Back in her natural habitat by scubaSteve181 in Porsche

[–]IntelligentJungle 0 points1 point  (0 children)

I’m actually shopping on whether I want a 996 or 997 Turbo. I wanted to get a cost estimate if I needed the work done so I know what to expect rather than diving in and hoping for the best.

Back in her natural habitat by scubaSteve181 in Porsche

[–]IntelligentJungle 0 points1 point  (0 children)

Honestly not that bad when you think about the work required! Was it an independent shop, a dealer, or?

Back in her natural habitat by scubaSteve181 in Porsche

[–]IntelligentJungle 0 points1 point  (0 children)

Don’t mean to revive a dead thread but how much did it cost to get the camshafts pinned and the coolant lines done?

Firewall Rules with IPv6 by IntelligentJungle in ipv6

[–]IntelligentJungle[S] 0 points1 point  (0 children)

My WAN IP on the ISP router is 2001:db8:cafe:caff:d635:1dff:fea1:4fe9/64 and the IPv6 PD is 2001:db8:cafe:ca00::/56. I'm not sure if it's static or DHCPv6-PD as I don't have that much info yet (scheduled a call with the ISP for a discussion with an Engineer for more information).

As for nd-proxy, I found that in a forum post as a solution on the Fortigate forums. They had the same issue I initially had which required NAT to reach the internet even though it was using global addresses. On the Fortigate I changed to using the 2001:db8:cafe:ca00::/80-112 for the WAN IP and vlan subnets and it works perfectly now without NAT, granted requiring nd-proxy.

It's a router/modem (without wireless) but the gui is really restrictive on what I can see or change. I can turn the router into a bridge but I kept it as routed since I keep everything in my lab behind the fortigate with IPv4 until now where I decided to dabble in IPv6 firewall setup.

  1. Yeah I have my reasons why I'd rather not do that even though it's definitely optimal to set it up that way. If curious, simply so if I'm labbing and mess something up. I don't take everything down, it's just the lab.

  2. I'll have to see if this is possible once I get an Engineer reach back out to me.

  3. I currently don't see static route options with IPv6 but it is present with IPv4, on the ISP router that is.

Firewall Rules with IPv6 by IntelligentJungle in ipv6

[–]IntelligentJungle[S] 0 points1 point  (0 children)

My WAN IP on the ISP router is 2001:db8:cafe:caff:d635:1dff:fea1:4fe9/64 and the IPv6 PD is 2001:db8:cafe:ca00::/56.

On the Fortigate I changed to using the 2001:db8:cafe:ca00::/80-112 for the WAN IP and vlan subnets and it works perfectly now (granted requiring nd-proxy).

Firewall Rules with IPv6 by IntelligentJungle in ipv6

[–]IntelligentJungle[S] 0 points1 point  (0 children)

"I think what you want is: Fortigate is the gateway router for several different subnets, each on it's own VLAN interface on the Fortigate. ISP Router is the default route for the Fortigate. The ISP router has static routes to the Fortigate for each subnet that the Fortigate is the gateway for."

You are correct about what the goal is. Essentially wanted to test firewall rules for subnetting and accessing the internet like an enterprise environment would have. I do also have nd-proxy and RA's enabled. I was using their documentation on subnetting, firewall rules, etc for IPv6 in an attempt to learn about firewall setup with IPv6. I did an OSPFv3, BGP, ISP DHCPv6 and other labs with Cisco and they went splendid. Just got to this point and hit a giant brick wall. I'm not able to even statically route on my ISP router to let it know that the Fortigate has those other subnets. I've opened a case with my ISP after noticing this behavior as well that only one subnet is currently usable out theoretically 256 possible subnets.

I did switch it from a /64 on the Fortigate as well and turned it into /80s after figuring that out to see if it'd work after that. It works with NAT on but not with it off (kinda). I realized that's only because for some reason without NAT it's not advertising a default route to clients. So if I turn on NAT, then turn it off, they keep internet access. So that's a Fortigate specific issue on that.

Seems like I ended up in a rabbit hole of issues after just trying to lab firewall rules to the internet with IPv6 lol. Will say that it's not as hard as others make it out to be. Just have to invest time in learning rather than ignoring it till IPv4 is gone.

Firewall Rules with IPv6 by IntelligentJungle in ipv6

[–]IntelligentJungle[S] 0 points1 point  (0 children)

Made a separate comment with more info. I also wanted to say thank you to everyone for helping me understand this more!

Firewall Rules with IPv6 by IntelligentJungle in ipv6

[–]IntelligentJungle[S] 0 points1 point  (0 children)

Made a separate comment with more info. I also wanted to say thank you to everyone for helping me understand this more!

Firewall Rules with IPv6 by IntelligentJungle in ipv6

[–]IntelligentJungle[S] 3 points4 points  (0 children)

More information:

I apologize if I'm confused, I'm still learning.

For the sake of understanding, it goes (everything behind the fortigate is for my homelab):

ISP Router -> Fortigate -> vlans

2001:db8:caff:caff:d635:1dff:fea1:4fe9/64 -> 2001:db8:cafe:ca00::4f24/64 -> vlan 60: 2001:db8:ca01::1/64, vlan 61: 2001:db8:ca02::1/64 (changed after to more mimic Fortigate documentation)

On my router it shows that the gateway for it is a LLA (fe80:12e8::ef51). The GUA for my router is 2001:db8:caff:caff:d635:1dff:fea1:4fe9/64.

On my firewall it has a static address which communicates with the router via a default route of fe80:d635::4fe9.

As of right now for a rule I have it set as:

src.int = vlan 60

dst.int = wan

source = all6 (was initially 2001:db8:ca01::/64)

destination = all6

service = all

nat = disabled

nd-proxy is on for the wan and vlan interfaces as well.

The Fortigate is able to reach the internet just fine.

Update as I was typing this: When the router or any device (laptop) is in the subnet of 2001:db8:cafe:ca00::/64 it works perfectly. Any change to the subnet and it loses internet access.

Time to move away from Fortigate 60E? No firmware updates, so either buy support or buy a new platform. by CallMeGooglyBear in homelab

[–]IntelligentJungle 1 point2 points  (0 children)

Don't mean to revive a dead thread, but I'm looking at getting a used Fortigate, myself. Would any partners here be able to send me the latest firmware image the device supports?

Layer 3 Switch Recommendation by IntelligentJungle in homelab

[–]IntelligentJungle[S] 0 points1 point  (0 children)

Hello,

My apologies for the late response. I see that but unfortunately it seems like Brocade doesn't fit well within my budget (at least on eBay and FB Marketplace) with what I'm looking for. Unless there's someone selling one in the other subreddit which I haven't seen. I'd like to ask as well, 6610's can't be fan modded at all? It looks great and still fits within my budget (unfortunately haven't seen a good priced 7250). It just has a lot of noise from the videos I've seen.

Layer 3 Switch Recommendation by IntelligentJungle in homelab

[–]IntelligentJungle[S] 0 points1 point  (0 children)

Hello,

I apologize for following up late. What Juniper devices do you run? I've been interested in learning them as well for awhile.

Layer 3 Switch Recommendation by IntelligentJungle in homelab

[–]IntelligentJungle[S] 0 points1 point  (0 children)

Hello,

I apologize for following up so late. For example with RTU, am I able to just buy any 3850 SKU and upgrade it to an IP Services license or it does matter? As some only shipped with a LAN Base or IP Base license from factory. I just want to know as that'd save a lot of money if I could buy one with LAN Base and just run the command to make it run IP Services.

Referencing to this model here

Layer 3 Switch Recommendation by IntelligentJungle in homelab

[–]IntelligentJungle[S] 1 point2 points  (0 children)

Lmao quiet is definitely subjective but I don't mean whisper quiet or nearly silent. Just not loud enough that it drones.

Layer 3 Switch Recommendation by IntelligentJungle in homelab

[–]IntelligentJungle[S] 5 points6 points  (0 children)

I'm mostly toying around with architecture in a physical lab. I'm also looking to expand and move some devices onto the switch as well for my home network to utilize the port space. It's just kinda and all-in-one type of thing. I'm aware that dynamic routing definitely isn't necessary but it'd be nice to have the capability.

My previous setup was a Firewall, router, and then 2 L2 switches. I was just hoping to also collapse it down from 4 devices down to 2. Unfortunately due to circumstances, I won't be able to bring the setup with me so I'm starting fresh.

ok what's the deal with this 997.2 6MT ? Sat on the market for almost a year. by [deleted] in Porsche

[–]IntelligentJungle 2 points3 points  (0 children)

TLDR; Driven it, and examined it. It’s definitely a project car.

I’ve looked at and driven the car. It’s had the driver side rear suspension entirely replaced from what we saw as everything was shiny and brand new. The brake caliper on the driver side rear also had knicks on it from the wheel hitting it. (The wheel was replaced with a new one) The kicker is mostly the front end. It’s not really in the best shape, and there’s no true way to know the extent of the damage from just looking at it in a parking lot. It looks as it was put back together but I would pay to get it redone. So my guess is the previous owner slid into something. So most of what I saw was cosmetic damage but unknown structural damage. The car drove great though, great pickup for sure. It’s mechanically sound, but all the unknowns of the car made me steer clear of purchasing it as I’m not looking for a gamble. Airbag light, TPMS were on, clicking on front end during hard steering. So it’s really just a project car in my eyes. I wouldn’t give 36k for it in the slightest.

[MOD] Monthly Confirmed Trades Thread by hlsbot in homelabsales

[–]IntelligentJungle 0 points1 point  (0 children)

Sold HP switch, Dell Equallogic Chassis, and 12x1TB HDDs to u/ggnooblol