LOCAL NETWORK MANUAL — CORMANET SICHERHAFEN

Your safe port
in a dangerous sea.

Welcome to Cormanet – Sicherhafen. A hardened network appliance that wraps you in a private, firewall-protected LAN while you roam insecure public networks. Support: 000000@pm.me

How It Works Connect Now
🌐
Public Internet
Untrusted / Insecure
WAN — insecure
Sicherhafen
Firewall · NAT · Pi-hole · WireGuard
iptables Pi-hole WireGuard
LAN — secure
💻
Your Device
Protected zone · Up to 50 devices
50Max devices
3VPN hops
0Ads reach you
Protection
01 — OVERVIEW

What is Sicherhafen?

Sicherhafen means "safe harbor" in German. It is a dedicated network router that creates a hardened private LAN wherever you are — hotel, café, office — shielding up to 50 devices from the hostile public network outside.

🛡️

Always-on Firewall

iptables enforces strict ingress/egress policies. Unsolicited inbound connections are dropped before reaching any device on the LAN.

🔀

Traffic Isolation

WAN and LAN interfaces are fully separated. Your private traffic never touches the untrusted upstream network directly.

🌐

Controlled Internet

The router is your gateway — it forwards requests through WireGuard VPN tunnels, masking your real IP and encrypting all traffic end-to-end.

🖥️

50-device DHCP

The onboard DHCP server provisions up to 50 simultaneous devices. Every connected device inherits firewall and DNS protection automatically.

🕳️

Pi-hole DNS Sinkhole

Pi-hole acts as DNS resolver and ad blocker for the whole network. Ads and trackers are killed at the DNS level — no extensions needed.

🔐

WireGuard VPN

Traffic exits through 0000's multi-hop VPN chain: Spain → Switzerland → Iceland. Your ISP sees nothing but encrypted noise.

02 — HOW IT WORKS

The full picture

Sicherhafen intercepts all traffic before it can reach the hostile public network, processes it through several security layers, and delivers it cleanly to your device.

01

Router connects to the public network

The WAN interface plugs into the insecure upstream (hotel Wi-Fi, café hotspot, ISP). All traffic arriving here is treated as hostile by default. The firewall drops everything that wasn't explicitly requested.

02

You connect to Sicherhafen

You join the router's private LAN via the marked RJ-45 port or its own Wi-Fi access point. DHCP hands you an IP, sets Pi-hole as your DNS, and places you inside the protected zone — isolated from external threats.

03

Pi-hole filters every DNS query

Before any domain is resolved, Pi-hole checks it against its blocklists. Ad servers, tracking pixels, telemetry endpoints — all silently dropped. Clean queries are forwarded to upstream resolvers.

04

WireGuard tunnels traffic through three countries

Outbound packets enter a WireGuard tunnel that routes through Spain → Switzerland → Iceland before hitting the destination. Your hotel or ISP sees only encrypted WireGuard packets. The destination sees Buzzster's Icelandic exit IP.

05

Response returns encrypted, decrypted locally

The reply travels back through the VPN chain and is decrypted by Sicherhafen. Your device receives clean data — never having communicated with the public network or any server directly.

03 — SICHERSHIELD

Military-grade protection stack

SicherShield is the combined security layer running inside Sicherhafen — iptables firewall, WireGuard multi-hop VPN, and Pi-hole DNS sinkhole — all active simultaneously, all automatic.

🔥

iptables Firewall

Stateful packet filtering with default-deny policies. Every chain is locked down; only explicitly permitted traffic passes.

🔑

WireGuard VPN

State-of-the-art VPN protocol. Multi-hop routing through three jurisdictions. Your ISP sees nothing but encrypted datagrams.

🕳️

Pi-hole DNS

Network-wide DNS sinkhole. Ads, trackers, and malicious domains die at the resolver — before any connection is made.

WireGuard multi-hop route — powered by 0000
💻
You
LAN device
🇪🇸
Spain
Hop 1
🇨🇭
Switzerland
Hop 2
🇮🇸
Iceland
Exit node
🌐
Internet
Destination
Your hotel/ISP never sees your browsing
You don't use the IP provided by your hotel
Three jurisdictions — maximum legal separation
WireGuard: faster and more secure than OpenVPN
root@sicherhafen — iptables core ruleset
# ── Default policies: deny all inbound and forward unless permitted ──
iptables -P INPUT DROP
iptables -P FORWARD DROP
iptables -P OUTPUT ACCEPT
# ── Stateful: allow established/related sessions ──
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
# ── LAN → WireGuard VPN tunnel (wg0) → Internet ──
iptables -A FORWARD -i eth1 -o wg0 -j ACCEPT
iptables -A FORWARD -i wg0 -o eth1 -j ACCEPT
# ── NAT masquerade on WireGuard tunnel ──
iptables -t nat -A POSTROUTING -o wg0 -j MASQUERADE
# ── Allow LAN services: Pi-hole DNS (53), DHCP (67), SSH (22) ──
iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -i eth1 -p udp --dport 53 -j ACCEPT
iptables -A INPUT -i eth1 -p tcp --dport 53 -j ACCEPT
iptables -A INPUT -i eth1 -p udp --dport 67 -j ACCEPT
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT
# ── Pi-hole web UI (port 80) accessible from LAN only ──
iptables -A INPUT -i eth1 -p tcp --dport 80 -j ACCEPT
# ── Block ALL unsolicited inbound from WAN (eth0) ──
iptables -A INPUT -i eth0 -j DROP
iptables -A FORWARD -i eth0 -j DROP
eth0 = WAN (public / untrusted)
eth1 = LAN (private / trusted)
wg0 = WireGuard VPN tunnel
Red = explicit DROP rules

All-in-one DNS + Ad Blocker

Pi-hole runs as the LAN's sole DNS resolver. Every query from every device passes through it. Blocked domains are sinkhol'd locally — the request never leaves the router. Legitimate queries are forwarded upstream through the WireGuard tunnel.

A full graphical dashboard at http://10.104.19.2/admin lets you browse query logs, manage per-device access rules, and configure domain allow/blocklists. You decide which devices can reach which domains.

pi-hole.net ↗
0
Domains blocked
53
DNS port
50
LAN devices
0
Extensions needed
Quick access
Dashboardhttp://10.104.19.2/admin
DNS server10.104.19.2
Assigned viaDHCP (automatic)
04 — GETTING CONNECTED

Plug in. You're protected.

Connect to the marked RJ-45 port on the Sicherhafen box and you're instantly inside the shielded LAN. Internet access requires a WAN connection — via the labeled Ethernet port or Wi-Fi configured through SSH.

SICHERHAFEN
WAN
⬆ Internet
LAN 1
⬤ Connect here
LAN 2
LAN 3
LAN 4
WAN port — plug in the insecure uplink (hotel cable, hotspot, etc.)
LAN ports — connect your device here (look for the sticker). A switch works too.
LAN connection gives you access to Sicherhafen's internal services. Internet access needs WAN.
A

Via Ethernet (LAN)

  1. Plug a cable into the marked LAN port (sticker present).
  2. DHCP assigns your IP automatically (pool: up to 50 devices).
  3. Pi-hole set as DNS automatically.
  4. Default gateway: 10.104.19.1
  5. Done — you're protected.
B

Configure Wi-Fi via SSH

For internet access via Wi-Fi, SSH into Sicherhafen and run these commands. Use zsh or a terminal with color support for best experience.

SSH: ssh kaixo@10.104.19.1
C

Admin Panel

  1. Open a browser on the LAN.
  2. Go to http://10.104.19.1
  3. Log in with admin credentials.
  4. Pi-hole dashboard: http://10.104.19.2/admin
⚠ Cable WAN takes priority over Wi-Fi. If you plug in a WAN cable, Wi-Fi disconnects automatically — Sicherhafen assumes wired is faster.
Wi-Fi setup commands — run inside ssh kaixo@10.104.19.1
kaixo@sicherhafen ~ zsh
# Step 1 — scan for available Wi-Fi networks
sudo nmcli dev wifi rescan
sudo nmcli dev wifi list
# Step 2 — connect to your network
# Replace SSID and password with your actual network credentials
sudo nmcli dev wifi connect "CNS-WFI_2.4" password "corm1723AS."
# Step 3 — set auto-connect and route priority
sudo nmcli con modify "CNS-WFI_2.4" connection.autoconnect yes
sudo nmcli con modify CNS-WFI_2.4 ipv4.route-metric 100
# Step 4 — verify configuration
sudo nmcli -f connection.autoconnect,ipv4.route-metric con show "CNS-WFI_2.4"
# ✓ Done. Wi-Fi is active and auto-reconnects on reboot.
# ✓ Plug in WAN cable to switch automatically to wired (higher priority).
05 — DEVELOPERS

The people behind Sicherhafen

A small, focused team built this from the ground up. Every component chosen for security, reliability, and simplicity.

J

0001

Full-stack Developer

Designed, built, and maintains the entire Sicherhafen system — hardware configuration, firewall rules, Pi-hole integration, WireGuard tunneling, and this manual.

000000@pm.me
K

0001

VPN Infrastructure — 000000

Provides the multi-hop WireGuard VPN infrastructure (Spain → Switzerland → Iceland) through 0000, ensuring zero-knowledge routing and maximum jurisdictional privacy.

000000.com ↗
J

0001

Public Relations & QA Testing

Handled all external communications, coordinated outreach, and led real-world testing of the Sicherhafen system — stress-testing the network across multiple environments and use cases.

06 — SUPPORT

Need help?

If you run into issues with your Sicherhafen router, reach out directly. We'll sort it.

Contact support

000000@pm.me