I am on a 192.x.x.x
network and have a local server that hosts some webapps for the local users of the network. The server is running:
- Ubuntu
- VPN
- Nginx Reverse Proxy with the site.conf including:
allow 192.168.1.0/24; deny all;
- Locally generated SSL certificates, with root keys installed on client machines
When I nmap -A -p-
my local IP address I get a variety of open ports that correlate with the reverse proxy or the OS (ssh
, cupsd
, etc.) When I do the same nmap
to the public IP that the VPN uses, I only get two ports open 59
and 8989
.
Is it possible for an attacker to get to the local server from outside the network? Is there anything else I can do to limit the exposure of this machine? I only really need internet connectivity to update the OS on this particular machine.