Nginx Proxy Manager (NPM) provides a web interface to configure the popular web server Nginx as a reverse proxy. It can be used for many purposes, but this guide will describe using it to provide HTTPS/TLS termination for other applications running on your TrueNAS system.
example.com
as a placeholder for this domain.NPM will need to listen on ports 80 and 443 of your system, and by default the TrueNAS web interface already does that. You'll therefore need to change this. In the TrueNAS web interface, go to System (1) -> General Settings (2), then click Settings in the GUI section (3).
Change HTTP port to 81 (1), and HTTPS port to 444 (2), then click Save.
Confirm the restart of the web GUI.
At this point you'll probably need to log back into the web interface. Browse to http://ip_of_truenas:81
and do so.
In the TrueNAS web interface, browse to Apps, then click Discover Apps. Find Nginx Proxy Manager
and click Install. Set the HTTP port to 80, and the HTTPS port to 443. You can also change the WebUI Port if desired, but the remainder of this guide assumes you've left it at the default.
Then click Install. Let the application deploy, which may take a few moments.
Create a local DNS record pointing npm.lan.example.com
to the IP address of your NAS.
To access the NPM UI, browse to http://ip_of_truenas:30020
. Log in with an email address of admin@example.com
and a password of changeme
. You'll be prompted to change these once you log in.
For this step, you'll need your domain name and the API token. It's recommended that you reserve a subdomain for your LAN resources, e.g., if your domain is example.com
, you'd use lan.example.com
for your local domain.
In the NPM UI, go to SSL Certificates, and click Add SSL Certificate. For domain names, enter both lan.example.com
and *.lan.example.com
. Enter your email address--Let's Encrypt will use this to notify you if your certificate is about to expire. Turn on Use a DNS Challenge.
The form will change at this point. Choose Cloudflare as your DNS provider. When you do, Credentials File Content will change to look like this:
# Cloudflare API token
dns_cloudflare_api_token=0123456789abcdef0123456789abcdef01234567
Paste in your API token after the =
(replacing 0123456789...
), leaving everything else the same.
The form should look like this:
Then click to accept the Let's Encrypt Terms of Service, and click Save. Creation of the certificate will take a few moments, and you'll be returned to the SSL Certificates page.
Now that you've created a wildcard certificate, let's create a proxy host for one of your apps. Still in the NPM UI, go to Hosts -> Proxy Hosts and click on Add Proxy Host.
On the Details tab, start by entering the FQDN you'll be using (e.g., if you're setting up a proxy for Sonarr, you might use sonarr.lan.example.com
). You'll leave scheme set to http, and for IP you'll enter the IP of your NAS. In Port, you'll enter the port for that app (30027 by default for Sonarr). Turn on websockets support and Block Common Exploits.
Then go to the SSL tab. Under SSL Certificate, select the certificate you created above. Click on Force SSL and Enable HTTP/2 support. HSTS is not recommended at this time.
Click Save.
Finally, update your local DNS records to add this hostname as an alias of npm.lan.example.com
.
Browse to the host you just created. You should see the page for that app, and your browser should indicate that HTTPS is enabled with a trusted certificate.
Repeat the two steps above for any additional applications.
This guide has created a single wildcard certificate, in the expectation that any of your LAN services will use subdomains of lan.example.com
. If that isn't the case for you, or if you'd just prefer to create individual certs for each service, you can dispense with creating the wildcard cert above, and instead have NPM create a new cert for each proxy host. Be aware of the Let's Encrypt rate limits should you decide to do this.
This guide has described installation and configuration of Nginx Proxy Manager to allow TLS termination for the apps on your TrueNAS server. Consult the Nginx Proxy Manager documentation for more details on its configuration.
Many guides configure your network in such a way that the underlying apps are not directly accessible via their ports (i.e., for the app above, via port 30027). This guide does not implement such a configuration due to limitations in the apps ecosystem. As a result, you or other users on your network will be able to directly access the apps, without TLS, and without going through your proxy, unless you take other measures to restrict this. Those measures are outside the scope of this guide.