The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,862 other subscribers

Archive for the ‘Network-and-equipment’ Category

Some cool (mostly Dutch) WiFi names (related to my earlier naming posts)

Posted by jpluimers on 2023/05/22

From [Wayback/Archive] De Leukste Wifinaam van 2021 | NPO Radio 2:

  • It hurts when IP
  • Modem Talking
  • Boogie WonderLAN
  • AIVD afluisterplantenbak
  • WiFinal Countdown
  • Ichbinwifidu
  • Michiel de Router
  • Ziggo Stardust
  • Drop it like it’s hotspot
  • Draadlozing
  • WhyTellMeFi
  • Lekker Wifi
  • Wifi Soerjadi
  • Jodelawifi

My related blog posts:

–jeroen

Posted in Conventions, Development, Fun, Naming Conventions, Network-and-equipment, Power User, Software Development, WiFi | Leave a Comment »

So long and thanks for all the fish: PC Engines apu platform EOL (in 2024, but still)

Posted by jpluimers on 2023/04/24

It was great while it lasted, so be sure to order within the next 12 months as  [Wayback/Archive] PC Engines apu platform EOL:

PC Engines apu platform EOL
The end is near ! After a long production run, AMD will accept last orders for the SOC used in our apu2/3/4/5/6 boards by end of June 2023.
apu phase-out We will do a life-time buy for a quantity of the AMD SOC and some other key components. We are willing to schedule customer shipments through end of June 2024. There is a 26 week lead time on the AMD SOC, expect limited supply until late 2023.

First ordered, first served. Binding orders may be required for large quantities.
New products ? Despite having used considerable quantities of AMD processors and Intel NICs, we don’t get adequate design support for new projects. In addition, the x86 silicon currently offered is not very appealing for our niche of passively cooled boards. After about 20 years of WRAP, ALIX and APU, it is time for me to move on to different things.
Thank you ! I would like to thank all of our customers for their business, and sometimes patience.

–jeroen

Posted in APU, Hardware, Network-and-equipment, pfSense, Power User, routers | Leave a Comment »

Some links on configuring MikroTik equipment as multiple switches (or even routers) using RouterOS

Posted by jpluimers on 2023/04/13

MikroTik switches and routers are very flexible to configure, as everything is done through [Wayback/Archive] RouterOS settings.

This means that given enough ports, you can split a physical switch into logical switches. This can be very convenient when you run multiple networks without VLAN.

Earlier this week, I already wrote about Torching a specific port on a MikroTik switch or router running RouterOS which involved turning off hardware acceleration off for specific ports in order to have the flow through the underlying switch chip prohibiting torch and filter features.

For splitting noticing which ports are connected to which switch chip is also important: splitting works best if you can configure each logical switch to exclusively use network ports on one switch chip.

This post was to both research how to configure this, and if my MikroTik devices would allow for hardware acelleration.

Here are some links that should help me with configuring (via [Wayback/Archive] mikrotik split switch in two – Google Search):

–jeroen

Read the rest of this entry »

Posted in Development, Hardware, MikroTik, Network-and-equipment, Power User, RouterOS, routers, Scripting, Software Development | Leave a Comment »

Torching a specific port on a MikroTik switch or router running RouterOS

Posted by jpluimers on 2023/04/11

On most recent [Wayback/Archive] RouterOS configurations of MikroTik Routers and Switches, running [Wayback/Archive] Torch a port will show zero traffic when they are part of a bridge configuration. The same holds for the Packet Sniffer.

The reason is that these bridges have hardware acceleration turned on, which makes all traffic go through the switch chip instead of the device CPU. Torch works on the CPU level, so won’t show hardly any traffic except for some configuration stuff (depending on the combination of switch chip and CPU type).

This is not documented in the Torch documentation, but it is documented in the Packet Sniffer documentation.

Further reading:

–jeroen

Posted in Development, Hardware, MikroTik, Power User, RouterOS, routers, Scripting, Software Development | 1 Comment »

OpenVPN somehow failed when tethering on the Android mobile hotspot from a new phone

Posted by jpluimers on 2023/04/07

A while after I got a new smartphone, I noticed that when my MacBook was connected over Wi-Fi to the mobile hotspot of my Android phone, the Tunnelblick connections over OpenVPN to my family members would not work. A telnet from the Android phone to the OpenVPN TCP port 1194 woud succeed, but not from the MacBook. Connecting from the phone using JuiceSSH to the OpenSSH endpoints at those family members would work too, so I was a bit flabbergasted.

In the end this seems to be a set of coincidences that fails in this particular setup, but I am not totally aware why.

The solution was to both re-configure the APN (Access Point Name) the smartphone uses to connect to the internet from ipv4/ipv6 to ipv4, and to reboot the phone.

For Dutch provider KPN Mobile, the APN is named internet and apparently changed default to ipv4/ipv6 without properly supporting ipv4. Note the configuration parameters are all lowercase, although they should be written IPv4 and IPv6.

Here are a few posts that got me on the right track (all via [Wayback/Archive] openvpn fails over android hotspot – Google Search):

Note that sometimes the MTU can cause similar failures:

Note too: some links to check for OpenVPN responding are below.

Various sites with (often different) APNs that KPN mobile supports:

There are quite a few APNs, some with firewall and/or proxy and/or compression, some with external IP address (which means your smartphone really needs a firewall).

–jeroen

Posted in Android Devices, Hardware, Network-and-equipment, OpenVPN, Power User, VPN | Leave a Comment »

Dave Anderson on Twitter: “Cool minor @Tailscale moment: I’m recommissioning a server that got moved from a different network, so all its network config was wrong, and generally I couldn’t get at it over the network, only IPKVM console. But then my `ping` over Tailscale started working?!” / Twitter

Posted by jpluimers on 2023/04/04

Wow, I wrote about Tailscale a few times before, and it is still on my research list, but this is a very compelling reason to use it. [Archive] Dave Anderson on Twitter: “Cool minor @Tailscale moment: I’m recommissioning a server that got moved from a different network, so all its network config was wrong, and generally I couldn’t get at it over the network, only IPKVM console. But then my ping over Tailscale started working?!” / Twitter

I archived the thread so it becomes easier to read: [Wayback/Archive] A readable Thread by @dave_universetf Says Cool minor @Tailscale moment: I’ – UnrollThread.com.

The core are these three tweets:

Turns out, IPv6 autoconfiguration is what happened. Sure, v4 configuration was entirely wrong (it was trying to connect to wifi, via a wifi dongle that was no longer installed, and wanted to talk to a DNS server that doesn’t exist any more), but eno1 had a cable plugged in!
The server noticed IPv6 router advertisements, went “I’ll have some of that”, and got global IPv6 connectivity automagically. IPv4 and DNS were still down though, so all it had at this point is the ability to send/receive IPv6 packets.
So, how did Tailscale get from there to a working setup? It still needs to contact https://t.co/hEs4S8qvTw to get a network map, and still needs to talk to DERP servers to get p2p tunnels working outside the LAN. Enter bootstrap DNS!

It means I have to re-read Source: Some links on Tailscale / Wiregard, especially the [WaybackHow Tailscale works · Tailscale bit, then decide how I want to organise my infrastructure to run parts under Tailscale (I have the impression it is a peer based set-up, not router based).

Then I have to read [Wayback/Archive] IPv4, IPv6, and a sudden change in attitude – apenwarr of which the conclusion is this:

IP mobility is what we do, in a small way, with Tailscale’s WireGuard connections. We try all your Internet links, IPv4 and IPv6, UDP and TCP, relayed and peer-to-peer. We made mobile IP a real thing, if only on your private network for now. And what do you know, the math works. Tailscale’s use of WireGuard with two networks is more reliable than with one network.

Finally I need to not just read it, but understand all it (:

Or maybe I should ask Kris, as I got here through:

I saved Kris’ message thread here at [Wayback/Archive] Thread by @isotopp on Thread Reader App – Thread Reader App.

An OK translation is at [Wayback/Archive] Thread by @isotopp on Thread Reader App – Thread Reader App.

–jeroen

Posted in Hardware, Network-and-equipment, Power User, Scoop, Tailscale, VPN, Windows, Wireguard | 1 Comment »

Reminder to self: check if FritzOS 7.50 has become available for Fritz!Box 7490

Posted by jpluimers on 2023/03/31

This post is a reminder to myself to check if Fritz!Box 7490 can be upgraded to the FritzOS (sometimes spelled Fritz!OS or FRITZ!OS) 7.50, which is the firmware that introduced WireGuard on various Fritz!Box models.

Initially it wasn’t available for the wildly popular Fritz!Box 7490 series which, at the time of writing was still a current Fritz!Box model, has been very popular in The Netherlands because of (now defunct) internet provider XS4ALL started shipping it to customers almost 10 years ago ([Wayback/Archive] Property:XS4ALL – BoxMatrix). Currently Fritz!Box products are offered by KPN, Solcon and Freedom Internet.

So I asked [Wayback/Archive] Jeroen Wiert Pluimers @wiert@mastodon.social on Twitter: “Is there any information if (and hopefully estimate when) the @AVM_NL @AVM_DE 7.50 firmware is going to be available for the (in The Netherlands very well sold/distributed) Fritz!Box 7490 model? FritzOS 7.50 supports @WireGuardVPN: a big step forward.”

Read the rest of this entry »

Posted in Fritz!, Fritz!Box, FritzOS/Fritz!OS, Hardware, Internet, ISP, LifeHacker, Network-and-equipment, Power User, xs4all | Leave a Comment »

UniFi – Install a UniFi Cloud Controller on Amazon Web Services – Ubiquiti Networks Support and Help Center

Posted by jpluimers on 2023/03/06

I was not aware you could this: [WayBack] UniFi – Install a UniFi Cloud Controller on Amazon Web Services – Ubiquiti Networks Support and Help Center

Giving it a bit more thought, I’m not sure I would want this, as it would presume you have an internet connection that is up on the WAN side.

You’d need this before installing any of your Unify equiment, even when installing your first Unify router, which would mean a chicken and egg problem.

Also it would mean you can only use the cloud key when the WAN is down, you cannot use the cloud-key, not even locally.

–jeroen

Posted in Cloud Key, Network-and-equipment, Power User, Unifi-Ubiquiti | Leave a Comment »

Wireshark Cheat Sheet – Commands, Captures, Filters, Shortcuts

Posted by jpluimers on 2023/02/28

[Wayback/Archive] Wireshark Cheat Sheet – Commands, Captures, Filters, Shortcuts

It is available both a huge [Wayback/Archive] jpg (2500×2096 pixels), so it already prints well on A5 or A4 sized paper for reference and as a [Wayback/Archive] PDF (so you can print it on even larger paper sizes).

Via: [Archive] Murdock (@Generic42) / Twitter in a DM.

–jeroen

Read the rest of this entry »

Posted in *nix, *nix-tools, Communications Development, Development, Hardware, Network-and-equipment, Power User, Software Development, Wireshark | Leave a Comment »

PoE Secret Strengths – Danny Thorpe

Posted by jpluimers on 2023/02/15

Passed away, this makes still every good reading: [Wayback/Archive] PoE Secret Strengths – Danny Thorpe.

I wish both Danny and his site were still alive.

Power over Ethernet (PoE) is a standard (802.3af) for powering devices using voltage carried on “spare” wires in the Ethernet cable.  For devices that support being powered by PoE, it means you only need one cable to the device to connect it to network and provide power.  Only one cable to snake through walls and attics, and the device can be placed without regard to access to a power outlet.

PoE is rightfully marketed to business IT and is particularly well suited to devices such as IP security cameras, wireless access points, and IP phones. Unfortunately, targeting the business IT audience meant the devices tended to be a lot more expensive than consumer equivalents.

That is now changing. I’m finding a fair number of PoE PSE switches (PSE = Power Source Equipment, that supply power on the Ethernet wire) and PoE PD devices (PD = Powered Device) in the consumer price range.  They’re still listed under “business networking” rather than “home networking”, but at least they exist.

He mainly used Netgear PoE switches; I like the MikroTik ones better.

Note there are many Power over Ethernet standards and they have evolved over time. See Source: Power over Ethernet: Standard implementation – Wikipedia

–jeroen

Posted in Ethernet, Hardware, Network-and-equipment, PoE - Power over Ethernet, Power User | Leave a Comment »