mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 06:55:52 +03:00
[GH-ISSUE #1400] Separate MeshCentral Agent + Web Console ports #2823
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#2823
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @joeldeteves on GitHub (Jan 10, 2023).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/1400
We've discussed this previously in Discord, and I think it's time to open an issue for it.
As the description says, I am requesting that the MeshCentral Agent + Web Console ports be separated.
This is to allow for more fine-grained control and better security of the bundled MeshCentral instance.
For example, if the Agents run on their own port, we can proxy in front of the web console while still allowing agents to communicate, set firewall rules only allowing access from certain IPs to the Mesh Console, etc.
Happy to help out with this one on the Docker side - unsure what, if anything needs to change on the TRMM side.
Thank you,
EDIT: Here is an explanation from Ylian on how this works:
@joeldeteves commented on GitHub (Jan 10, 2023):
Just a FYI, I found a workaround on this.
I was able to use
Pathon my Traefik reverse proxy to exclude the agent paths.However, for users who want to use another method e.g. firewall/vpn, it would be good to have the ports separated.
@Trapulo commented on GitHub (Feb 28, 2024):
Can you explain what did you do?
I'm using HAProxy as reverse proxy + SSL offloading behind the Tactical docker env.