as of today I noticed I can’t access my plex server at all when on my work’s wifi. But if i swtich to 4g i can watch plex just fine. But obviously mobile data isn’t truly unlimited high speed. And yes I only watch shit on my break. I have remote access enabled etc. Not sure what I can do?

Update: turns out I’m an idiot and my HD bay was turned off hence why I couldn’t get into my plex/media. Now I can view it all just fine at work.

  • Sir_Kevin@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    Do that shit on your phone. I never understand how many people openly fuck around on company networks. 90% chance they’re logging everything you’re doing.

  • Ptsf@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    Since people here are critiquing you instead of actually assisting, I’d have you take a look at tailscale. You can use it to easily create a resistant vpn between your home and your work network, allowing the traffic to bypass filtering.

  • It honestly depends on the network policies you’re dealing with. Some employers have strict security and won’t allow workarounds like vpns or proxies, and they really don’t want you connecting the network to other unsecured ones.

    That said, I’d try a personal VPN (not necessarily a proxy one, just one that can connect you to your plex server on a shared network). If that doesn’t work, I really doubt it’s a good idea to connect to your plex server from their wifi anyway. If that’s the case, I would just download the media I want before I get to work

  • Baron Von J@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    Download some stuff to your phone/tablet for “offline” viewing. Your work has decided to restrict you from doing non-work stuff on their network and that’s their right.

  • Sarsoar@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    I have an oracle free tier vps that I run reverse proxy on and have certs for subdomains for a domain I got on cloudflare. Cloudflare dns points to the vps, apache server proxy on port 80/443. On the vps I also have tailscale and another tailscale on a server at home advertising routes.

    So I have music.mydomain for subsonic and plex.mydomain and files.mydomain for nextcloud, etc.

    Its normal https web traffic so weird ports dont need to be accessed or remembered.

  • deranger@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    2 months ago

    VPN to LAN, great for remote access of other things on your home LAN as well. Once connected it will be as if your phone was on your home WiFi.

              • deranger@sh.itjust.works
                link
                fedilink
                arrow-up
                0
                ·
                edit-2
                2 months ago

                Forgive my ignorance, but how would they know? Wouldn’t they just see a VPN connection and where it’s going, but not what’s happening across the VPN?

                I’m just glad I don’t have to deal with this. Even if I use the WiFi at work, it’s for public use and there’s no restriction with regards to streaming.

                • MelodiousFunk@slrpnk.net
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  2 months ago

                  They’d see a VPN connection, where it’s going, how much traffic it’s using, and the origination point on the network. Might as well put up a giant red arrow over your desk.

    • RegalPotoo@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Don’t do this. This is going to trip alarms on any half decent IDS, and your net admins are busy enough without having to write up a report to go to the HR people deciding if they are going to fire you for breaking the computer use policy

        • wewbull@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Whose WiFi? The companies WiFi? Why would that be any different to the wired network?

          • Crashumbc@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            If you’re letting random mobile devices on the internal network, you’ve already failed security 101.

            • lud@lemm.ee
              link
              fedilink
              arrow-up
              0
              ·
              2 months ago

              Obviously random personal phones shouldn’t have access to stuff like file servers, domain controllers, or even normal endpoints. But it’s perfectly fine and normal to host a guest network that only gives internet access and nothing else.

              • Crashumbc@lemmy.world
                link
                fedilink
                English
                arrow-up
                0
                ·
                2 months ago

                Exactly! And you shouldn’t care if someone fires up a VPN on a guest network! I would expect them to actually.

    • InputZero@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      This is the best idea. Just talk to them, best case they’ll help you with it, worst case is they’ll give you a talking to. Going around IT’s back is a very good way to get fired really quickly.

  • viking@infosec.pub
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    If they block plex, they probably block private vpns as well (or if they don’t you’d most likely be violating some policy). So other than politely asking your IT admin to unblock it, there’s exactly nothing you can do.

  • Moghul@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    Don’t, unless you don’t mind losing your job. They did it because they noticed people were watching stuff at work and they don’t want you to do it.

    • Victor@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      We don’t know their situation. Might be fine, and they just blocked most ports rather than specifically Plex’s. OP also said they only watch stuff on their break.

      • Moghul@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        Fair enough, that could be the case. Some generic blocking setting. In that case others in this thread have given good technical suggestions.

  • sunbeam60@lemmy.one
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    VPN to your home network (wg-easy is the easiest way to set this up) or change the public port of your server to something the work network will allow.

  • m-p{3}@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    2 months ago

    I simply changed my public port to 443 in Plex and made a port forward on my home router. 443 -> internal_ip:32400

      • m-p{3}@lemmy.ca
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        On your Plex server, you change the public port here

        On your home router, you reserve the IP address (aka DHCP reservation) assigned to the machine hosting the Plex server (or you assign a static IP address to it) in my case it’s 192.168.1.90, then you make a port forward so that port 443 on your public address is forwarded to your internal_ip port 32400.

        Now the home router part is specific to your router brand and model, so you’ll have to do some research on your end.

        • yuuunikki@lemmy.dbzer0.comOP
          link
          fedilink
          arrow-up
          0
          ·
          2 months ago

          I have spectrum so I have the default modem/router they provide which for my use case is just fine. In the spectrum app I can assign port forwards.