diff --git a/README.md b/README.md index e8fd6c5..0e9ad9a 100644 --- a/README.md +++ b/README.md @@ -11,6 +11,7 @@ An evolving how-to guide for securing a Linux server that, hopefully, also teach - [To Do / To Add](#to-do--to-add) - [Guide Overview](#guide-overview) - [About This Guide](#about-this-guide) + - [My Use-Case](#my-use-case) - [Safe vs. DANGER ZONE](#safe-vs-danger-zone) - [Editing Configuration Files - For The Lazy](#editing-configuration-files---for-the-lazy) - [Contributing](#contributing) @@ -119,6 +120,22 @@ This guide... ([Table of Contents](#table-of-contents)) +### My Use-Case + +There are many types of servers and different use-cases. While I want this guide to be as generic as possible, there will be some things that may not apply to all/other use-cases. Use your best judgement when going through this guide. + +To help put context to many of the topics covered in this guide, my use-case/configuration is: + +- A desktop class computer... +- With a single NIC... +- Connected to a consumer grade router... +- Getting a dynamic WAN IP provided by the ISP... +- With WAN+LAN on IPV4... +- And LAN using [NAT](https://en.wikipedia.org/wiki/Network_address_translation)... +- That I want to be able to SSH to remotely from unknown computers and unknown locations (i.e. a friend's house). + +([Table of Contents](#table-of-contents)) + ### Safe vs. DANGER ZONE Some of the sections in this guide are generally considered safe and shouldn't make your system unusable.