Remote Computing Freedom: Building a Secure SSH Tunnel via NAS Jump Host
Remote Computing Freedom: Building a Secure SSH Tunnel via NAS Jump Host

Remote Computing Freedom: Building a Secure SSH Tunnel via NAS Jump Host

Introduction
To leverage the massive power of my home RTX 5080 while traveling, I implemented a robust remote access architecture. Instead of relying on third-party VPNs or intrusive software, this solution uses a NAS as a Jump Host. This method keeps the AI Tower invisible to the public internet while providing a high-speed, encrypted “expressway” for my data.

Step 1: Fortifying the Gateway (NAS Configuration)

The NAS acts as the “security guard” for the entire home network.

  1. Obfuscate the Entry Point: Never use the default SSH port 22. Change it to a high-range custom port (e.g., 54321) in the NAS settings. This instantly mitigates 99% of automated “brute-force” bot attacks.
  2. Enable Traffic Relay: By default, many NAS systems block internal traffic forwarding. You must modify the SSH configuration file (/etc/ssh/sshd_config) via the command line.
    • The Key Fix: Ensure AllowTcpForwarding and GatewayPorts are both set to yes. This allows the NAS to act as a bridge, passing requests from the outside world into your local network.
  3. Firewall Clearance: Manually add a rule to the NAS’s built-in firewall to allow inbound traffic on your chosen custom port.

Step 2: Clearing the Router Path

The router is the “front gate” of your home.

  1. Port Forwarding: Log in to your router’s administrative panel.
  2. The Rule: Create a “Virtual Server/Port Forwarding” rule. Direct any incoming requests on your Custom Port to the Internal IP of your NAS on its specific SSH port.

Step 3: Activating the Destination (AI Tower)

Now, prepare the AI Tower to receive instructions.

  1. Install OpenSSH Server: In Windows 11, go to Settings > System > Optional Features and add OpenSSH Server.
  2. Service Management: Use PowerShell as an Administrator to start the sshd service and set its startup type to Automatic.
  3. Windows Firewall: Ensure the local firewall on the AI Tower allows inbound connections on port 22 (the internal default).

Step 4: The Magic Command

From your remote laptop, you don’t need any specialized apps. Simply open a terminal (PowerShell or CMD) and run the following command:

for example: ssh -J nas_user@blog.i234.me:22 ai_user@192.168.X.X

We can verify ssh connection is sucessful via any of commands, for example, the following one.

Critical Identity Details

  • The Username: The [AI_Tower_User] is often not the display name you see on the Windows lock screen. It is the system internal username (run whoami in the Tower’s terminal to find it).
  • The Credentials: If your PC is linked to a Microsoft Account, you must use your full Microsoft password, not the 4-digit or 6-digit PIN used for physical logins.

Conclusion

By combining a NAS Jump Host with SSH tunneling, we’ve built a secure, professional-grade development environment. It follows the principle of “least exposure”—the powerful AI Tower remains hidden, while you enjoy full access from anywhere in the world.

Leave a Reply

Your email address will not be published. Required fields are marked *