eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

225
active users

#firewall

5 posts3 participants0 posts today
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10465534.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10465534.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Peter N. M. Hansteen<p>Long rumored, eagerly anticipated by some, "The Book of PF, 4th edition" <a href="https://nostarch.com/book-of-pf-4th-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/book-of-pf-4th-ed</span><span class="invisible">ition</span></a> is now available for PREORDER. The most up to date guide to the OpenBSD and FreeBSD networking toolset <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/preorder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>preorder</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> (again for the CEST-ish crowd)</p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> asks users to ignore <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.thenewoil.org/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> config errors</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-asks-users-to-ignore-windows-firewall-config-errors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-asks-users-to-ignore-windows-firewall-config-errors/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
das nächste bitte<p>Ich brauche mal die Hilfe von <a href="https://social.tchncs.de/tags/RethinkDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RethinkDNS</span></a> Nutzern. Ich habe eine neue App installiert und irgendwas wird von RethinkDNS blockiert, sodass die App (vvs mobil) nicht funktioniert.<br>Schaue ich in die Protokolle werden alle DNS Anfragen beantwortet. Auch in der App Übersicht werden alle Verbindungen als erfolgreich angezeigt.<br>Ich habe sowohl mit RDNSplus als auch mit System DNS versucht. Ich habe mit Wireguard Umleitung und ohne probiert. </p><p>Hat Jemand eine Idee wo ich noch dran schrauben kann?<br><a href="https://social.tchncs.de/tags/adblocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adblocker</span></a> <a href="https://social.tchncs.de/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://social.tchncs.de/tags/fedihelp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedihelp</span></a></p>
Hessenhelden<p>Angeschlossen und erstmals gestartet. Was mich wundert dass es sehr warm im Betrieb wird. Ich kann es nicht einschätzen ob das normal ist aber wenn jetzt schon so viel Hitze erzeugt wird, bei wenig last, werden die elektrische Bauteile nicht lange durchhalten.</p><p><a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.social/tags/cwwk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cwwk</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/appliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appliance</span></a></p>
BastilleBSD :freebsd:<p>Say I have a table defined in pf.conf that includes both ip4 and ip6 addresses. When I create my rdr or pass rules that reference this table, do I need to create two entries, one for inet and another for inet6?</p><p><a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/ipv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipv6</span></a></p>
Waidler :mastodon:<p>Endlich funktioniert die Endpoint-Erkennung VLAN-übergreifend wieder bei meinem ROON Server. ROON hätte gerne alle Klienten im gleichen Netzwerksegment. Dann klappt die Erkennung auf Anhieb. Bei mehreren VLANs wird's dann schwierig. Da muß man tiefer in die Trickkiste bei den Multicast-Einstellungen greifen. <br>Alte Firewallregeln in der OPNsense-Firewall entfernt und gut durchdachte neue hinzugefügt und schon funktioniert es wieder VLAN-übergreifend.</p><p><a href="https://bayerwald.social/tags/roon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roon</span></a> <a href="https://bayerwald.social/tags/multicast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multicast</span></a> <a href="https://bayerwald.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://bayerwald.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a> <a href="https://bayerwald.social/tags/mdns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mdns</span></a></p>
Tech Singer<p>There are allot of people here who understand the world in my particular way, so I thought I'd throw this out and see if anyone has done this sort of thing before and can save me from wheel reinvention. I have a <a href="https://tweesecake.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> machine running <a href="https://tweesecake.social/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a> which I want to connect to the internet as follows. It has to be <a href="https://tweesecake.social/tags/portable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>portable</span></a>. It has to have access only to a very specific and limited number of IP addresses and DNS names which I will identify in advance and which I will edit by hand. It has to block access to everything else including Microsoft's machines, Google's machines, Basically, if it's not on my list, the machine will not connect to it. Whether the machine wants to connect to an IP address, a DNS name, or a device on the local network, I want connections to be promptly blocked. By promptly, I mean that I want the machine not to time out trying to connect to the stuff not on my list, I want the machine to be told no as soon as it tries. I want this because the machine shouldn't be waiting to timeout, it should just be doing what I told it without wasting cycles and time trying to talk to devices I don't want it talking to. The obvious solution is some sort of <a href="https://tweesecake.social/tags/whitelisting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitelisting</span></a> <a href="https://tweesecake.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> or <a href="https://tweesecake.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> system, but I have three problems there. First, I'm <a href="https://tweesecake.social/tags/blind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blind</span></a> and need <a href="https://tweesecake.social/tags/a11y" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>a11y</span></a> with <a href="https://tweesecake.social/tags/Jaws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jaws</span></a> and <a href="https://tweesecake.social/tags/NVDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVDA</span></a>. Secondly, as I said, it has to be portable, so I can't carry around a second box with a firewall. Thirdly, the machine has both ireless and ethernet access. I want both ports to have access only to the IPs/names I specify. Whether the machine is connected over ethernet or 802.11, I want those rules to be in effect. I have considered MS' firewall, but am nervous that it will let the machine talk to MS, which I don't want it to. Is any of this even possible? Boosts would be appreciated.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> <span class="h-card" translate="no"><a href="https://fedi.omada.cafe/@fluffery" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fluffery</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@maumau" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maumau</span></a></span> <span class="h-card" translate="no"><a href="https://social.tchncs.de/@BryanGreyson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BryanGreyson</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@fairphone" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fairphone</span></a></span> I.e. <span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> could not use any of those because they don't support <a href="https://infosec.space/tags/VoLTE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VoLTE</span></a> (not just in <a href="https://infosec.space/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a>) and thus would be blocked by the <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a>-<a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a>!<br><a href="https://www.youtube.com/watch?v=zIJavqEzEIw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=zIJavqEzEIw</span><span class="invisible"></span></a></p>
Linuxiac<p>IPFire 2.29 Core Update 195 open-source firewall is out, adding long-awaited WireGuard VPN support and easy-to-configure tunneling options.<br><a href="https://linuxiac.com/ipfire-2-29-core-update-195-firewall-brings-native-wireguard-support/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/ipfire-2-29-core-</span><span class="invisible">update-195-firewall-brings-native-wireguard-support/</span></a></p><p><a href="https://mastodon.social/tags/ipfire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipfire</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
B'ad Samurai 🐐<p>A list of 3rd party file mirrors you may not want users accessing.</p><p><a href="https://github.com/BadSamuraiDev/bs-lists/blob/main/file-mirrors.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/BadSamuraiDev/bs-li</span><span class="invisible">sts/blob/main/file-mirrors.txt</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/list" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>list</span></a> <a href="https://infosec.exchange/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a></p>
heise online English<p>Cisco: Fresh firewalls from 1.5 to 400 Gbit/s throughput</p><p>Cisco completes its security portfolio with new firewalls, CVE protection on data center switches and uniform guidelines.</p><p><a href="https://www.heise.de/en/news/Cisco-Fresh-firewalls-from-1-5-to-400-Gbit-s-throughput-10452465.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Cisco-Fresh-f</span><span class="invisible">irewalls-from-1-5-to-400-Gbit-s-throughput-10452465.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Switch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switch</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>Cisco: Frische Firewalls von 1,5 bis 400 Gbit/s Durchsatz</p><p>Cisco komplettiert sein Sicherheitsportfolio mit neuen Firewalls, CVE-Schutz auf Rechenzentrumsswitchen und einheitlichen Richtlinien.</p><p><a href="https://www.heise.de/news/Cisco-Frische-Firewalls-von-1-5-bis-400-Gbit-s-Durchsatz-10451983.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cisco-Frische-Fi</span><span class="invisible">rewalls-von-1-5-bis-400-Gbit-s-Durchsatz-10451983.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Switch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switch</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10443417.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10443417.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>Rethinking Regex: Smarter detection for a modern threat landscape</p><p>Using regular expressions, or regex, was once a convenient and powerful way for web application firewalls (WAFs) to find malicious code in web requests.</p><p>🛡️ <a href="https://www.scworld.com/resource/rethinking-regex-smarter-detection-for-a-modern-threat-landscape" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">scworld.com/resource/rethinkin</span><span class="invisible">g-regex-smarter-detection-for-a-modern-threat-landscape</span></a></p><p><a href="https://chaos.social/tags/regex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regex</span></a> <a href="https://chaos.social/tags/thread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thread</span></a> <a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/code" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>code</span></a> <a href="https://chaos.social/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://chaos.social/tags/itsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsec</span></a> <a href="https://chaos.social/tags/request" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>request</span></a> <a href="https://chaos.social/tags/webapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapp</span></a> <a href="https://chaos.social/tags/threat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threat</span></a> <a href="https://chaos.social/tags/waf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>waf</span></a> <a href="https://chaos.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://chaos.social/tags/websecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>websecurity</span></a></p>
GNU/Linux.ch<p>iptables-Regeln erstellen und dauerhaft speichern (Iptables Teil 2)</p><p>In diesem Artikel erkläre ich, wie man eigene Firewall-Regeln mit iptables erstellt und dauerhaft speichert. Mit dabei: eine Einführung in die wichtigsten Begriffe wie INPUT, OUTPUT, DROP und conntrack. </p><p><a href="https://social.anoxinon.de/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://social.anoxinon.de/tags/iptables_persistent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables_persistent</span></a> <a href="https://social.anoxinon.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.anoxinon.de/tags/Netzwerksicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerksicherheit</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p><p><a href="https://gnulinux.ch/iptables-regeln-erstellen-und-dauerhaft-speichern-iptables-teil-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/iptables-regeln-er</span><span class="invisible">stellen-und-dauerhaft-speichern-iptables-teil-2</span></a></p>
» Aakerbeere 🏖️ :mastodon:<p>💬 Hallo <span class="h-card" translate="no"><a href="https://mastodon.social/@rdns" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rdns</span></a></span>,</p><p>warum zeigt mir <a href="https://mastodon.social/tags/RETHINK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RETHINK</span></a> falsche Informationen zu der IP-Adresse an?</p><p>Der Server ist nicht in Australien, sondern in der Schweiz</p><p><a href="https://mastodon.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a></p>
nickbearded<p>Had a beer. Got an idea.</p><p>Why not use a live USB with BashCore in a dust-collector old pc as a smart home firewall?</p><p>🧱 Block IoT devices from phoning home<br>🔒 Route traffic through a hardened CLI<br>📡 SSH in, control everything</p><p>No install. No bloat. Just power. 💪</p><p>👉 <a href="https://bashcore.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bashcore.org</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/iot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iot</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.social/tags/bashcore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bashcore</span></a></p>
Pseudo Nym<p>It's dangerous to go alone. Here. Take this.</p><p><a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.online/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> </p><p>Note: this is totally how cybersecurity works.</p>
Rynn the Cyberwitch 🌙<p>Hey other <a href="https://furry.engineer/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> folks I have a weird <a href="https://furry.engineer/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> and <a href="https://furry.engineer/tags/NAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NAT</span></a> question. I'm looking at the firewall traffic log where my work laptop (I'm in the office) is the source, and I'm looking at the traffic connecting to my home plex server. </p><p>The plex server is a private IP behind NAT. In the log I show the putbound traffic from my work laptop to my home router IP, but I also see a following entry with the private IP that my router is forwarding plex's port traffic to. I thought anything done behind NAT wouldn't show up, especially because I'm only looking at the initial communication out, and not the return communication from my server to my me. Is my understanding of NAT wrong?</p>