Skip to content

Accessing PG Apps

Admin9705 edited this page Feb 28, 2019 · 6 revisions

📂 Click Here - Sign up for Google's Suite for Business - Unlimited Space

📂 Click Here - NZB's with from NewsHost - PG Members Receive a 58% Discount

Table of Contents

  1. Intro
  2. End State Execution
    1. IP & Port
    2. Domain & Port
    3. Subdomain & Domain
  3. Conclusion

1. Intro

Accessing applications may appear to be odd through PlexGuide; but will realize that accessing applications is the same as you have done utilizing other operating systems (MAC/Windows). Applications generated by PlexGuide are accessed through one of the three ways; via subdomain-domain, domain-port, and/or through ipv4-port.

2. End State Execution

What does this mean? It boils down to the what the application produces at the end for you to access. Notice below that the are several different vectors in-which the application can be accessed.

I. IP & Port:

This is the most common way that an application may be accessed. If you are accessing your applications through this method; it would not be ideal for general internet usage. Why? It's because the server can easily accessed or subject to an attack by an adversary who is conducting a recon through the use of a port scan. If utilizing a server internally with in your network or through a local virtual machine, this will be the most common route. For example, deploying NETDATA may generate the address of Final Note, it may be ideal to lock your internal server down with a fixed ip address rather than routing providing a random address every several days.

II. Domain & Port

As noted above, this would still not be ideal because your domain address is tied to an IP Address or the domain is utilized as a forwarding domain. This will still generate the same concern as listed above in that your ports can be scanned by any adversarial forces on the Internet. It would be recommend to close your ports via portguard and appguard. If internal, you can actually use duckdns to have a domain reach your virtual machines/servers within your network, but again; your server may subject to an attack.

Notice that LABEL 1 says the site is not secure. That is bad in general because the data your accessing is not encrypted. If an adversary were to conduct a man-in-the middle attack, it would be easy for anyone on the Internet through the use of a series of tools to capture data between yourself and remote server. LABEL2 just demonstrates that domain and IP address were utilized. In this example, Traefik was not setup and the domain pointed to the IP address.

III. Subdomain & Domain

This would be the most ideal route for you to access your applications. By doing so, the adversary would have to attempt to attack your server through the use of a domain/subdomain list. This would be rare due to the amount of effort that an adversary would have to put forth to discover your services. Accessing your programs through the use of a subdomain/domain is generally useful by typing a domain such as

Notice the LABEL 1 in the picture above. This is the best way to access your server because the data between you and the server's access is encrypted. If you are utilizing an internal server, this part would not matter.

3. Conclusion

So to wrap this all up, there are multiple way to access your applications. The more secure you want your site to be, the more effort you will have to put to lock it down. Regardless, now you understand how to access your applications through three different ways as shown above.

📂 Click Here - NZB's from USENET Server - PG Members Receive a 60% Discount

Useful Starter Links

  1. Introduction
  2. Blitz YouTube Channel
  3. G-Suite Signup
  4. Recommended NewsHosts

Prior Planning 101

  1. Recommended Pre-Reading
  2. Server - Storage Planning
  3. Usenet or BitTorrent
  4. PG Editions
  5. PGBlitz Repos
  6. Common Issues

Deploy & Config

  1. SSH Server Access
  2. Create a SUDO User
  3. Install PGBlitz
  4. WatchTower
  5. Remote Path Mappings

Data Transport
  1. PG Clone
    1. Google OAuth Keys
    2. PG Move
    3. PG Blitz
    4. 2nd HD Option

Key Components

  1. Traefik
  2. Port Guard
  3. PG Shield
  4. PG Press
  5. Google Cloud - GCE
    1. Automated setup
  6. Hetzner Cloud
  7. PG Fork
  8. Extra PG Commands

Blitz App Info

  1. Accessing PG Apps
  2. App Port Scheme
  3. Plex to AutoScan

Tools & Services

Core Apps [Expand]
  1. Emby
  2. Jackett
  3. Jellyfin
  4. LazyLibrarian
  5. Lidarr
  6. Netdata
  7. NZBGet
  8. Ombi
  9. Plex
  10. Portainer
  11. qBittorrent
  12. Radarr
  13. RuTorrent
  15. Sonarr
  16. Tautulli
Community Apps [Expand]
  1. AirSonic
  2. AllTube
  3. Bazarr
  4. Beets
  5. Bitwarden
  6. BookSonic
  7. cAdvisor
  8. Cloud Commander
  9. DDClient
  10. Deezloaderremix
  11. Deluge
  12. DelugeVPN
  13. Duplicati
  14. EmbyStats
  15. FlexGet
  16. Gazee
  17. Gitea
  18. Handbrake
  19. Headphones
  20. Heimdall
  21. HomeAssistant
  22. HTPCManager
  23. JDownloader2
  24. jd2-openvpn
  25. Kitana
  26. Logarr
  27. MakeMKV
  28. MariaDB
  29. McMyadmin
  30. MEDUSA
  31. Mellow
  32. Monitorr
  33. Muximux
  34. Mylar
  35. NextCloud
  36. NowShowing
  37. NZBHydra2
  38. NZBThrottle
  39. Organizr
  40. pyLoad
  41. Radarr4k
  42. Resilio
  43. rflood-openvpn
  44. rutorrent-openvpn
  45. ShareSite
  46. Shoko Anime Server
  47. SpeedTest
  48. SyncLounge
  49. Syncthing
  50. The Lounge
  51. Transmission
  52. Trakt.or
  53. Ubooquity
  54. x TeVe
  55. Zammad

Misc Info & Articles

  1. Change Server Time
  2. Fail2Ban
  3. Custom Containers
  1. Scripting Area
    1. Auto Upload for Sonarr and Lidarr
    2. Auto Delete Log
    3. Plex Plugin DB Backup
    4. Plex fast BACKUP
Clone this wiki locally
You can’t perform that action at this time.