teslasaur

joined 1 year ago
[โ€“] teslasaur@lemmy.world 1 points 2 weeks ago

Sorry about my confused rambling ๐Ÿ˜… Yes, the example was to demonstrate the difference between subnetting and vlan. Albeit simplified. What you said is right.

[โ€“] teslasaur@lemmy.world 1 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

The poster i was responding to equated subnetting to vlans. I might have misunderstood what they meant though. It sounded like they wanted to use the same subnet per vlan, which wont work if you want them routed in the same gateway.

Reading it again they make it sound like you can't subnet all of these networks on a switch without vlan, which you definitely can. I could for example connect 4 different devices on the subnet 192 168.10.x/24 and have them reach each other. I could also connect 4 more devices in the same switch but on a different network 192.168.20.x/24 and it would work.

[โ€“] teslasaur@lemmy.world -2 points 2 weeks ago (6 children)

You can't use the same subnet on different vlans if you ever intend for both of them to reach the internet. In that case you'd need a second router which just defeats the purpose

[โ€“] teslasaur@lemmy.world 1 points 3 months ago

It has to do with link priority on the server. You'd imagine that a server that receives a packet that has a return address on the same subnet as it self logically would use that interface instead.

A similar thing happens in switches. For example if you have two vlans on a switch and both vlans have an ip assigned, connect a computer to one of the vlans. You will only be able to reach the switch on the non-routed connection. Even if you also are allowed to reach the second vlan through a router/Firewall.

[โ€“] teslasaur@lemmy.world 11 points 3 months ago (2 children)

My guess is that the server receives the packet from the client with src .11.101 dst .10.102 and tries to respond over the interface that has .11.102 assigned. The client expects a response from src .10.102 and drops the packet. But I would turn on a packet sniffer in the gateway to see if the returning traffic even passes the Firewall in scenario 1.

[โ€“] teslasaur@lemmy.world 12 points 3 months ago

This is the perfect representation of how most people would imagine a communist.

[โ€“] teslasaur@lemmy.world 1 points 3 months ago (1 children)

Reset the AP to make sure it uses dhcp for its own ip and update firmware from unifi network after adopting the AP again.

Test it by swapping places of the access points to find out if the issue is related to the access points or something else.

7
submitted 6 months ago* (last edited 6 months ago) by teslasaur@lemmy.world to c/selfhosted@lemmy.world
 

I'm in the process of finding a server to run as a homlab. It will be running proxmox VE and have a couple of machines running at a time for testing purposes. These machines will run anything from server 2022 to debian and various other distros depending on what I wanna fiddle around with.

Does anyone have any experience with Xeon E-2400 Cores or their subsequent "consumer" variants in intel 14000-series running proxmox?

From what i gather in the forums there is a pretty substantial performance difference between e-cores and p-cores which are present in the Raptor Lake CPU's

So the question is: Would you rather have a Xeon E-2400 8C/16T CPU or an i9 14900 8p16E/32T in a proxmox hypervisor?

[โ€“] teslasaur@lemmy.world 1 points 10 months ago

OpenVPN connect on both. I load the .ovpn-file that is exported from the server and that's it.

[โ€“] teslasaur@lemmy.world 3 points 10 months ago (2 children)

Personally I would have gone for OpenVPN access server on Debian. Fairly simple and well documented for those starting out.

I have used and worked with OpenVPN connect on android, PC and Mac.

[โ€“] teslasaur@lemmy.world 15 points 10 months ago (2 children)

By making a bridge in the opensense interfaces you have created a layer2 network. This means that all the devices connected on that network are broadcasting their Mac addresses and are added to the ARP table on the opensense. Since they all are on the same physical network and the same subnet, none of the traffic will ever hit the layer 3 rules on your opensense.

If you want opensense to handle the rules of the traffic you will need to put the devices on different subnets and separate clans. Create a gateway address for every vlan on the opensense and point your devices to the opensense as their gateway.