Jim’s Garage: Secure Cloudflare Tunnels with vLANs and an Internal Firewall | Notes
Secure Cloudflare Tunnels with vLANs and an Internal Firewall Before It’s Too Late! | Youtube
Cloudflare tunnels are useful but require VLAN segmentation, firewalls, and IDS/IPS for reliable protection.
IDEAS:⌗
- Cloudflare tunnels provide easy external access but transfer security control to Cloudflare.
- Privacy concerns arise because Cloudflare can see all traffic entering your network.
- Security specialists recommend using multiple protection layers instead of a single solution.
- A Cloudflare tunnel is similar to port forwarding but is managed by Cloudflare.
- A segmented internal network provides more control over exposed services.
- Creating VLANs for Cloudflare tunnels isolates incoming traffic from sensitive systems.
- Internal firewalls with IDS and IPS add another protection layer.
- Routing traffic through CrowdSec allows real-time threat analysis.
- Cloudflare tunnels don’t transmit the original IP, which limits some security measures.
- Blocking unwanted traffic at the Cloudflare level provides partial protection.
- Using Mac VLAN makes a container appear as a separate device on the network.
- VLAN segmentation prevents Cloudflare traffic from accessing protected internal networks.
- Firewall rules provide detailed access control for Cloudflare tunnels.
- Allowing Cloudflare tunnel traffic only to specific ports minimizes risks.
- Next-generation firewalls with IDS and IPS protect against attacks.
- Firewalls protect not only against Cloudflare tunnels but also against malware.
- Cloudflare tunnels are useful for users with CGNAT who cannot use port forwarding.
- Internal firewalls provide greater security control than Cloudflare.
- VLAN and firewall settings limit potential damage if a tunnel is compromised.
- Additional threat scanning increases overall network security.
- Signature-based firewall detection protects against web attacks.
- Restricting Cloudflare tunnels to a dedicated VLAN prevents their access to the entire network.
- Deploying security tools in Docker simplifies management.
- Portainer helps manage Docker but should be protected from external access.
- A well-configured firewall reduces risks of various network threats.
- A multi-layered security approach significantly reduces the likelihood of a breach.
- Internal IDS/IPS supplements Cloudflare’s protection measures, enhancing security.
- Properly configured firewall rules allow access without compromising infrastructure.
- Network security should include multiple solutions rather than relying on a single tool.
INSIGHTS:⌗
- Relying solely on Cloudflare tunnels means putting all security in the hands of one company.
- Network segmentation prevents breaches from spreading to internal infrastructure.
- Adding extra protection layers reduces risks without disrupting availability.
- Firewalls and VLANs create an internal security perimeter around exposed services.
- IDS and IPS provide threat detection beyond standard firewall rules.
- Cloudflare tunnels simplify access but require careful security configuration.
- Restricting the tunnel to specific VLANs prevents lateral movement by attackers.
- Combining external and internal threat analysis improves network resilience.
- Flexible firewall rules allow precise control over resource access.
- The lack of IP forwarding from Cloudflare limits the capabilities of some defensive mechanisms.
QUOTES:⌗
- “Cloudflare tunnels are cool technology, but you shouldn’t rely on just one layer of protection.”
- “Cloudflare can see all traffic coming into your network.”
- “A Cloudflare tunnel is similar to port forwarding, but control is completely handed over to Cloudflare.”
- “We want to segment the internal network to create something like a DMZ.”
- “Routing traffic through an internal firewall adds an additional layer of protection.”
- “CrowdSec uses intelligent threat analysis to check incoming traffic.”
- “We don’t see the original IP because Cloudflare doesn’t pass this information.”
- “Mac VLAN makes a container a separate physical device on the network.”
- “Firewall rules ensure that the Cloudflare tunnel can only access authorized resources.”
- “Enabling IDS and IPS adds another layer of protection beyond Cloudflare.”
HABITS:⌗
- Always use multiple layers of protection, not just one solution.
- Regularly check and update firewall rules.
- Segment your network using VLANs to isolate services.
- Analyze IDS/IPS logs for suspicious activity.
- Use next-generation firewalls for advanced protection.
- Deploy security tools like CrowdSec for threat analysis.
- Convert Docker commands into Compose files for easier management.
- Assign dedicated VLANs for external services.
- Regularly test firewall rules by checking access from outside.
- Monitor Cloudflare logs for unexpected access attempts.
FACTS:⌗
- Cloudflare tunnels provide free access to internal services without port forwarding.
- Cloudflare doesn’t pass the original IP address of incoming traffic.
- VLAN segmentation is a key method for network protection.
- IDS analyzes traffic for potential threats.
- IPS blocks detected threats before they penetrate.
- Firewalls with IDS/IPS enhance network protection.
- CrowdSec uses collective threat analysis to identify attacks.
- Using Mac VLAN allows a container to appear as a separate device.
- CGNAT prevents most users from doing port forwarding.
- DMZ (demilitarized zone) isolates public services from the internal network.
- Next-generation firewalls offer features beyond basic filtering.
- Portainer is a web interface for managing Docker.
- Cloudflare Zero Trust improves security through access control.
RESOURCES:⌗
- Christian Lemper’s video on Cloudflare tunnel security issues.
- Cloudflare Zero Trust.
- CrowdSec for threat analysis.
- Docker Compose for container management.
- Portainer for Docker administration.
- Sophos XG Firewall.
- NordVPN for secure remote access.
RECOMMENDATIONS:⌗
- Separate networks using VLANs to limit external access.
- Use a next-generation firewall with IDS/IPS for protection.
- Include CrowdSec or similar tools for threat analysis.
- Restrict Cloudflare tunnel traffic to specific VLANs.
- Configure firewall rules to allow only necessary traffic.
- Convert Docker commands into Compose files for convenience.
- Use Mac VLAN to isolate containerized services.
- Regularly verify firewall rules by testing access from outside.
- Monitor Cloudflare logs for suspicious activities.
- Limit external connections to a minimum.