {#4221 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4795
      +user: Proxies\__CG__\App\Entity\User {#1943 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: App\Entity\EntryComment {#4208
        +user: App\Entity\User {#4221 …}
        +entry: App\Entity\Entry {#2388}
        +magazine: App\Entity\Magazine {#266}
        +image: null
        +parent: null
        +root: null
        +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
        +lang: "en"
        +isAdult: false
        +favouriteCount: 2
        +score: 0
        +lastActive: DateTime @1726206278 {#4202
          date: 2024-09-13 07:44:38.0 +02:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@Father_Redbeard@lemmy.ml"
          "@Father_Redbeard@lemmy.ml"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4209 …}
        +nested: Doctrine\ORM\PersistentCollection {#4211 …}
        +votes: Doctrine\ORM\PersistentCollection {#4213 …}
        +reports: Doctrine\ORM\PersistentCollection {#4215 …}
        +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
        +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
        -id: 317804
        -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://lemmy.ca/comment/6471780"
        +editedAt: DateTimeImmutable @1726123617 {#4203
          date: 2024-09-12 08:46:57.0 +02:00
        }
        +createdAt: DateTimeImmutable @1705532639 {#4204
          date: 2024-01-18 00:03:59.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4208}
      +body: """
        Yeah I know some of those words…\n
        \n
        I’m still a newb but I’ll have a look at that link, thanks!
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1705537685 {#4793
        date: 2024-01-18 01:28:05.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
        "@BCsven@lemmy.ca"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4796 …}
      +nested: Doctrine\ORM\PersistentCollection {#4798 …}
      +votes: Doctrine\ORM\PersistentCollection {#4800 …}
      +reports: Doctrine\ORM\PersistentCollection {#4802 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
      -id: 317971
      -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/7483650"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705537685 {#4794
        date: 2024-01-18 01:28:05.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4208}
    +body: """
      If you are totally new to wireguard setup, I found that reviewing all of these links gave me a better understanding of how the configuration setup worked. No one site seemed to cover it all, and each on had some good tips or explanation about a certain part of wireguard.\n
      \n
      [golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)\n
      \n
      [emanuelduss.ch/…/wireguard-vpn-road-warrior-setup…](https://emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)\n
      \n
      [docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)\n
      \n
      This Stavros one has the post-up/down IP table modifications for forwarding traffic and your wg device masquerading as any device on the LAN\n
      \n
      [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)\n
      \n
      [www.linode.com/…/set-up-wireguard-vpn-on-ubuntu/](https://www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1705539347 {#4892
      date: 2024-01-18 01:55:47.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@BCsven@lemmy.ca"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4895 …}
    +nested: Doctrine\ORM\PersistentCollection {#4897 …}
    +votes: Doctrine\ORM\PersistentCollection {#4899 …}
    +reports: Doctrine\ORM\PersistentCollection {#4901 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4903 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4905 …}
    -id: 318015
    -bodyTs: "'/2018/09/wireguard-vpn-road-warrior-setup/)':58 '/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':53 '/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':95 '/down':70 '/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':90 '/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':61 '/set-up-wireguard-vpn-on-ubuntu':92 '/wireguard-vpn-road-warrior-setup':55 'better':20 'certain':47 'configur':25 'cover':33 'devic':80,84 'docs.sweeting.me':60 'docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':59 'emanuelduss.ch':54,57 'emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)':56 'explan':44 'forward':75 'found':10 'gave':17 'golb.hplar.ch':52 'golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':51 'good':41 'ip':71 'lan':87 'link':16 'masquerad':81 'modif':73 'new':5 'one':29,64 'part':48 'post':68 'post-up':67 'review':12 'seem':31 'setup':8,26 'site':30 'stavro':63 'tabl':72 'tip':42 'total':4 'traffic':76 'understand':21 'wg':79 'wireguard':7,50 'work':27 'www.linode.com':91,94 'www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':93 'www.stavros.io':89 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':88"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ca/comment/6474014"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705539347 {#4893
      date: 2024-01-18 01:55:47.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: "That great, thanks for the info. I was able to get Wireguard setup in unraid but they make it pretty easy, so I didn’t have a problem. I just didn’t think about connecting to the entire network, not just the server."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705542451 {#4927
    date: 2024-01-18 02:47:31.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4931 …}
  +nested: Doctrine\ORM\PersistentCollection {#4936 …}
  +votes: Doctrine\ORM\PersistentCollection {#4932 …}
  +reports: Doctrine\ORM\PersistentCollection {#4938 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4940 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4942 …}
  -id: 318113
  -bodyTs: "'abl':9 'connect':35 'didn':24,31 'easi':21 'entir':38 'get':11 'great':2 'info':6 'make':18 'network':39 'pretti':20 'problem':28 'server':43 'setup':13 'thank':3 'think':33 'unraid':15 'wireguard':12"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7485357"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705542451 {#4924
    date: 2024-01-18 02:47:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
56 DENIED moderate
App\Entity\EntryComment {#4928
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4894
    +user: App\Entity\User {#4221 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4795
      +user: Proxies\__CG__\App\Entity\User {#1943 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: App\Entity\EntryComment {#4208
        +user: App\Entity\User {#4221 …}
        +entry: App\Entity\Entry {#2388}
        +magazine: App\Entity\Magazine {#266}
        +image: null
        +parent: null
        +root: null
        +body: "Adding a wireguard system that has iptables adjuated to include forwarding and masquerading will allow your single wireguard connection to see the rest of your LAN [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)"
        +lang: "en"
        +isAdult: false
        +favouriteCount: 2
        +score: 0
        +lastActive: DateTime @1726206278 {#4202
          date: 2024-09-13 07:44:38.0 +02:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@Father_Redbeard@lemmy.ml"
          "@Father_Redbeard@lemmy.ml"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4209 …}
        +nested: Doctrine\ORM\PersistentCollection {#4211 …}
        +votes: Doctrine\ORM\PersistentCollection {#4213 …}
        +reports: Doctrine\ORM\PersistentCollection {#4215 …}
        +favourites: Doctrine\ORM\PersistentCollection {#4217 …}
        +notifications: Doctrine\ORM\PersistentCollection {#4219 …}
        -id: 317804
        -bodyTs: "'/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':29 'ad':1 'adjuat':8 'allow':15 'connect':19 'forward':11 'includ':10 'iptabl':7 'lan':26 'masquerad':13 'rest':23 'see':21 'singl':17 'system':4 'wireguard':3,18 'www.stavros.io':28 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':27"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://lemmy.ca/comment/6471780"
        +editedAt: DateTimeImmutable @1726123617 {#4203
          date: 2024-09-12 08:46:57.0 +02:00
        }
        +createdAt: DateTimeImmutable @1705532639 {#4204
          date: 2024-01-18 00:03:59.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4208}
      +body: """
        Yeah I know some of those words…\n
        \n
        I’m still a newb but I’ll have a look at that link, thanks!
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1705537685 {#4793
        date: 2024-01-18 01:28:05.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
        "@BCsven@lemmy.ca"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4796 …}
      +nested: Doctrine\ORM\PersistentCollection {#4798 …}
      +votes: Doctrine\ORM\PersistentCollection {#4800 …}
      +reports: Doctrine\ORM\PersistentCollection {#4802 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4804 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4806 …}
      -id: 317971
      -bodyTs: "'know':3 'link':21 'll':15 'look':18 'm':9 'newb':12 'still':10 'thank':22 'word':7 'yeah':1"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/7483650"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705537685 {#4794
        date: 2024-01-18 01:28:05.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4208}
    +body: """
      If you are totally new to wireguard setup, I found that reviewing all of these links gave me a better understanding of how the configuration setup worked. No one site seemed to cover it all, and each on had some good tips or explanation about a certain part of wireguard.\n
      \n
      [golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)\n
      \n
      [emanuelduss.ch/…/wireguard-vpn-road-warrior-setup…](https://emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)\n
      \n
      [docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)\n
      \n
      This Stavros one has the post-up/down IP table modifications for forwarding traffic and your wg device masquerading as any device on the LAN\n
      \n
      [www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)\n
      \n
      [www.linode.com/…/set-up-wireguard-vpn-on-ubuntu/](https://www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1705539347 {#4892
      date: 2024-01-18 01:55:47.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@BCsven@lemmy.ca"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4895 …}
    +nested: Doctrine\ORM\PersistentCollection {#4897 …}
    +votes: Doctrine\ORM\PersistentCollection {#4899 …}
    +reports: Doctrine\ORM\PersistentCollection {#4901 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4903 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4905 …}
    -id: 318015
    -bodyTs: "'/2018/09/wireguard-vpn-road-warrior-setup/)':58 '/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':53 '/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':95 '/down':70 '/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':90 '/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':61 '/set-up-wireguard-vpn-on-ubuntu':92 '/wireguard-vpn-road-warrior-setup':55 'better':20 'certain':47 'configur':25 'cover':33 'devic':80,84 'docs.sweeting.me':60 'docs.sweeting.me/s/wireguard#](https://docs.sweeting.me/s/wireguard#)':59 'emanuelduss.ch':54,57 'emanuelduss.ch/2018/09/wireguard-vpn-road-warrior-setup/)':56 'explan':44 'forward':75 'found':10 'gave':17 'golb.hplar.ch':52 'golb.hplar.ch/2019/07/wireguard-windows.html](https://golb.hplar.ch/2019/07/wireguard-windows.html)':51 'good':41 'ip':71 'lan':87 'link':16 'masquerad':81 'modif':73 'new':5 'one':29,64 'part':48 'post':68 'post-up':67 'review':12 'seem':31 'setup':8,26 'site':30 'stavro':63 'tabl':72 'tip':42 'total':4 'traffic':76 'understand':21 'wg':79 'wireguard':7,50 'work':27 'www.linode.com':91,94 'www.linode.com/docs/networking/vpn/set-up-wireguard-vpn-on-ubuntu/)':93 'www.stavros.io':89 'www.stavros.io/posts/how-to-configure-wireguard/](https://www.stavros.io/posts/how-to-configure-wireguard/)':88"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ca/comment/6474014"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705539347 {#4893
      date: 2024-01-18 01:55:47.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4208}
  +body: "That great, thanks for the info. I was able to get Wireguard setup in unraid but they make it pretty easy, so I didn’t have a problem. I just didn’t think about connecting to the entire network, not just the server."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705542451 {#4927
    date: 2024-01-18 02:47:31.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@BCsven@lemmy.ca"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4931 …}
  +nested: Doctrine\ORM\PersistentCollection {#4936 …}
  +votes: Doctrine\ORM\PersistentCollection {#4932 …}
  +reports: Doctrine\ORM\PersistentCollection {#4938 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4940 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4942 …}
  -id: 318113
  -bodyTs: "'abl':9 'connect':35 'didn':24,31 'easi':21 'entir':38 'get':11 'great':2 'info':6 'make':18 'network':39 'pretti':20 'problem':28 'server':43 'setup':13 'thank':3 'think':33 'unraid':15 'wireguard':12"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7485357"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705542451 {#4924
    date: 2024-01-18 02:47:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
57 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
58 DENIED moderate
App\Entity\EntryComment {#4281
  +user: App\Entity\User {#4294 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    openvpn is a decent standard, no reason it wont or shouldnt work.\n
    \n
    seems like a lot of pis...ever thought of consolidating them into containers in a single box?
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1726129764 {#4276
    date: 2024-09-12 10:29:24.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4282 …}
  +nested: Doctrine\ORM\PersistentCollection {#4284 …}
  +votes: Doctrine\ORM\PersistentCollection {#4286 …}
  +reports: Doctrine\ORM\PersistentCollection {#4288 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
  -id: 317740
  -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705530598 {#4277
    date: 2024-01-17 23:29:58.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
59 DENIED edit
App\Entity\EntryComment {#4281
  +user: App\Entity\User {#4294 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    openvpn is a decent standard, no reason it wont or shouldnt work.\n
    \n
    seems like a lot of pis...ever thought of consolidating them into containers in a single box?
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1726129764 {#4276
    date: 2024-09-12 10:29:24.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4282 …}
  +nested: Doctrine\ORM\PersistentCollection {#4284 …}
  +votes: Doctrine\ORM\PersistentCollection {#4286 …}
  +reports: Doctrine\ORM\PersistentCollection {#4288 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
  -id: 317740
  -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705530598 {#4277
    date: 2024-01-17 23:29:58.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
60 DENIED moderate
App\Entity\EntryComment {#4281
  +user: App\Entity\User {#4294 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    openvpn is a decent standard, no reason it wont or shouldnt work.\n
    \n
    seems like a lot of pis...ever thought of consolidating them into containers in a single box?
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1726129764 {#4276
    date: 2024-09-12 10:29:24.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4282 …}
  +nested: Doctrine\ORM\PersistentCollection {#4284 …}
  +votes: Doctrine\ORM\PersistentCollection {#4286 …}
  +reports: Doctrine\ORM\PersistentCollection {#4288 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
  -id: 317740
  -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705530598 {#4277
    date: 2024-01-17 23:29:58.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
61 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
62 DENIED moderate
App\Entity\EntryComment {#4749
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4281
    +user: App\Entity\User {#4294 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      openvpn is a decent standard, no reason it wont or shouldnt work.\n
      \n
      seems like a lot of pis...ever thought of consolidating them into containers in a single box?
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1726129764 {#4276
      date: 2024-09-12 10:29:24.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4282 …}
    +nested: Doctrine\ORM\PersistentCollection {#4284 …}
    +votes: Doctrine\ORM\PersistentCollection {#4286 …}
    +reports: Doctrine\ORM\PersistentCollection {#4288 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
    -id: 317740
    -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705530598 {#4277
      date: 2024-01-17 23:29:58.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4281}
  +body: "Most services are on the unraid box. But I had a pi running Pi-hole for a long time (switched to adguardhome) and wanted that separate from the main server in case it went down. Pis boot up a lot faster than my server hardware and then you still need to start the array and mount drives. Having AGH on a Pi as primary DNS means minimal internet outages caused by my tinkering. I was given the 4 and put it in a really cool case that can fit a M.2 or 2.5" SSD and boot from it. So that is NextcloudPi and AGH. The 3 is because my 3d printer is nowhere near a LAN connection and 3 has WiFi. The 4 is sitting next to my router. We won’t mention the 1B I’ve been messing with too…"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705532781 {#4747
    date: 2024-01-18 00:06:21.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@originalucifer@moist.catsweat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4750 …}
  +nested: Doctrine\ORM\PersistentCollection {#4752 …}
  +votes: Doctrine\ORM\PersistentCollection {#4754 …}
  +reports: Doctrine\ORM\PersistentCollection {#4756 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4758 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4760 …}
  -id: 317812
  -bodyTs: "'1b':136 '2.5':94 '3':107,120 '3d':111 '4':79,124 'adguardhom':23 'agh':60,105 'array':55 'boot':38,97 'box':7 'case':33,87 'caus':71 'connect':118 'cool':86 'dns':66 'drive':58 'faster':42 'fit':90 'given':77 'hardwar':46 'hole':16 'internet':69 'lan':117 'long':19 'lot':41 'm.2':92 'main':30 'mean':67 'mention':134 'mess':140 'minim':68 'mount':57 'near':115 'need':51 'next':127 'nextcloudpi':103 'nowher':114 'outag':70 'pi':12,15,63 'pi-hol':14 'pis':37 'primari':65 'printer':112 'put':81 'realli':85 'router':130 'run':13 'separ':27 'server':31,45 'servic':2 'sit':126 'ssd':95 'start':53 'still':50 'switch':21 'time':20 'tinker':74 'unraid':6 've':138 'want':25 'went':35 'wifi':122 'won':132"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7481824"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705532781 {#4748
    date: 2024-01-18 00:06:21.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
63 DENIED edit
App\Entity\EntryComment {#4749
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4281
    +user: App\Entity\User {#4294 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      openvpn is a decent standard, no reason it wont or shouldnt work.\n
      \n
      seems like a lot of pis...ever thought of consolidating them into containers in a single box?
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1726129764 {#4276
      date: 2024-09-12 10:29:24.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4282 …}
    +nested: Doctrine\ORM\PersistentCollection {#4284 …}
    +votes: Doctrine\ORM\PersistentCollection {#4286 …}
    +reports: Doctrine\ORM\PersistentCollection {#4288 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
    -id: 317740
    -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705530598 {#4277
      date: 2024-01-17 23:29:58.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4281}
  +body: "Most services are on the unraid box. But I had a pi running Pi-hole for a long time (switched to adguardhome) and wanted that separate from the main server in case it went down. Pis boot up a lot faster than my server hardware and then you still need to start the array and mount drives. Having AGH on a Pi as primary DNS means minimal internet outages caused by my tinkering. I was given the 4 and put it in a really cool case that can fit a M.2 or 2.5" SSD and boot from it. So that is NextcloudPi and AGH. The 3 is because my 3d printer is nowhere near a LAN connection and 3 has WiFi. The 4 is sitting next to my router. We won’t mention the 1B I’ve been messing with too…"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705532781 {#4747
    date: 2024-01-18 00:06:21.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@originalucifer@moist.catsweat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4750 …}
  +nested: Doctrine\ORM\PersistentCollection {#4752 …}
  +votes: Doctrine\ORM\PersistentCollection {#4754 …}
  +reports: Doctrine\ORM\PersistentCollection {#4756 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4758 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4760 …}
  -id: 317812
  -bodyTs: "'1b':136 '2.5':94 '3':107,120 '3d':111 '4':79,124 'adguardhom':23 'agh':60,105 'array':55 'boot':38,97 'box':7 'case':33,87 'caus':71 'connect':118 'cool':86 'dns':66 'drive':58 'faster':42 'fit':90 'given':77 'hardwar':46 'hole':16 'internet':69 'lan':117 'long':19 'lot':41 'm.2':92 'main':30 'mean':67 'mention':134 'mess':140 'minim':68 'mount':57 'near':115 'need':51 'next':127 'nextcloudpi':103 'nowher':114 'outag':70 'pi':12,15,63 'pi-hol':14 'pis':37 'primari':65 'printer':112 'put':81 'realli':85 'router':130 'run':13 'separ':27 'server':31,45 'servic':2 'sit':126 'ssd':95 'start':53 'still':50 'switch':21 'time':20 'tinker':74 'unraid':6 've':138 'want':25 'went':35 'wifi':122 'won':132"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7481824"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705532781 {#4748
    date: 2024-01-18 00:06:21.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
64 DENIED moderate
App\Entity\EntryComment {#4749
  +user: Proxies\__CG__\App\Entity\User {#1943 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4281
    +user: App\Entity\User {#4294 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: null
    +root: null
    +body: """
      openvpn is a decent standard, no reason it wont or shouldnt work.\n
      \n
      seems like a lot of pis...ever thought of consolidating them into containers in a single box?
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1726129764 {#4276
      date: 2024-09-12 10:29:24.0 +02:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4282 …}
    +nested: Doctrine\ORM\PersistentCollection {#4284 …}
    +votes: Doctrine\ORM\PersistentCollection {#4286 …}
    +reports: Doctrine\ORM\PersistentCollection {#4288 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
    -id: 317740
    -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705530598 {#4277
      date: 2024-01-17 23:29:58.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4281}
  +body: "Most services are on the unraid box. But I had a pi running Pi-hole for a long time (switched to adguardhome) and wanted that separate from the main server in case it went down. Pis boot up a lot faster than my server hardware and then you still need to start the array and mount drives. Having AGH on a Pi as primary DNS means minimal internet outages caused by my tinkering. I was given the 4 and put it in a really cool case that can fit a M.2 or 2.5" SSD and boot from it. So that is NextcloudPi and AGH. The 3 is because my 3d printer is nowhere near a LAN connection and 3 has WiFi. The 4 is sitting next to my router. We won’t mention the 1B I’ve been messing with too…"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705532781 {#4747
    date: 2024-01-18 00:06:21.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@originalucifer@moist.catsweat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4750 …}
  +nested: Doctrine\ORM\PersistentCollection {#4752 …}
  +votes: Doctrine\ORM\PersistentCollection {#4754 …}
  +reports: Doctrine\ORM\PersistentCollection {#4756 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4758 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4760 …}
  -id: 317812
  -bodyTs: "'1b':136 '2.5':94 '3':107,120 '3d':111 '4':79,124 'adguardhom':23 'agh':60,105 'array':55 'boot':38,97 'box':7 'case':33,87 'caus':71 'connect':118 'cool':86 'dns':66 'drive':58 'faster':42 'fit':90 'given':77 'hardwar':46 'hole':16 'internet':69 'lan':117 'long':19 'lot':41 'm.2':92 'main':30 'mean':67 'mention':134 'mess':140 'minim':68 'mount':57 'near':115 'need':51 'next':127 'nextcloudpi':103 'nowher':114 'outag':70 'pi':12,15,63 'pi-hol':14 'pis':37 'primari':65 'printer':112 'put':81 'realli':85 'router':130 'run':13 'separ':27 'server':31,45 'servic':2 'sit':126 'ssd':95 'start':53 'still':50 'switch':21 'time':20 'tinker':74 'unraid':6 've':138 'want':25 'went':35 'wifi':122 'won':132"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7481824"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705532781 {#4748
    date: 2024-01-18 00:06:21.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
65 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
66 DENIED moderate
App\Entity\EntryComment {#4879
  +user: App\Entity\User {#4294 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4749
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4281
      +user: App\Entity\User {#4294 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: """
        openvpn is a decent standard, no reason it wont or shouldnt work.\n
        \n
        seems like a lot of pis...ever thought of consolidating them into containers in a single box?
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1726129764 {#4276
        date: 2024-09-12 10:29:24.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4282 …}
      +nested: Doctrine\ORM\PersistentCollection {#4284 …}
      +votes: Doctrine\ORM\PersistentCollection {#4286 …}
      +reports: Doctrine\ORM\PersistentCollection {#4288 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
      -id: 317740
      -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705530598 {#4277
        date: 2024-01-17 23:29:58.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4281}
    +body: "Most services are on the unraid box. But I had a pi running Pi-hole for a long time (switched to adguardhome) and wanted that separate from the main server in case it went down. Pis boot up a lot faster than my server hardware and then you still need to start the array and mount drives. Having AGH on a Pi as primary DNS means minimal internet outages caused by my tinkering. I was given the 4 and put it in a really cool case that can fit a M.2 or 2.5" SSD and boot from it. So that is NextcloudPi and AGH. The 3 is because my 3d printer is nowhere near a LAN connection and 3 has WiFi. The 4 is sitting next to my router. We won’t mention the 1B I’ve been messing with too…"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1705532781 {#4747
      date: 2024-01-18 00:06:21.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@originalucifer@moist.catsweat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4750 …}
    +nested: Doctrine\ORM\PersistentCollection {#4752 …}
    +votes: Doctrine\ORM\PersistentCollection {#4754 …}
    +reports: Doctrine\ORM\PersistentCollection {#4756 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4758 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4760 …}
    -id: 317812
    -bodyTs: "'1b':136 '2.5':94 '3':107,120 '3d':111 '4':79,124 'adguardhom':23 'agh':60,105 'array':55 'boot':38,97 'box':7 'case':33,87 'caus':71 'connect':118 'cool':86 'dns':66 'drive':58 'faster':42 'fit':90 'given':77 'hardwar':46 'hole':16 'internet':69 'lan':117 'long':19 'lot':41 'm.2':92 'main':30 'mean':67 'mention':134 'mess':140 'minim':68 'mount':57 'near':115 'need':51 'next':127 'nextcloudpi':103 'nowher':114 'outag':70 'pi':12,15,63 'pi-hol':14 'pis':37 'primari':65 'printer':112 'put':81 'realli':85 'router':130 'run':13 'separ':27 'server':31,45 'servic':2 'sit':126 'ssd':95 'start':53 'still':50 'switch':21 'time':20 'tinker':74 'unraid':6 've':138 'want':25 'went':35 'wifi':122 'won':132"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7481824"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705532781 {#4748
      date: 2024-01-18 00:06:21.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4281}
  +body: """
    ha, thats great! i got a couple of old dell R920s mirrored for ha, they take foreeever to boot.\n
    \n
    but those containers, damn i love bein able to slap those containers around like theyre nothing... most restart in seconds
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705533574 {#4877
    date: 2024-01-18 00:19:34.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@originalucifer@moist.catsweat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4880 …}
  +nested: Doctrine\ORM\PersistentCollection {#4882 …}
  +votes: Doctrine\ORM\PersistentCollection {#4884 …}
  +reports: Doctrine\ORM\PersistentCollection {#4886 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4888 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4890 …}
  -id: 317837
  -bodyTs: "'abl':27 'around':32 'bein':26 'boot':19 'contain':22,31 'coupl':7 'damn':23 'dell':10 'foreeev':17 'got':5 'great':3 'ha':1,14 'like':33 'love':25 'mirror':12 'noth':35 'old':9 'r920s':11 'restart':37 'second':39 'slap':29 'take':16 'that':2 'theyr':34"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1266314"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705533574 {#4878
    date: 2024-01-18 00:19:34.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
67 DENIED edit
App\Entity\EntryComment {#4879
  +user: App\Entity\User {#4294 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4749
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4281
      +user: App\Entity\User {#4294 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: """
        openvpn is a decent standard, no reason it wont or shouldnt work.\n
        \n
        seems like a lot of pis...ever thought of consolidating them into containers in a single box?
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1726129764 {#4276
        date: 2024-09-12 10:29:24.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4282 …}
      +nested: Doctrine\ORM\PersistentCollection {#4284 …}
      +votes: Doctrine\ORM\PersistentCollection {#4286 …}
      +reports: Doctrine\ORM\PersistentCollection {#4288 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
      -id: 317740
      -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705530598 {#4277
        date: 2024-01-17 23:29:58.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4281}
    +body: "Most services are on the unraid box. But I had a pi running Pi-hole for a long time (switched to adguardhome) and wanted that separate from the main server in case it went down. Pis boot up a lot faster than my server hardware and then you still need to start the array and mount drives. Having AGH on a Pi as primary DNS means minimal internet outages caused by my tinkering. I was given the 4 and put it in a really cool case that can fit a M.2 or 2.5" SSD and boot from it. So that is NextcloudPi and AGH. The 3 is because my 3d printer is nowhere near a LAN connection and 3 has WiFi. The 4 is sitting next to my router. We won’t mention the 1B I’ve been messing with too…"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1705532781 {#4747
      date: 2024-01-18 00:06:21.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@originalucifer@moist.catsweat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4750 …}
    +nested: Doctrine\ORM\PersistentCollection {#4752 …}
    +votes: Doctrine\ORM\PersistentCollection {#4754 …}
    +reports: Doctrine\ORM\PersistentCollection {#4756 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4758 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4760 …}
    -id: 317812
    -bodyTs: "'1b':136 '2.5':94 '3':107,120 '3d':111 '4':79,124 'adguardhom':23 'agh':60,105 'array':55 'boot':38,97 'box':7 'case':33,87 'caus':71 'connect':118 'cool':86 'dns':66 'drive':58 'faster':42 'fit':90 'given':77 'hardwar':46 'hole':16 'internet':69 'lan':117 'long':19 'lot':41 'm.2':92 'main':30 'mean':67 'mention':134 'mess':140 'minim':68 'mount':57 'near':115 'need':51 'next':127 'nextcloudpi':103 'nowher':114 'outag':70 'pi':12,15,63 'pi-hol':14 'pis':37 'primari':65 'printer':112 'put':81 'realli':85 'router':130 'run':13 'separ':27 'server':31,45 'servic':2 'sit':126 'ssd':95 'start':53 'still':50 'switch':21 'time':20 'tinker':74 'unraid':6 've':138 'want':25 'went':35 'wifi':122 'won':132"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7481824"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705532781 {#4748
      date: 2024-01-18 00:06:21.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4281}
  +body: """
    ha, thats great! i got a couple of old dell R920s mirrored for ha, they take foreeever to boot.\n
    \n
    but those containers, damn i love bein able to slap those containers around like theyre nothing... most restart in seconds
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705533574 {#4877
    date: 2024-01-18 00:19:34.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@originalucifer@moist.catsweat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4880 …}
  +nested: Doctrine\ORM\PersistentCollection {#4882 …}
  +votes: Doctrine\ORM\PersistentCollection {#4884 …}
  +reports: Doctrine\ORM\PersistentCollection {#4886 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4888 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4890 …}
  -id: 317837
  -bodyTs: "'abl':27 'around':32 'bein':26 'boot':19 'contain':22,31 'coupl':7 'damn':23 'dell':10 'foreeev':17 'got':5 'great':3 'ha':1,14 'like':33 'love':25 'mirror':12 'noth':35 'old':9 'r920s':11 'restart':37 'second':39 'slap':29 'take':16 'that':2 'theyr':34"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1266314"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705533574 {#4878
    date: 2024-01-18 00:19:34.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
68 DENIED moderate
App\Entity\EntryComment {#4879
  +user: App\Entity\User {#4294 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4749
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4281
      +user: App\Entity\User {#4294 …}
      +entry: App\Entity\Entry {#2388}
      +magazine: App\Entity\Magazine {#266}
      +image: null
      +parent: null
      +root: null
      +body: """
        openvpn is a decent standard, no reason it wont or shouldnt work.\n
        \n
        seems like a lot of pis...ever thought of consolidating them into containers in a single box?
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1726129764 {#4276
        date: 2024-09-12 10:29:24.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@Father_Redbeard@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4282 …}
      +nested: Doctrine\ORM\PersistentCollection {#4284 …}
      +votes: Doctrine\ORM\PersistentCollection {#4286 …}
      +reports: Doctrine\ORM\PersistentCollection {#4288 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4290 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4292 …}
      -id: 317740
      -bodyTs: "'box':29 'consolid':22 'contain':25 'decent':4 'ever':19 'like':14 'lot':16 'openvpn':1 'pis':18 'reason':7 'seem':13 'shouldnt':11 'singl':28 'standard':5 'thought':20 'wont':9 'work':12"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1265883"
      +editedAt: null
      +createdAt: DateTimeImmutable @1705530598 {#4277
        date: 2024-01-17 23:29:58.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4281}
    +body: "Most services are on the unraid box. But I had a pi running Pi-hole for a long time (switched to adguardhome) and wanted that separate from the main server in case it went down. Pis boot up a lot faster than my server hardware and then you still need to start the array and mount drives. Having AGH on a Pi as primary DNS means minimal internet outages caused by my tinkering. I was given the 4 and put it in a really cool case that can fit a M.2 or 2.5" SSD and boot from it. So that is NextcloudPi and AGH. The 3 is because my 3d printer is nowhere near a LAN connection and 3 has WiFi. The 4 is sitting next to my router. We won’t mention the 1B I’ve been messing with too…"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1705532781 {#4747
      date: 2024-01-18 00:06:21.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@originalucifer@moist.catsweat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4750 …}
    +nested: Doctrine\ORM\PersistentCollection {#4752 …}
    +votes: Doctrine\ORM\PersistentCollection {#4754 …}
    +reports: Doctrine\ORM\PersistentCollection {#4756 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4758 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4760 …}
    -id: 317812
    -bodyTs: "'1b':136 '2.5':94 '3':107,120 '3d':111 '4':79,124 'adguardhom':23 'agh':60,105 'array':55 'boot':38,97 'box':7 'case':33,87 'caus':71 'connect':118 'cool':86 'dns':66 'drive':58 'faster':42 'fit':90 'given':77 'hardwar':46 'hole':16 'internet':69 'lan':117 'long':19 'lot':41 'm.2':92 'main':30 'mean':67 'mention':134 'mess':140 'minim':68 'mount':57 'near':115 'need':51 'next':127 'nextcloudpi':103 'nowher':114 'outag':70 'pi':12,15,63 'pi-hol':14 'pis':37 'primari':65 'printer':112 'put':81 'realli':85 'router':130 'run':13 'separ':27 'server':31,45 'servic':2 'sit':126 'ssd':95 'start':53 'still':50 'switch':21 'time':20 'tinker':74 'unraid':6 've':138 'want':25 'went':35 'wifi':122 'won':132"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7481824"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705532781 {#4748
      date: 2024-01-18 00:06:21.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4281}
  +body: """
    ha, thats great! i got a couple of old dell R920s mirrored for ha, they take foreeever to boot.\n
    \n
    but those containers, damn i love bein able to slap those containers around like theyre nothing... most restart in seconds
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705533574 {#4877
    date: 2024-01-18 00:19:34.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@originalucifer@moist.catsweat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4880 …}
  +nested: Doctrine\ORM\PersistentCollection {#4882 …}
  +votes: Doctrine\ORM\PersistentCollection {#4884 …}
  +reports: Doctrine\ORM\PersistentCollection {#4886 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4888 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4890 …}
  -id: 317837
  -bodyTs: "'abl':27 'around':32 'bein':26 'boot':19 'contain':22,31 'coupl':7 'damn':23 'dell':10 'foreeev':17 'got':5 'great':3 'ha':1,14 'like':33 'love':25 'mirror':12 'noth':35 'old':9 'r920s':11 'restart':37 'second':39 'slap':29 'take':16 'that':2 'theyr':34"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://moist.catsweat.com/m/selfhosted@lemmy.world/t/133009/-/comment/1266314"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705533574 {#4878
    date: 2024-01-18 00:19:34.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
69 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
70 DENIED moderate
App\Entity\EntryComment {#4727
  +user: Proxies\__CG__\App\Entity\User {#4733 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4356 …}
  +root: App\Entity\EntryComment {#4356 …}
  +body: "I’ve seen a lot of descriptions of Tailscale but still have no idea what exactly it *does*. I get that it uses Wireguard, but what differentiates it from a typical VPN setup? NAT traversal?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705529116 {#4726
    date: 2024-01-17 23:05:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@zelifcam@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4734 …}
  +nested: Doctrine\ORM\PersistentCollection {#4736 …}
  +votes: Doctrine\ORM\PersistentCollection {#4738 …}
  +reports: Doctrine\ORM\PersistentCollection {#4741 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4743 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4745 …}
  -id: 317701
  -bodyTs: "'descript':7 'differenti':27 'exact':16 'get':20 'idea':14 'lot':5 'nat':34 'seen':3 'setup':33 'still':11 'tailscal':9 'travers':35 'typic':31 'use':23 've':2 'vpn':32 'wireguard':24"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://leminal.space/comment/4792622"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705529116 {#4729
    date: 2024-01-17 23:05:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
71 DENIED edit
App\Entity\EntryComment {#4727
  +user: Proxies\__CG__\App\Entity\User {#4733 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4356 …}
  +root: App\Entity\EntryComment {#4356 …}
  +body: "I’ve seen a lot of descriptions of Tailscale but still have no idea what exactly it *does*. I get that it uses Wireguard, but what differentiates it from a typical VPN setup? NAT traversal?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705529116 {#4726
    date: 2024-01-17 23:05:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@zelifcam@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4734 …}
  +nested: Doctrine\ORM\PersistentCollection {#4736 …}
  +votes: Doctrine\ORM\PersistentCollection {#4738 …}
  +reports: Doctrine\ORM\PersistentCollection {#4741 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4743 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4745 …}
  -id: 317701
  -bodyTs: "'descript':7 'differenti':27 'exact':16 'get':20 'idea':14 'lot':5 'nat':34 'seen':3 'setup':33 'still':11 'tailscal':9 'travers':35 'typic':31 'use':23 've':2 'vpn':32 'wireguard':24"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://leminal.space/comment/4792622"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705529116 {#4729
    date: 2024-01-17 23:05:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
72 DENIED moderate
App\Entity\EntryComment {#4727
  +user: Proxies\__CG__\App\Entity\User {#4733 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4356 …}
  +root: App\Entity\EntryComment {#4356 …}
  +body: "I’ve seen a lot of descriptions of Tailscale but still have no idea what exactly it *does*. I get that it uses Wireguard, but what differentiates it from a typical VPN setup? NAT traversal?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1705529116 {#4726
    date: 2024-01-17 23:05:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@zelifcam@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4734 …}
  +nested: Doctrine\ORM\PersistentCollection {#4736 …}
  +votes: Doctrine\ORM\PersistentCollection {#4738 …}
  +reports: Doctrine\ORM\PersistentCollection {#4741 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4743 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4745 …}
  -id: 317701
  -bodyTs: "'descript':7 'differenti':27 'exact':16 'get':20 'idea':14 'lot':5 'nat':34 'seen':3 'setup':33 'still':11 'tailscal':9 'travers':35 'typic':31 'use':23 've':2 'vpn':32 'wireguard':24"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://leminal.space/comment/4792622"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705529116 {#4729
    date: 2024-01-17 23:05:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
73 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
74 DENIED moderate
App\Entity\EntryComment {#4859
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4727
    +user: Proxies\__CG__\App\Entity\User {#4733 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4356 …}
    +root: App\Entity\EntryComment {#4356 …}
    +body: "I’ve seen a lot of descriptions of Tailscale but still have no idea what exactly it *does*. I get that it uses Wireguard, but what differentiates it from a typical VPN setup? NAT traversal?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1705529116 {#4726
      date: 2024-01-17 23:05:16.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@zelifcam@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4734 …}
    +nested: Doctrine\ORM\PersistentCollection {#4736 …}
    +votes: Doctrine\ORM\PersistentCollection {#4738 …}
    +reports: Doctrine\ORM\PersistentCollection {#4741 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4743 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4745 …}
    -id: 317701
    -bodyTs: "'descript':7 'differenti':27 'exact':16 'get':20 'idea':14 'lot':5 'nat':34 'seen':3 'setup':33 'still':11 'tailscal':9 'travers':35 'typic':31 'use':23 've':2 'vpn':32 'wireguard':24"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://leminal.space/comment/4792622"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705529116 {#4729
      date: 2024-01-17 23:05:16.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4356 …}
  +body: "It does the wireguard config for you so you don’t have to reconfigure each machine when a new item is added to your network. Still peer to peer type network rather than single vpn to a lan router"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705531576 {#4858
    date: 2024-01-17 23:46:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@zelifcam@lemmy.world"
    "@fenndev@leminal.space"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4864 …}
  +nested: Doctrine\ORM\PersistentCollection {#4865 …}
  +votes: Doctrine\ORM\PersistentCollection {#4867 …}
  +reports: Doctrine\ORM\PersistentCollection {#4871 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4873 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4875 …}
  -id: 317767
  -bodyTs: "'ad':22 'config':5 'item':20 'lan':38 'machin':16 'network':25,31 'new':19 'peer':27,29 'rather':32 'reconfigur':14 'router':39 'singl':34 'still':26 'type':30 'vpn':35 'wireguard':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6471456"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705531576 {#4861
    date: 2024-01-17 23:46:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
75 DENIED edit
App\Entity\EntryComment {#4859
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4727
    +user: Proxies\__CG__\App\Entity\User {#4733 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4356 …}
    +root: App\Entity\EntryComment {#4356 …}
    +body: "I’ve seen a lot of descriptions of Tailscale but still have no idea what exactly it *does*. I get that it uses Wireguard, but what differentiates it from a typical VPN setup? NAT traversal?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1705529116 {#4726
      date: 2024-01-17 23:05:16.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@zelifcam@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4734 …}
    +nested: Doctrine\ORM\PersistentCollection {#4736 …}
    +votes: Doctrine\ORM\PersistentCollection {#4738 …}
    +reports: Doctrine\ORM\PersistentCollection {#4741 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4743 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4745 …}
    -id: 317701
    -bodyTs: "'descript':7 'differenti':27 'exact':16 'get':20 'idea':14 'lot':5 'nat':34 'seen':3 'setup':33 'still':11 'tailscal':9 'travers':35 'typic':31 'use':23 've':2 'vpn':32 'wireguard':24"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://leminal.space/comment/4792622"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705529116 {#4729
      date: 2024-01-17 23:05:16.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4356 …}
  +body: "It does the wireguard config for you so you don’t have to reconfigure each machine when a new item is added to your network. Still peer to peer type network rather than single vpn to a lan router"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705531576 {#4858
    date: 2024-01-17 23:46:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@zelifcam@lemmy.world"
    "@fenndev@leminal.space"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4864 …}
  +nested: Doctrine\ORM\PersistentCollection {#4865 …}
  +votes: Doctrine\ORM\PersistentCollection {#4867 …}
  +reports: Doctrine\ORM\PersistentCollection {#4871 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4873 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4875 …}
  -id: 317767
  -bodyTs: "'ad':22 'config':5 'item':20 'lan':38 'machin':16 'network':25,31 'new':19 'peer':27,29 'rather':32 'reconfigur':14 'router':39 'singl':34 'still':26 'type':30 'vpn':35 'wireguard':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6471456"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705531576 {#4861
    date: 2024-01-17 23:46:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
76 DENIED moderate
App\Entity\EntryComment {#4859
  +user: App\Entity\User {#4221 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: App\Entity\EntryComment {#4727
    +user: Proxies\__CG__\App\Entity\User {#4733 …}
    +entry: App\Entity\Entry {#2388}
    +magazine: App\Entity\Magazine {#266}
    +image: null
    +parent: App\Entity\EntryComment {#4356 …}
    +root: App\Entity\EntryComment {#4356 …}
    +body: "I’ve seen a lot of descriptions of Tailscale but still have no idea what exactly it *does*. I get that it uses Wireguard, but what differentiates it from a typical VPN setup? NAT traversal?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 2
    +score: 0
    +lastActive: DateTime @1705529116 {#4726
      date: 2024-01-17 23:05:16.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@Father_Redbeard@lemmy.ml"
      "@zelifcam@lemmy.world"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4734 …}
    +nested: Doctrine\ORM\PersistentCollection {#4736 …}
    +votes: Doctrine\ORM\PersistentCollection {#4738 …}
    +reports: Doctrine\ORM\PersistentCollection {#4741 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4743 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4745 …}
    -id: 317701
    -bodyTs: "'descript':7 'differenti':27 'exact':16 'get':20 'idea':14 'lot':5 'nat':34 'seen':3 'setup':33 'still':11 'tailscal':9 'travers':35 'typic':31 'use':23 've':2 'vpn':32 'wireguard':24"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://leminal.space/comment/4792622"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705529116 {#4729
      date: 2024-01-17 23:05:16.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4356 …}
  +body: "It does the wireguard config for you so you don’t have to reconfigure each machine when a new item is added to your network. Still peer to peer type network rather than single vpn to a lan router"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1705531576 {#4858
    date: 2024-01-17 23:46:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
    "@zelifcam@lemmy.world"
    "@fenndev@leminal.space"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4864 …}
  +nested: Doctrine\ORM\PersistentCollection {#4865 …}
  +votes: Doctrine\ORM\PersistentCollection {#4867 …}
  +reports: Doctrine\ORM\PersistentCollection {#4871 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4873 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4875 …}
  -id: 317767
  -bodyTs: "'ad':22 'config':5 'item':20 'lan':38 'machin':16 'network':25,31 'new':19 'peer':27,29 'rather':32 'reconfigur':14 'router':39 'singl':34 'still':26 'type':30 'vpn':35 'wireguard':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6471456"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705531576 {#4861
    date: 2024-01-17 23:46:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
77 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
78 DENIED moderate
App\Entity\EntryComment {#4430
  +user: App\Entity\User {#4443 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    As others have said, I’d play with routing/IP forwarding such that being VPN’d to one machine gives you access to everything — basically I would set it up as a “road warrior” VPN (but possibly split tunnel on the client [yes I know, WireGuard doesn’t have servers or clients but you know what I mean]).\n
    \n
    Alternately, I think you could do some reverse proxy magic such that everything goes through the WireGuard box — a.lan goes to service A, b.lan to service B, etc., but if you have non-http services this may be a little more cumbersome.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705588249 {#4425
    date: 2024-01-18 15:30:49.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4431 …}
  +nested: Doctrine\ORM\PersistentCollection {#4433 …}
  +votes: Doctrine\ORM\PersistentCollection {#4435 …}
  +reports: Doctrine\ORM\PersistentCollection {#4437 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4439 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4441 …}
  -id: 319321
  -bodyTs: "'a.lan':76 'access':21 'altern':58 'b':84 'b.lan':81 'basic':24 'box':75 'client':41,51 'could':62 'cumbersom':100 'd':6,15 'doesn':46 'etc':85 'everyth':23,70 'forward':10 'give':19 'goe':71,77 'http':92 'know':44,54 'littl':98 'machin':18 'magic':67 'may':95 'mean':57 'non':91 'non-http':90 'one':17 'other':2 'play':7 'possibl':36 'proxi':66 'revers':65 'road':32 'routing/ip':9 'said':4 'server':49 'servic':79,83,93 'set':27 'split':37 'think':60 'tunnel':38 'vpn':14,34 'warrior':33 'wireguard':45,74 'would':26 'yes':42"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.sdf.org/comment/7451795"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705588249 {#4426
    date: 2024-01-18 15:30:49.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
79 DENIED edit
App\Entity\EntryComment {#4430
  +user: App\Entity\User {#4443 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    As others have said, I’d play with routing/IP forwarding such that being VPN’d to one machine gives you access to everything — basically I would set it up as a “road warrior” VPN (but possibly split tunnel on the client [yes I know, WireGuard doesn’t have servers or clients but you know what I mean]).\n
    \n
    Alternately, I think you could do some reverse proxy magic such that everything goes through the WireGuard box — a.lan goes to service A, b.lan to service B, etc., but if you have non-http services this may be a little more cumbersome.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705588249 {#4425
    date: 2024-01-18 15:30:49.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4431 …}
  +nested: Doctrine\ORM\PersistentCollection {#4433 …}
  +votes: Doctrine\ORM\PersistentCollection {#4435 …}
  +reports: Doctrine\ORM\PersistentCollection {#4437 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4439 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4441 …}
  -id: 319321
  -bodyTs: "'a.lan':76 'access':21 'altern':58 'b':84 'b.lan':81 'basic':24 'box':75 'client':41,51 'could':62 'cumbersom':100 'd':6,15 'doesn':46 'etc':85 'everyth':23,70 'forward':10 'give':19 'goe':71,77 'http':92 'know':44,54 'littl':98 'machin':18 'magic':67 'may':95 'mean':57 'non':91 'non-http':90 'one':17 'other':2 'play':7 'possibl':36 'proxi':66 'revers':65 'road':32 'routing/ip':9 'said':4 'server':49 'servic':79,83,93 'set':27 'split':37 'think':60 'tunnel':38 'vpn':14,34 'warrior':33 'wireguard':45,74 'would':26 'yes':42"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.sdf.org/comment/7451795"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705588249 {#4426
    date: 2024-01-18 15:30:49.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
80 DENIED moderate
App\Entity\EntryComment {#4430
  +user: App\Entity\User {#4443 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    As others have said, I’d play with routing/IP forwarding such that being VPN’d to one machine gives you access to everything — basically I would set it up as a “road warrior” VPN (but possibly split tunnel on the client [yes I know, WireGuard doesn’t have servers or clients but you know what I mean]).\n
    \n
    Alternately, I think you could do some reverse proxy magic such that everything goes through the WireGuard box — a.lan goes to service A, b.lan to service B, etc., but if you have non-http services this may be a little more cumbersome.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705588249 {#4425
    date: 2024-01-18 15:30:49.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4431 …}
  +nested: Doctrine\ORM\PersistentCollection {#4433 …}
  +votes: Doctrine\ORM\PersistentCollection {#4435 …}
  +reports: Doctrine\ORM\PersistentCollection {#4437 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4439 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4441 …}
  -id: 319321
  -bodyTs: "'a.lan':76 'access':21 'altern':58 'b':84 'b.lan':81 'basic':24 'box':75 'client':41,51 'could':62 'cumbersom':100 'd':6,15 'doesn':46 'etc':85 'everyth':23,70 'forward':10 'give':19 'goe':71,77 'http':92 'know':44,54 'littl':98 'machin':18 'magic':67 'may':95 'mean':57 'non':91 'non-http':90 'one':17 'other':2 'play':7 'possibl':36 'proxi':66 'revers':65 'road':32 'routing/ip':9 'said':4 'server':49 'servic':79,83,93 'set':27 'split':37 'think':60 'tunnel':38 'vpn':14,34 'warrior':33 'wireguard':45,74 'would':26 'yes':42"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.sdf.org/comment/7451795"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705588249 {#4426
    date: 2024-01-18 15:30:49.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
81 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
82 DENIED moderate
App\Entity\EntryComment {#4503
  +user: App\Entity\User {#4516 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "I think openvpn works completely fine for most use cases and didn’t have any trouble with it at all. I did however switch to wireguard on my gateway and I get a little better throughput compared to openvpn. That being said, I’m also using a pfsense box as my home gateway, so access to internal services has been easy as general routing gets."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 3
  +score: 0
  +lastActive: DateTime @1705535663 {#4498
    date: 2024-01-18 00:54:23.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4504 …}
  +nested: Doctrine\ORM\PersistentCollection {#4506 …}
  +votes: Doctrine\ORM\PersistentCollection {#4508 …}
  +reports: Doctrine\ORM\PersistentCollection {#4510 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4512 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4514 …}
  -id: 317889
  -bodyTs: "'access':55 'also':45 'better':35 'box':49 'case':10 'compar':37 'complet':5 'didn':12 'easi':61 'fine':6 'gateway':29,53 'general':63 'get':32,65 'home':52 'howev':23 'intern':57 'littl':34 'm':44 'openvpn':3,39 'pfsens':48 'rout':64 'said':42 'servic':58 'switch':24 'think':2 'throughput':36 'troubl':16 'use':9,46 'wireguard':26 'work':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemm.ee/comment/8385091"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705535663 {#4499
    date: 2024-01-18 00:54:23.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
83 DENIED edit
App\Entity\EntryComment {#4503
  +user: App\Entity\User {#4516 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "I think openvpn works completely fine for most use cases and didn’t have any trouble with it at all. I did however switch to wireguard on my gateway and I get a little better throughput compared to openvpn. That being said, I’m also using a pfsense box as my home gateway, so access to internal services has been easy as general routing gets."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 3
  +score: 0
  +lastActive: DateTime @1705535663 {#4498
    date: 2024-01-18 00:54:23.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4504 …}
  +nested: Doctrine\ORM\PersistentCollection {#4506 …}
  +votes: Doctrine\ORM\PersistentCollection {#4508 …}
  +reports: Doctrine\ORM\PersistentCollection {#4510 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4512 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4514 …}
  -id: 317889
  -bodyTs: "'access':55 'also':45 'better':35 'box':49 'case':10 'compar':37 'complet':5 'didn':12 'easi':61 'fine':6 'gateway':29,53 'general':63 'get':32,65 'home':52 'howev':23 'intern':57 'littl':34 'm':44 'openvpn':3,39 'pfsens':48 'rout':64 'said':42 'servic':58 'switch':24 'think':2 'throughput':36 'troubl':16 'use':9,46 'wireguard':26 'work':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemm.ee/comment/8385091"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705535663 {#4499
    date: 2024-01-18 00:54:23.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
84 DENIED moderate
App\Entity\EntryComment {#4503
  +user: App\Entity\User {#4516 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "I think openvpn works completely fine for most use cases and didn’t have any trouble with it at all. I did however switch to wireguard on my gateway and I get a little better throughput compared to openvpn. That being said, I’m also using a pfsense box as my home gateway, so access to internal services has been easy as general routing gets."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 3
  +score: 0
  +lastActive: DateTime @1705535663 {#4498
    date: 2024-01-18 00:54:23.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4504 …}
  +nested: Doctrine\ORM\PersistentCollection {#4506 …}
  +votes: Doctrine\ORM\PersistentCollection {#4508 …}
  +reports: Doctrine\ORM\PersistentCollection {#4510 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4512 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4514 …}
  -id: 317889
  -bodyTs: "'access':55 'also':45 'better':35 'box':49 'case':10 'compar':37 'complet':5 'didn':12 'easi':61 'fine':6 'gateway':29,53 'general':63 'get':32,65 'home':52 'howev':23 'intern':57 'littl':34 'm':44 'openvpn':3,39 'pfsens':48 'rout':64 'said':42 'servic':58 'switch':24 'think':2 'throughput':36 'troubl':16 'use':9,46 'wireguard':26 'work':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemm.ee/comment/8385091"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705535663 {#4499
    date: 2024-01-18 00:54:23.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
85 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
86 DENIED moderate
App\Entity\EntryComment {#4576
  +user: App\Entity\User {#4589 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    I host an openVPN instance from a Debian machine with my phone permanently connected to it.\n
    \n
    Keeps my phone within my lan while roaming so it has access to non-public services like pihole, the arr stacks management interfaces, ssh/ftp, etc. Also keeps my browsing private + secure on public/work wifi.\n
    \n
    Only the things I share with others like Emby get exposed to WAN (through a reverse proxy), the rest is VPN/LAN access only.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705528434 {#4571
    date: 2024-01-17 22:53:54.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4577 …}
  +nested: Doctrine\ORM\PersistentCollection {#4579 …}
  +votes: Doctrine\ORM\PersistentCollection {#4581 …}
  +reports: Doctrine\ORM\PersistentCollection {#4583 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4585 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4587 …}
  -id: 317671
  -bodyTs: "'access':28,73 'also':43 'arr':37 'brows':46 'connect':14 'debian':8 'embi':60 'etc':42 'expos':62 'get':61 'host':2 'instanc':5 'interfac':40 'keep':17,44 'lan':22 'like':34,59 'machin':9 'manag':39 'non':31 'non-publ':30 'openvpn':4 'other':58 'perman':13 'phone':12,19 'pihol':35 'privat':47 'proxi':68 'public':32 'public/work':50 'rest':70 'revers':67 'roam':24 'secur':48 'servic':33 'share':56 'ssh/ftp':41 'stack':38 'thing':54 'vpn/lan':72 'wan':64 'wifi':51 'within':20"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6470617"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705528434 {#4572
    date: 2024-01-17 22:53:54.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
87 DENIED edit
App\Entity\EntryComment {#4576
  +user: App\Entity\User {#4589 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    I host an openVPN instance from a Debian machine with my phone permanently connected to it.\n
    \n
    Keeps my phone within my lan while roaming so it has access to non-public services like pihole, the arr stacks management interfaces, ssh/ftp, etc. Also keeps my browsing private + secure on public/work wifi.\n
    \n
    Only the things I share with others like Emby get exposed to WAN (through a reverse proxy), the rest is VPN/LAN access only.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705528434 {#4571
    date: 2024-01-17 22:53:54.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4577 …}
  +nested: Doctrine\ORM\PersistentCollection {#4579 …}
  +votes: Doctrine\ORM\PersistentCollection {#4581 …}
  +reports: Doctrine\ORM\PersistentCollection {#4583 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4585 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4587 …}
  -id: 317671
  -bodyTs: "'access':28,73 'also':43 'arr':37 'brows':46 'connect':14 'debian':8 'embi':60 'etc':42 'expos':62 'get':61 'host':2 'instanc':5 'interfac':40 'keep':17,44 'lan':22 'like':34,59 'machin':9 'manag':39 'non':31 'non-publ':30 'openvpn':4 'other':58 'perman':13 'phone':12,19 'pihol':35 'privat':47 'proxi':68 'public':32 'public/work':50 'rest':70 'revers':67 'roam':24 'secur':48 'servic':33 'share':56 'ssh/ftp':41 'stack':38 'thing':54 'vpn/lan':72 'wan':64 'wifi':51 'within':20"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6470617"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705528434 {#4572
    date: 2024-01-17 22:53:54.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
88 DENIED moderate
App\Entity\EntryComment {#4576
  +user: App\Entity\User {#4589 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: """
    I host an openVPN instance from a Debian machine with my phone permanently connected to it.\n
    \n
    Keeps my phone within my lan while roaming so it has access to non-public services like pihole, the arr stacks management interfaces, ssh/ftp, etc. Also keeps my browsing private + secure on public/work wifi.\n
    \n
    Only the things I share with others like Emby get exposed to WAN (through a reverse proxy), the rest is VPN/LAN access only.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1705528434 {#4571
    date: 2024-01-17 22:53:54.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4577 …}
  +nested: Doctrine\ORM\PersistentCollection {#4579 …}
  +votes: Doctrine\ORM\PersistentCollection {#4581 …}
  +reports: Doctrine\ORM\PersistentCollection {#4583 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4585 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4587 …}
  -id: 317671
  -bodyTs: "'access':28,73 'also':43 'arr':37 'brows':46 'connect':14 'debian':8 'embi':60 'etc':42 'expos':62 'get':61 'host':2 'instanc':5 'interfac':40 'keep':17,44 'lan':22 'like':34,59 'machin':9 'manag':39 'non':31 'non-publ':30 'openvpn':4 'other':58 'perman':13 'phone':12,19 'pihol':35 'privat':47 'proxi':68 'public':32 'public/work':50 'rest':70 'revers':67 'roam':24 'secur':48 'servic':33 'share':56 'ssh/ftp':41 'stack':38 'thing':54 'vpn/lan':72 'wan':64 'wifi':51 'within':20"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ca/comment/6470617"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705528434 {#4572
    date: 2024-01-17 22:53:54.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
89 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
90 DENIED moderate
App\Entity\EntryComment {#4650
  +user: App\Entity\User {#4663 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Plug your pies into wireguard. Problem solved."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 8
  +score: 0
  +lastActive: DateTime @1705527193 {#4645
    date: 2024-01-17 22:33:13.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4651 …}
  +nested: Doctrine\ORM\PersistentCollection {#4653 …}
  +votes: Doctrine\ORM\PersistentCollection {#4655 …}
  +reports: Doctrine\ORM\PersistentCollection {#4657 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4659 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4661 …}
  -id: 317638
  -bodyTs: "'pie':3 'plug':1 'problem':6 'solv':7 'wireguard':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.cafe/comment/4052950"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705527193 {#4646
    date: 2024-01-17 22:33:13.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
91 DENIED edit
App\Entity\EntryComment {#4650
  +user: App\Entity\User {#4663 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Plug your pies into wireguard. Problem solved."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 8
  +score: 0
  +lastActive: DateTime @1705527193 {#4645
    date: 2024-01-17 22:33:13.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4651 …}
  +nested: Doctrine\ORM\PersistentCollection {#4653 …}
  +votes: Doctrine\ORM\PersistentCollection {#4655 …}
  +reports: Doctrine\ORM\PersistentCollection {#4657 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4659 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4661 …}
  -id: 317638
  -bodyTs: "'pie':3 'plug':1 'problem':6 'solv':7 'wireguard':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.cafe/comment/4052950"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705527193 {#4646
    date: 2024-01-17 22:33:13.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
92 DENIED moderate
App\Entity\EntryComment {#4650
  +user: App\Entity\User {#4663 …}
  +entry: App\Entity\Entry {#2388
    +user: Proxies\__CG__\App\Entity\User {#1943 …}
    +magazine: App\Entity\Magazine {#266
      +icon: Proxies\__CG__\App\Entity\Image {#247 …}
      +name: "selfhosted@lemmy.world"
      +title: "selfhosted"
      +description: """
        A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
        \n
        Rules:\n
        \n
        - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
        - No spam posting.\n
        - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
        - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
        - No trolling.\n
        \n
        Resources:\n
        \n
        - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
        - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
        - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
        \n
        > Any issues on the community? Report it using the report flag.\n
        \n
        > Questions? DM the mods!
        """
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 222
      +entryCommentCount: 3916
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1729582735 {#276
        date: 2024-10-22 09:38:55.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#238 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
      +entries: Doctrine\ORM\PersistentCollection {#181 …}
      +posts: Doctrine\ORM\PersistentCollection {#139 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
      +bans: Doctrine\ORM\PersistentCollection {#118 …}
      +reports: Doctrine\ORM\PersistentCollection {#104 …}
      +badges: Doctrine\ORM\PersistentCollection {#82 …}
      +logs: Doctrine\ORM\PersistentCollection {#72 …}
      +awards: Doctrine\ORM\PersistentCollection {#61 …}
      +categories: Doctrine\ORM\PersistentCollection {#1820 …}
      -id: 120
      +apId: "selfhosted@lemmy.world"
      +apProfileId: "https://lemmy.world/c/selfhosted"
      +apPublicUrl: "https://lemmy.world/c/selfhosted"
      +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
      +apInboxUrl: "https://lemmy.world/inbox"
      +apDomain: "lemmy.world"
      +apPreferredUsername: "selfhosted"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703473826 {#270
        date: 2023-12-25 04:10:26.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703473826 {#272
        date: 2023-12-25 04:10:26.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
    +slug: "VPN-to-home-network-options"
    +title: "VPN to home network options"
    +url: null
    +body: """
      I currently have a server running Unraid as the OS, which has some WireGuard integration built in. Which I’ve enabled and been using to remotely access services hosted on that server. But as I’ve expanded to include things like Octopi running on a Pi3 and NextcloudPi running on a Pi4 (along with AdGuardHome), I’m trying to determine the best way to VPN to my home network with the goal of reaching services I’m hosting, and do it safely of course.\n
      \n
      I have a Netgear Nighthawk that has some VPN functionality built in that uses a OpenVPN account. Is that ok or would it be advisable to come in a different way?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 22
    +favouriteCount: 10
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1705642568 {#2410
      date: 2024-01-19 06:36:08.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1866 …}
    +votes: Doctrine\ORM\PersistentCollection {#1978 …}
    +reports: Doctrine\ORM\PersistentCollection {#1946 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1971 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2443 …}
    +badges: Doctrine\ORM\PersistentCollection {#2426 …}
    +children: []
    -id: 31321
    -titleTs: "'home':3 'network':4 'option':5 'vpn':1"
    -bodyTs: "'access':27 'account':101 'adguardhom':55 'advis':109 'along':53 'best':62 'built':16,95 'come':111 'cours':84 'current':2 'determin':60 'differ':114 'enabl':21 'expand':37 'function':94 'goal':72 'home':68 'host':29,78 'includ':39 'integr':15 'like':41 'm':57,77 'netgear':88 'network':69 'nextcloudpi':48 'nighthawk':89 'octopi':42 'ok':104 'openvpn':100 'os':10 'pi3':46 'pi4':52 'reach':74 'remot':26 'run':6,43,49 'safe':82 'server':5,32 'servic':28,75 'thing':40 'tri':58 'unraid':7 'use':24,98 've':20,36 'vpn':65,93 'way':63,115 'wireguard':14 'would':106"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1705613475
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/10682638"
    +editedAt: null
    +createdAt: DateTimeImmutable @1705527075 {#1850
      date: 2024-01-17 22:31:15.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "Plug your pies into wireguard. Problem solved."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 8
  +score: 0
  +lastActive: DateTime @1705527193 {#4645
    date: 2024-01-17 22:33:13.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@Father_Redbeard@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4651 …}
  +nested: Doctrine\ORM\PersistentCollection {#4653 …}
  +votes: Doctrine\ORM\PersistentCollection {#4655 …}
  +reports: Doctrine\ORM\PersistentCollection {#4657 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4659 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4661 …}
  -id: 317638
  -bodyTs: "'pie':3 'plug':1 'problem':6 'solv':7 'wireguard':5"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.cafe/comment/4052950"
  +editedAt: null
  +createdAt: DateTimeImmutable @1705527193 {#4646
    date: 2024-01-17 22:33:13.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
93 DENIED edit
App\Entity\Magazine {#266
  +icon: Proxies\__CG__\App\Entity\Image {#247 …}
  +name: "selfhosted@lemmy.world"
  +title: "selfhosted"
  +description: """
    A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
    \n
    Rules:\n
    \n
    - Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
    - No spam posting.\n
    - Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
    - Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
    - No trolling.\n
    \n
    Resources:\n
    \n
    - [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
    - [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
    - [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
    \n
    > Any issues on the community? Report it using the report flag.\n
    \n
    > Questions? DM the mods!
    """
  +rules: null
  +subscriptionsCount: 1
  +entryCount: 222
  +entryCommentCount: 3916
  +postCount: 0
  +postCommentCount: 0
  +isAdult: false
  +customCss: null
  +lastActive: DateTime @1729582735 {#276
    date: 2024-10-22 09:38:55.0 +02:00
  }
  +markedForDeletionAt: null
  +tags: null
  +moderators: Doctrine\ORM\PersistentCollection {#238 …}
  +ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
  +moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
  +entries: Doctrine\ORM\PersistentCollection {#181 …}
  +posts: Doctrine\ORM\PersistentCollection {#139 …}
  +subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
  +bans: Doctrine\ORM\PersistentCollection {#118 …}
  +reports: Doctrine\ORM\PersistentCollection {#104 …}
  +badges: Doctrine\ORM\PersistentCollection {#82 …}
  +logs: Doctrine\ORM\PersistentCollection {#72 …}
  +awards: Doctrine\ORM\PersistentCollection {#61 …}
  +categories: Doctrine\ORM\PersistentCollection {#1820 …}
  -id: 120
  +apId: "selfhosted@lemmy.world"
  +apProfileId: "https://lemmy.world/c/selfhosted"
  +apPublicUrl: "https://lemmy.world/c/selfhosted"
  +apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
  +apInboxUrl: "https://lemmy.world/inbox"
  +apDomain: "lemmy.world"
  +apPreferredUsername: "selfhosted"
  +apDiscoverable: true
  +apManuallyApprovesFollowers: null
  +privateKey: null
  +publicKey: null
  +apFetchedAt: DateTime @1703473826 {#270
    date: 2023-12-25 04:10:26.0 +01:00
  }
  +apDeletedAt: null
  +apTimeoutAt: null
  +visibility: "visible             "
  +createdAt: DateTimeImmutable @1703473826 {#272
    date: 2023-12-25 04:10:26.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS DENIED
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details