Avatar of BILL Carlisle
BILL Carlisle
Flag for United States of America asked on

How do I setup my home computer to be accessible from outside using a domain name I own?

Hi All,
How do I setup my home computer to be accessible from outside using a domain name I own?
Dell Windows 7, Motorola cable modem, Cisco wireless router, Time Warner internet.

Did I select the correct "Topics"?

Thank you,
BillC
RoutersWindows NetworkingNetworkingDell

Avatar of undefined
Last Comment
BILL Carlisle

8/22/2022 - Mon
John

You can use Radmin tools for this (Famatech). I use Radmin.

Put the Radmin server on your home machine and set it up.
Put the Radmin viewer on your remote machine and log into  your home machine.
CompProbSolv

In what way do you want it to be "accessible"?  Are you trying to access shared resources (folders, printers, web server, etc.) or do you want to see the monitor and to control the mouse and keyboard?

If it is control, there are different flavors of VNC (realvnc and tightvnc are popular) that will allow remote access.  You'd have to enable port forwarding on your router to allow access from the internet side.

If it is a Pro version of Windows, you can use Remote Desktop in a similar way as VNC.
hypercube

There are three fundamental ways that this is done.  It partly depends on whether the workstation you will be using is in one location or more than one location.  

- For one location, a site-to-site VPN connection that's supported by the internet gateway router is about as secure as you can get.  Generally it provides a computer on one network the ability to reach another network and its resources.  Great for office-to-office connections.

- Many other setups require that reaching an individual computer are specific to that computer.  Services like GoToAssist, LogMeIn, TeamViewer are all like this.  These run a server on the target machine which communicates with the service provider's facility providing a "here I am" presence.  Then, you connnect to it via the service provider's facilities either using a web interface or a local application program.  You don't have to set up port forwarding.  You do have to accept that there's a 3rd party in the middle - even if it is all encrypted.  It's like a "hosted VPN" implementation.

- Many free and common capabilities require that you open a port on the target computer's site router.  VNC, UltraVNC, etc. work this way.  You install a "server" on the target computer which listens on a particular port / address.  The router either maps this port or some other from the outside IP address to the inside computer IP address and port.  Remote desktop is the same.  This type of implementation is "passive" in the sense that the target computer only has to listen and doesn't have to broadcast "here I am" messages.  (And, if it did, where would it be sending them??).

- You should also be aware of DynamicDNS (DDNS).  If there is no "here I am" server running, then it's not possible for a service provider to know where the target computer is located (i.e. public IP address and port numbers).  And, if you are using a dynamic public IP address at the target computer end, then there is no known IP address.  This remains an issue even if there is "a domain name you own".  DDNS installs a "here I am" server on the target computer and continually updates the address location.  And, the service provides an IP address for outsiders to use to reach the network's actual IP address.  Some security camera setups use this .. just as an example.  If you have your own domain name then you can register a URL with the DDNS service so the domain is reachable.  There may be other ways but this is what I know and understand.

In the case of having a "here I am" server runrning, there is no  need to open a router port.  That's not because a port address isn't needed but because it's not going to be assumed that it's static.  
Consider this:  How do packets from the internet return to your computer when you are running 3 browsers and email all at the same time?  How do your packets not get mixed up with everyone else's at your facility?  The answer is generally buried in the NAT capability of your gateway router.  When a packet goes out, your application has a port number associated with it for your computer AND that application.  Then, when the packet leaves the building, the router  adds another port number to the outgoing packet.  When responses return, they are routed to the appropriate IP address and port number on the LAN .. just as it all started out.

But, if someone wants to connect from the outside independently/unilaterally then it doesn't have that response context that's described above.  So it has to have a port number which the router understands and will forward packets to the intended computer IP and port number / actually the totality of this is an "address".  This is what requires port forwarding.

I prefer to use services like GoToAssist for things like this.
Experts Exchange is like having an extremely knowledgeable team sitting and waiting for your call. Couldn't do my job half as well as I do without it!
James Murphy
BILL Carlisle

ASKER
Awesome, I do need one of those.. VPN is what I do in client's network.

BUT, I appoligize for not being more clear.
What I was speaking about right now is what do I need to do to have outside people be able to hit my URL domain and access my web application I am building which has a log in.

1. I have a domain name
2. I want to be the hosting company for myself.. :)
3. I want it safe... secure

Thanks again,
BillC
John

The Radmin connection is very secure. I use this myself over a VPN connection to my home office.
SOLUTION
hypercube

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
BILL Carlisle

ASKER
Great Fred!
I actually have a DynDNS account for security cameras I had.
Do they let you have your own domain name?
That probably is first step..
I will be using Glassfish so I am familiar with the certificates.. they are a pain to setup! :)
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
BILL Carlisle

ASKER
what is involved to set up a "demilitarized zone" ?
SOLUTION
David Johnson, CD

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
hypercube

Generally the DMZ is a feature of the gateway router...
BILL Carlisle

ASKER
Hi All,
  Ok, for this post lets just look at my initial question:
"How do I setup my home computer to be accessible from outside using a domain name I own?"


I have a domain "allinclusivesolutions.net".
I have DYNDNS account.
I have glassfish running accessing an application. http://localhost:8080/ords/f?p=100

I want outside users to be able to hit my application like this:
http://allinclusivesolutions/f?p=100

Can you help me?
I will ask separate questions for DMZ and VPNing into my computer.

Thank you,
Bill
All of life is about relationships, and EE has made a viirtual community a real community. It lifts everyone's boat
William Peck
CompProbSolv

If I understand your last post correctly, all you should need to do is port forwarding in your router to direct incoming port 80 to the local IP address of the web server and to convert the port from 80 to 8080.

I'm assuming that you really meant this for the outside link:
http://allinclusivesolutions.net/f?p=100
Mathew

The way you asking is bit risky because there are tonnes of threats are behind the garden wall. When you setup such environment, make sure that your border security is good enough to protect from such threats, otherwise do not attempt .
ASKER CERTIFIED SOLUTION
hypercube

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
SOLUTION
David Johnson, CD

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
SOLUTION
David Johnson, CD

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
SOLUTION
hypercube

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
BILL Carlisle

ASKER
After rereading these more clicks, it seems Fred was the only one, at first, to hear what I was writing.

I still haven't done anything on this because it is a personal project which always seems to get pushed to the back.

Thank you for answering. I will look more at DMZ and DynDNA, it is a PAID account by the way.

thanks again,
BillC
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.