med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

343
active users

#firewall

4 posts4 participants1 post today

Hey other #network folks I have a weird #firewall and #NAT question. I'm looking at the firewall traffic log where my work laptop (I'm in the office) is the source, and I'm looking at the traffic connecting to my home plex server.

The plex server is a private IP behind NAT. In the log I show the putbound traffic from my work laptop to my home router IP, but I also see a following entry with the private IP that my router is forwarding plex's port traffic to. I thought anything done behind NAT wouldn't show up, especially because I'm only looking at the initial communication out, and not the return communication from my server to my me. Is my understanding of NAT wrong?

I came across the #Fail2Ban #docker image from #linuxserverio and thought to myself that it's finally time to set up Fail2Ban. I admit i never used it before and it was a bit difficult to add it to my #playbook as all of my #servers have different services and therefore different #logfile paths, but that's nothing #jinja #templating can't fix.

Now that i've got #Discord notifications for banned #IPs, it's time to work on actual #IPblocking. I also want to use the #IPComplaint and #AbuseIPDB actions as i really like the idea of reporting abuse (even though i have no idea how effective that may be).

I may also want to replace the discord #webhook with #email notifications later as that's mostly the reason i've set up a #mailserver ( #stalwart ) in the first place.

I mean, most of my services are only accessible from #tailscale or my #homenetwork, but since #Ansible makes it so much easier to apply higher standards, i just can't resist. My #homelab is changing every day and i think setting up additional #security, even though i don't need it yet, is never a bad idea.

Hey Fedi, was ist denn Deine Meinung zu #Netgate Firewalls? Ich würde gerne mein Heimnetz etwas besser unter Kontrolle bringen und unnötige Trackingkommunikation von "smarten" Geräten unterbinden und am liebsten auch die ganzen anderen Privacy-feindlichen Vorgänge, denen man täglich so ausgesetzt ist, schon auf Netzwerkebene blockieren. Taugen die Geräte von Netgate was oder ist das überteuert? Wie geht Ihr mit dieser Sache um? Ist-Zustand ist sehr basic: Bislang habe ich nur eine Fritzbox, AVM-Mesh-APs und ein paar unmanaged Switches für die Ethernetkabel.

Replied to Christian

@chris forum.netgate.com/topic/187943 mentions atxfiles.netgate.com/mirror/do but that seems to only have 2.6.0, 2.7.0, 2.7.1 and 2.7.2. (I suppose you could get 2.7.2 and upgrade to 2.8.0.) I also found mirror.transip.net/pfsense/dow which has a handful of different 2.1.x through 2.6.x versions. Neither provides 2.8.0 directly though.

Netgate put downloads behind their shop fairly recently, it seems. Bugged me enough that I'm looking at options.

Netgate Forum · What happened to the CE downloads?@GeorgePatches For the time being, you can download the images here https://atxfiles.netgate.com/mirror/downloads/

I love the new zone management of the Unifi firewall. I feel more comfortable now being more granular in my rules. Before, I was using Cloudflare DNS proxy to only allow three countries to connect to my public services.

Now, I’m no longer using the DNS proxy, and my rule is done with Unifi. Other improvement, my public services are in an isolated VLAN and are available on IPv4 and IPv6.

Today's installment of #blockthis:

Block login URLs for common shadow SaaS, domain registrars, and high-risk licensing downloads.

cloudflare.com/login/
identity.getpostman.com
lucid.app/users/login/

sso.godaddy.com
namecheap.com/myaccount/
auth.hostinger.com/

sketchup.com
figma.com/downloads/
virtualbox.org
download.oracle.com/java/24/latest/jdk-

#firewall#edl#login

Oh, ha, and speaking of #firewall + #multicast fixes: Didn't notice before but my #Linux #netfilter fix for #MRD has made it upstream, yaiy: git.kernel.org/pub/scm/linux/k
It went in through net-next, so likely won't be backported to stable kernels. But now I'm looking forward to #Proxmox using Linux 6.10, then I can drop the workaround firewall rule on the @chaotikumev server.

git.kernel.orgMaking sure you're not a bot!