FWIW, my ISP provides FTTH using this wireless router:
I have had it for several years and recently decided to replace it in order to get better reporting and control.
I bought a used ASUS RT-AC86U but the key ingredient was a media converter for converting the incoming fiber optic line (pull the GPON out of the ISP’s router and into converter) to Gigabit Ethernet (plus some important configuration information because the ISP uses PPPoE and VLANs). I found instructions online and perhaps others have done something similar for your ISP (assuming your ISP allows replacing their equipment).
Tell me how to access my HA from internet AND my LAN in HTTPS with a valid certificate without NAT loopback and without using the external address all the time (to match address and certificate’s values) if
Being skilled enough and getting finally fiber I would go the professional way either by building a custom router with OPNsense / pfSense or getting an alternative router running these softwares.
Most of this hardware has both SFP and RJ45 ports.
That way not only you will be able to use NAT hairpinning, but also A TON of other stuff.
In the event of a problem, the ISP’s equipment must be restored. If the problem persists, then one can contact the ISP.
FWIW, one of the reasons I replaced the ISP’s wireless router is because whenever they pushed a firmware update the procedure would sometimes factory-reset the device and lose my configuration. It didn’t happen often but it was very disruptive when it did.
Tell me about that, this is the same for me.
And to backup/restore the configuration, you have to connect with a different user, that they do not provide. Even techies do not have the credentials for Admin and Expert, amazing.
It is not even possible, let’s encrypt will only deliver a certificate for a valid public suffix (TLD).
I’m a computer scientist since 1997. I forgot a lot about my network classes as I’m now a full-time programmer for 25+ years but that, I know.
It is a certificate for myha.synology.me (fake address, don’t try it). I already said it earlier.
As a synology NAS owner, I’ve a free DDNS and the update of the public IP is done by DSM.
And at the end, it is the cause of my troubles: my internal server is replying to my internal client by saying that it is the external name, which is bothering the client without a proper reverse proxy/NAT loopback packet rewriting.
My PC, desktop-olivier, IP: 192.168.1.1 is calling https://myha.synology.me
I’ve setup a DNS in windows 10, it is going to my PiHole machine, PiHole is configured to answer 192.168.1.2 (my HA machine) to that specific DNS requests.
Therefore, my PC is connecting 192.168.1.2 in https and receive a “Hello, I’m 192.168.1.2 and my certificate is myha.synology.me, what can I do for you?”.
Browser error, man in the middle attack, someone is trying to spoof the myha.synology.me server, but it is 192.168.1.2, that’s malicious, please acknowledge if you want to continue to this severly untrusted server that is trying to scam you and steal your data.
Need to “really” go to the external address, and my ISP box is taking care of nat and reverse nat (that will change when it is replaced) or I have to setup a piece of software/hardware that will do the reverse proxy/NAT loopback IPO my ISP box.
If you know another possibility to rewrite the IP packet tell me.
I’m reading a lot about the nginx configuration, I could setup an nginx server on my PiHole machine.
But I’d definitly prefer to have everything on a capable router, able to do what my ISP box is doing, that is so much easier, I’ll continue to access the external URL all the time, the router will route to the internal machine and rewrite the packets for me.
One step further, I did a nginx config to rewrite what I thoiught was needed, I can access the login page, but the 2FA is killing my effort. I’m mad! I get the code window, I put the code, then this url https://myha.synology.me/lovelace?auth_callback=1&code=… is giving this result
You just saved my life!
I’ll mark your post as solution but not without a huge thank you to @123, @jerrm, @aceindy for a software solution and @complex1 because I’ll probably go for a Mikrotik router as my hardware solution with a lot of readings to do thanks to @123 again.
Thank you everyone for your support in my NAT journey.
Trying to keep things vanilla and reproducible, I just tested the duckdns addon letsencrypt certs on three different HA installs at three different locations/LANs, across at least four browsers, linux and windows.
A local dns fixup worked with all, no browser complaints, just as expected.
I don’t know why the dns option doesn’t work for you. Something else is going on.