No, not ROS/Tutorials/MultipleMachines
ROS/Tutorials/MultipleRemoteMachines discusses a networking approach which would allow ROS nodes to communicate across different networks, including the public internet, but it does so by suggesting port forwarding of
tcp://:1025-65000 (ie: all TCP+UDP ports) from the public IP of a NAT router to a host on the network behind it. Firewalls or VPNs are not discussed, nor any other form of network security.
This is dangerous in any case, but exposing a ROS 1 node graph to the public internet like that is not a good idea, as many papers and security conferences have already demonstrated (hackers waving your PR2’s arms at you, etc).
The fact this tutorial follows the regular multi-machine tutorial makes it seem like this is an “official guide” or even best practice (as the OP of Best Practice for Running ROS Remotely on ROS Answers thought).
I’ve already added a warning to the tutorial, but I believe deleting the page would be the better.
My reason for posting this here first is to see whether others here agree with my assessment.
(an alternative would be to edit the page, but seeing as it’s almost 90% about port forwarding and a specific network setup which depends on that, that doesn’t seem feasible or efficient)