Hello, I wanted to set up my own VPN. I have a late 2012 Mac Mini that I was using as an iTunes server and for EyeTV so I could watch US TV when I travel outside the states. Purchased a copy of OSX Server, installed and configured the VPN it so it would actually connect with a fairly long VPN shared secret. Set up a 'noip" account with a static ip address. Changed the Airport Time Capsule set up to allow connections on ports 500, 1701, 4500 on UDP, but removed the TCP access for port 1723 as I was only planning on using the L2PP VPN. Got everything up and running left the VPN on for a couple days, went to check the logs today and find a large amount of activity, words and comments I didn't understand, and it appears some of the log info was removed as the top statement was something along the lines of "log history removed". I realize now I should have kept a copy of the log, but didn't before I reformatted the drive. But what really concerned me is in the "Users" list there are at least 50 "new" users, each with a name of a process Mail, Calendar, etc., and a few others I didn't recognize like "NoName" and "NoUser". I then unplugged the machine from ethernet, formatted the drive and reinstalled Yosemite and am in the process of reinstalling Server. The only thing I can think of is within the AirPort Utility, I did not have the "Block incoming IPv6 connections" box checked (it is now!) As I go through and rebuild my set up, what other security issues should I be on the look out for? I will have multiple user accounts on the machine, and only allow one non admin to run the VPN, and one to run iTunes, and make the Admin account a very long password and not leave it logged in (I think I may have left the mini logged in with the Admin account). I have since changed my AppleID password, and everything else that machine would have had in the Keychain (email, bank info, etc.). When I re-do the Mac Mini, I will not use it for any of that kind of communication. Thanks for your thoughts!