Create Your First Secure Access Path
This page is written for end users. It helps you set up your first secure access path with clear, practical steps.
Common use cases
- Individual users: personal NAS access, home devices, and personal dev workstation access (SSH / Web / RDP)
- Team users: build hosts, ops hosts, and internal platforms (SSH / RDP / Web)
Personal scenarios (NAS / dev workstation)
Scenario A: Personal NAS secure access
- Goal: access your NAS admin/file services securely from outside your local network
- Recommendation: allow only your own account to the NAS device and only required ports (for example HTTPS)
Scenario B: Personal dev workstation remote access
- Goal: access your personal dev machine for debugging, builds, or maintenance
- Recommendation: allow only your own account to the dev machine (SSH or RDP first), then expand ports only when needed
Before you start
- You are signed in to the Larktun client and your source device is online
- The target device (NAS/dev machine/server) is online and identifiable
- You know the protocol and port you need (for example
SSH 22,HTTPS 443,RDP 3389)
Setup steps
- In
Nodes, confirm both source and target devices are online and clearly renamed. - If subnet access is required, approve the subnet route in
Routers. - In
ACLs, create an access rule:- Subject: your own account (personal) or a specific user group (team)
- Target: NAS/dev machine/internal service device
- Protocol/port: only what is required now
Derperusually needs no action: free shared relay is enabled by default for all users.- Choose dedicated relay only when you need lower latency or higher stability
- Configure user-managed relay only when you need custom network boundaries
- Start a real connection test from source (SSH/Web/RDP).
- Run one negative test with an unauthorized account/device and confirm it is blocked.
Recommended first-path strategy
- Default deny, then allow one explicit path
- Enable one target service at a time
- Prefer one common protocol first (SSH or Web)
- Expand devices/ports only after validation succeeds
Success criteria
- Authorized users can access the target service reliably
- Unauthorized users are blocked
- When failures happen, logs are enough to identify the cause quickly
Quick troubleshooting hints
- Cannot connect: verify device online state and selected target in
Nodes - Subnet resource unreachable: verify route approval in
Routers - Online but denied: verify subject, target, and port match in
ACLs - High latency: free relay is already available by default; for optimization, use dedicated relay or configure user-managed relay in
Derper
Next step
- Open Common Issues
- Revisit Deployment Modes and Configuration
- Extend with additional scenarios in Showcase