as of today I noticed I can’t access my plex server at all when on my work’s wifi. But if i swtich to 4g i can watch plex just fine. But obviously mobile data isn’t truly unlimited high speed. And yes I only watch shit on my break. I have remote access enabled etc. Not sure what I can do?

  • parmesancrabs@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    They might not be blocking plex, but blocking most ports that aren’t relevant to “normal” internet usage. E.g. just have ports 443, 80 and 8080 allowed.

    You might have to steer a VPN through those ports too?

  • Sir_Kevin@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    Do that shit on your phone. I never understand how many people openly fuck around on company networks. 90% chance they’re logging everything you’re doing.

  • Baron Von J@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Download some stuff to your phone/tablet for “offline” viewing. Your work has decided to restrict you from doing non-work stuff on their network and that’s their right.

  • deranger@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    5 months ago

    VPN to LAN, great for remote access of other things on your home LAN as well. Once connected it will be as if your phone was on your home WiFi.

    • RegalPotoo@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      Don’t do this. This is going to trip alarms on any half decent IDS, and your net admins are busy enough without having to write up a report to go to the HR people deciding if they are going to fire you for breaking the computer use policy

        • wewbull@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          ·
          5 months ago

          Whose WiFi? The companies WiFi? Why would that be any different to the wired network?

          • Crashumbc@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            5 months ago

            If you’re letting random mobile devices on the internal network, you’ve already failed security 101.

            • lud@lemm.ee
              link
              fedilink
              arrow-up
              0
              ·
              5 months ago

              Obviously random personal phones shouldn’t have access to stuff like file servers, domain controllers, or even normal endpoints. But it’s perfectly fine and normal to host a guest network that only gives internet access and nothing else.

              • Crashumbc@lemmy.world
                link
                fedilink
                English
                arrow-up
                0
                ·
                5 months ago

                Exactly! And you shouldn’t care if someone fires up a VPN on a guest network! I would expect them to actually.

              • deranger@sh.itjust.works
                link
                fedilink
                arrow-up
                0
                ·
                edit-2
                5 months ago

                Forgive my ignorance, but how would they know? Wouldn’t they just see a VPN connection and where it’s going, but not what’s happening across the VPN?

                I’m just glad I don’t have to deal with this. Even if I use the WiFi at work, it’s for public use and there’s no restriction with regards to streaming.

                • MelodiousFunk@slrpnk.net
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  5 months ago

                  They’d see a VPN connection, where it’s going, how much traffic it’s using, and the origination point on the network. Might as well put up a giant red arrow over your desk.

  • Moghul@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Don’t, unless you don’t mind losing your job. They did it because they noticed people were watching stuff at work and they don’t want you to do it.

    • Victor@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      We don’t know their situation. Might be fine, and they just blocked most ports rather than specifically Plex’s. OP also said they only watch stuff on their break.

      • Moghul@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        5 months ago

        Fair enough, that could be the case. Some generic blocking setting. In that case others in this thread have given good technical suggestions.

    • InputZero@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      This is the best idea. Just talk to them, best case they’ll help you with it, worst case is they’ll give you a talking to. Going around IT’s back is a very good way to get fired really quickly.

  • sunbeam60@lemmy.one
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    VPN to your home network (wg-easy is the easiest way to set this up) or change the public port of your server to something the work network will allow.

  • AernaLingus [any]@hexbear.net
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    If you’re watching consecutive episodes of a series you can always just download them to your phone before you head to work. Not really viable if you hop around a lot, though.

  • It honestly depends on the network policies you’re dealing with. Some employers have strict security and won’t allow workarounds like vpns or proxies, and they really don’t want you connecting the network to other unsecured ones.

    That said, I’d try a personal VPN (not necessarily a proxy one, just one that can connect you to your plex server on a shared network). If that doesn’t work, I really doubt it’s a good idea to connect to your plex server from their wifi anyway. If that’s the case, I would just download the media I want before I get to work

  • Ptsf@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Since people here are critiquing you instead of actually assisting, I’d have you take a look at tailscale. You can use it to easily create a resistant vpn between your home and your work network, allowing the traffic to bypass filtering.

  • Sarsoar@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    I have an oracle free tier vps that I run reverse proxy on and have certs for subdomains for a domain I got on cloudflare. Cloudflare dns points to the vps, apache server proxy on port 80/443. On the vps I also have tailscale and another tailscale on a server at home advertising routes.

    So I have music.mydomain for subsonic and plex.mydomain and files.mydomain for nextcloud, etc.

    Its normal https web traffic so weird ports dont need to be accessed or remembered.