Showing a bit of security ignorance..
I'll give you a clue, just use a pi on the internal network to access and then remote in on a secured connection. you are then only locking down one machine for access to all. I get paranoid and force ssh. vpn, and locked ip access to name a few....











Reply With Quote



