Modlog

/c/networking Modlog
TimemodAction
13 days ago
mod
Banned tal@lemmy.today from the community networking@sh.itjust.works
reason: automod
5 months ago
mod
Banned bungobungis@ttrpg.network from the community networking@sh.itjust.works
reason: automod
8 months ago
mod
Banned James_PTG@lemmy.ml from the community networking@sh.itjust.works
reason: automod
8 months ago
mod
Removed Post Mikrotik aka the `Thought Police` ?
reason: automod
8 months ago
mod
Unbanned jet@hackertalks.com from the community networking@sh.itjust.works
reason: error, unbanning
9 months ago
mod
Restored Comment Top tier advice! by jet@hackertalks.com
9 months ago
mod
Restored Comment https://en.m.wikipedia.org/wiki/IEEE_802.1X But, it's probably far easier to just run a wire guard VPN server, and require every device to connect to the server to get network access. So any device physically plugging into your network would only be able to route to the wire guard server. by jet@hackertalks.com
9 months ago
mod
Restored Comment Pros: * You get your hands dirty * You learn a lot * You have total control of everything Cons: * It takes a lot of time to do anything the first time * You're always going to be tweaking something * Things are going to break at random times when it's inconvenient No matter what you do, have an extra cheap open WRT router you can throw in when something breaks. I for one like unifi, I would recommend their dedicated router product rather than an all-in-one device. You can always run there management software in a docker container when you need it by jet@hackertalks.com
9 months ago
mod
Restored Comment Some devices will let you specify a list of allowed MAC addresses per port. I believe ubiquity does allow this. Some devices will have a whole port security protocol, if they see a Mac address that hasn't been authenticated, the port is put into violation requiring an admin to physically validate it after visiting the port to make sure nothing nefarious happened. I do not believe ubiquiti has this by jet@hackertalks.com
9 months ago
mod
Restored Comment There are ways to try to identify the device connecting to the network. But that doesn't prevent a third party from spoofing an appropriately authenticated device and monitoring and collecting traffic as well as injecting traffic. It just raises the difficulty Over networks, or access points, that are intrinsically unsafe, the current gold standard is to require clients transiting those networks to then use a VPN. So internal Wi-Fi, with access only to a wire guard server, and your wireless clients connect to the wire guard server. Even if a malicious actor takes over the access point, or compromises the ethernet cable itself, the traffic will be encrypted, and only authenticated clients will be able to actually access your infrastructure. So you would enforce a VLAN onto the port that the access point has access to, and then that VLAN can only access the UDM wireguard server. by jet@hackertalks.com
9 months ago
mod
Restored Comment This is why I'm recommending IPv6. If you have global unique addresses for all your devices, including on your local network, it makes tail scales job much easier by jet@hackertalks.com
9 months ago
mod
Restored Comment Good thinking. If it works without tail scale, it's probably a tail scale configuration issue. by jet@hackertalks.com
9 months ago
mod
Restored Comment This is a shot in the dark, but you could do IPv6 for your internal networking, with the global unique IP addresses, it might help tailscale just route locally instead by jet@hackertalks.com
9 months ago
mod
Restored Comment yeah its 100% possible, check the qemu manual for your VM network backends. https://wiki.qemu.org/Documentation/Networking A tap device, and have it bypass your mullvad routing rules by jet@hackertalks.com
9 months ago
mod
Restored Comment I would recommend starting with tail scale. Tail skill will help you set up wire guard to connect your networks. And it'll work across a large diversity of network topologies.. Once you get things working with tail scale, then you can look at doing ethernet bridging, more advanced things. But they're going to be more fragile and depend more precisely on your topology by jet@hackertalks.com
9 months ago
mod
Banned jet@hackertalks.com from the community networking@sh.itjust.works
reason: Ban unban test
9 months ago
mod
Unbanned jet@hackertalks.com from the community networking@sh.itjust.works
9 months ago
mod
Unbanned jet@hackertalks.com from the community networking@sh.itjust.works
9 months ago
mod
Banned jet@hackertalks.com from the community networking@sh.itjust.works
reason: automod