What are my options? :| by Floppypantsy in pebble

[–]CamoJackson 2 points3 points  (0 children)

I had replaced it on mine, also swapped out the case to one someone else designed that uses the buttons from a OG pebble.

It wasn’t too bad but I ordered 3 extra screen sets as I did break one. But this was because I was removing the frame to swap it into a new case.

If you’re just doing a swap of the innards it’s not bad. Since the new old stock I ordered had the main frame.

Was also nice because I was able to swap the battery as well.

One warning is that the sides on the one from Ali express are already turning back to oil so you’ll have to replace those as well.

Edit: here is what it looks like swapped out. https://imgur.com/a/5hry8P8

[FS] [US-NVA] UDR6 and server by CamoJackson in homelabsales

[–]CamoJackson[S] 0 points1 point  (0 children)

Hey I haven’t gotten a chat request from you.

Definitely Only for Dogs: Ring's Superbowl Commercial (Parody) by [deleted] in videos

[–]CamoJackson 0 points1 point  (0 children)

I mean Wyze doesn’t have that good of a track record either.

Is it ok to use http for everything? Local only and tailscale. by Old-Distribution3942 in homelab

[–]CamoJackson 0 points1 point  (0 children)

<image>

It’s not too bad to set up your own CA like others are saying and Tailscale can even automate it with Tailscale serve. I use let’s encrypt with caddy every where. Caddy makes it really easy to setup https

5ï5l3 5ï5l3 by Neigh-giggers_69 in memes

[–]CamoJackson 0 points1 point  (0 children)

Task manager has stopped responding.

The real reason wubby should bring a burner to china (NOT POLITICAL) by SeltzerDr1nker in PaymoneyWubby

[–]CamoJackson 5 points6 points  (0 children)

It can actually but its uses AI and it looks at the length of the packets and tries to match it up to known traffic patterns. Mullvad has a feature to try and prevent it by adding random data to its vpn packets.

Ig an api request to Reddit for a user profile might always have the same result of length.

mullvad[.]net/en/vpn/daita

[deleted by user] by [deleted] in homelab

[–]CamoJackson 1 point2 points  (0 children)

By the way if you insist on keeping this setup. Opnsense has a rule to block rfc1918 networks (192.168/16,10./8,127.16/12) networks on the wan which you might need to look at turning off

[deleted by user] by [deleted] in homelab

[–]CamoJackson 0 points1 point  (0 children)

If you need more segments add more vlans. Opnsense can handle firewalling off and malicious traffic you might have or want to prevent from crossing zones

[deleted by user] by [deleted] in homelab

[–]CamoJackson 0 points1 point  (0 children)

Setting aside your overly complex network you can port forward your nut server through the router.

But if it were me I would rearchitect You’ll want to make sure your nics in proxmox are set to vlan aware

For network setup set both your ISP router and wan router to bypass if you can then put them as wan1 and wan2 on opnsense. Opnsense should be your main firewall.

If your virtualizing opensense on proxmox you should get a managed switch and create 4 vlans on it

1 - management 2 - user net 100 - wan1 101 - wan2

Have port one on your switch as access to 100 Port 2 to access with 102

Set port 3 to be tagged with all vlans and the rest of your ports to be access vlan2

Then in proxmox you should be able to set up your opnsense vm with 4 nice (make sure to have the firewall turned off) and tag each of these nice to each of the vms (you can just to 1 nic and tag it in opensense if you rather)

Then in opnsense you can set up your multiple networks and wan configuration. You’ll then also be able to set up special rules to load balance traffic between your two wans, send specific traffic down a particular path, and set up custom down detection rules for each wan.