I started off with pi hole when i started messing around with an old laptop for self hosting. My advice is setup what you think is useful.
To access the server outside your home, tailscale is a great option. Fairly simple to setup especially if its just you accessing the server.
Reverse proxy would be best if you intend to let others acess your servers services often or if you dont wanna mess with tunnels. I settled on cloudflare tunnels because i didn't want another thing to turn on to acess my server outside my house.
When I didn't have a carrier grade nat to deal with, i used caddy server for automatically getting ssl certs from lets encrypt and reverse proxy all in one. I really liked that once i got it setup.
Depends on the device, but on devices like android no.
I can't say I've gone through with it myself, but in theory you could have a host somewhere connected to a VPN that you send a your tailscale traffic through as an exit node
On Android and I believe IOS it's a single connection. I would start with the basic functionality (also don't create a tailscale account with GitHub bc it does weird things with sharing if you ever want to have multiple users).
Once you've got the VPN and storage working I can think of two options to give you the functionality of 2 vpns
tasker is an android app that can let you automate a lot. It might let you switch vpns when opening say your storage app and switch back a bit easier than toggling it in settings.
setup your lap-server at home with an outgoing public VPN so traffic goes mobile device> tailscale> public VPN. Essentially acting like you're home using your public VPN. This may take some tinkering to work properly, especially when you're home on the same network. Plus you would definitely see a Network speed impact on your phone.
Tailscale and Mullvad VPN recently partnered up to solve this exact issue. So in the admin panel of tailscale you could set up a device as an exitnode and then have that run through one of Mullvads servers. It's all very neat and simple 😊
With most consumer wifi networks you can usually enable port forwarding. That would let you access services from anywhere.
Personally I would set up a Wireguard VPN server on the laptop and enable port forwarding only for the Wireguard port. This will let you access your laptop from anywhere, and it will protect you by limiting your attack surface (basically you only need to have a device Wireguard connection and you don't need to worry as much about securing every other service you want to run).
Then I'd set up dynamic DNS with any DNS provider so you don't need to keep track of a changing IP.
Then you can install whatever services you want on the laptop and you'll be able to access them from anywhere by connecting to the Wireguard VPN. It does mean you can't easily let a friend access a service on your laptop, but the tradeoff is you don't have to worry as much about security while you're learning.
That's a shame. I didn't realize it was that locked down. Ive had a lot of terrible routers but all the ones I remember allowed me at least a port forward.
I think OP can accomplish some of the same result if he can get a cheap VPS to connect through (have the laptop Wireguard to the VPS, then have a proxy on the VPS forward to the laptop over the VPN, but that's probably not worth the hassle for a starter project unfortunately.
Yes its my main router. Everything comes into the laptop across one interface setup as a trunk that includes vlans for WAN, LAN, etc. From there proxmox has a vlan aware linux bridge setup that connects to all the VMs/containers that I run. The VM virtual interfaces get tagged with whatever network I want the host to be part of.
I think self-hosted cloud is a vague statement, but I think with your network infrastructure you will be limited in what you can do. I think cloudflare tunnel could be a good option for getting the device available online.
Then the self-hosted part. There are so many things you can look into. You can run everything in Docker, install the software you want directly on your laptop, and much more.
You'll likely also need a reverse proxy. Can use nginx proxy manager, traefik, or something similar for that.
What are your goals with the self-hosted cloud? That would help you in making it easy to find resources and others here to give you advice.
I have about several dozen GB of files that I currently sync with Syncthing between my devices. The only downsides I can see is that it takes the same amount of space on all my devices and it's hard to add a new device to the group. I'd like to store the files on the laptop instead and be able to browse, access them from my other devices (mainly Linux and Android), ideally through the internet.
Switch to Resilio Sync, it has a sync-on-demand feature called Selective Sync, where you can browse the share and select files to sync now.
It's a feature of Resilio I really like, but I rely on Syncthing for daily use because Resilio kills phone memory (it stores the index in ram), and it's much more resource intensive on my file server.
Dozens of GB sounds like there's a lot of media files to me. I'd not share that via Syncthing. Assuming that is correct: Wouldn't a media server like Jellyfin be a better fit? Or if it's photos, I recommend Immich. Note that Immich is under active development and should not be your only place to store photos.
When you say WiFi to you mean that you only have WiFi access or does the labtop not have a Ethernet port? If you have a wired connection I would get either a thunderbolt or usb3 adapter to hardwire it as a hardwired connection will be more stable even on USB speeds.
The OS will depend on what you want to host. If its a older system with less than 8 GB of ram I would just install Debian with docker. You can find premade docker compose files online which should make deploying software easy.
If you have plenty of hardware you could install Proxmox and then a few VMs.
Edit2:
Actually I take back what I said, don't use Kubesail. I went back and tried it and it has a lot of issues. If you want remote access consider a VPN or remote vm
Its a startup that offers a web dashboard and a proxy for public access. I used it for a while when it was fairly new and there app store made it easy to find and deploy services.
I starter my home server with a laptop. I did nextcloud, paperless, jellyfin + *arr services, photoprism, and a few others.
Not having control over your network is the biggest hurdle because you kind of need a fixed IP to access it.
However, there are some services to broadcast your hostname to the local network (e.g. so you can log in with serveruser@myserver over SSH).
You may be able to use that to access your containers from the network, but just keep in mind that other users on the local network can also access your server.
Fixed IP doesn't matter today with virtual/mesh network approaches like Wireguard/Tailscale.
They open an outbound connection, so the router treats it like any other connection. Once the tunnel is established, inbound comms can take place.
Using Tailscale's Subnet Router enables access to local devices that can't run a TS client, while the Serve and Funnel options enable external access from devices that don't have the TS client installed. Edit: Serve is for sharing to TS clients that aren't part of your TS network.
It's really interesting to see these solutions today, when Hamachi was doing it 20 years ago. Glad to see it's caught on, and being developed/extended.
Without being able to set a static ip and forward ports you cant host services and point to them with a domain, like driveway-home.com or something.
But I think cloudflare has a service that lets you connect remotely without needing static ip's (some one else will know the name). If you were to use that then you can use your laptop to host pretty much anything on the Awesome Selfhosted List.
CloudFlared is the application you run on your server, and CloudFlare tunnels are what it connects with. You get the same outcome as a ddns but it functions differently under the hood. You also need a domain name for this I think.
I would advise against port forwarding without at least a proper firewall with isolation. It is very very dangerous to expose things to the internet and it will backfire at some point, sometimes without your knowledge.