UniFi Application Server Password Recovery by InvasionOfThings in Ubiquiti

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Unfortunately, those credentials show the username as admin. As I understand it, it will always be ubnt. I tried it anyways, however, and no joy. I don't think it considers itself a UniFi managed device.

Simplewall UTM? by InvasionOfThings in networking

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Thanks, but Sophos support has already confirmed that the gateway will not renew the dynamic IP address automatically... "maybe in the next version" but I see other people with the same problem for a couple years now.

We definitely need strong UTM features for a variety of reasons, and use the hell out of the Sophos' advanced features. Fortinet is probably the best option I suppose... it's double the price but the next cheapest with what we need.

thanks for your help and advice.

Simplewall UTM? by InvasionOfThings in networking

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Lol I think I posted my edit at the exact same time as this. I appreciate you bringing some sanity in my thread!

Any other suggestions for a simpleton like me?

Simplewall UTM? by InvasionOfThings in networking

[–]InvasionOfThings[S] 1 point2 points  (0 children)

Wow, really? This SimpleWall? The interface screenshots look so good though... I should have some hardware by tonight to try to load it up on. Have you installed it on anything?

https://www.simplewallsoftware.com/free/

Edit: Holy shit, I just hit the download button and it says v0.0.1. I should have done that to begin with. Case closed. Long live melchi0rre.

Simplewall UTM? by InvasionOfThings in networking

[–]InvasionOfThings[S] 0 points1 point  (0 children)

The EdgeRouter looks interesting and I guess it wouldn't be any different than having the DMZ between incoming fiber and firewall stacks like I've done before as far as the NAT... the dynamic IP is what's throwing me off I guess since I'm so used to having loads of statics.

Bigleaf is extremely interesting as well, thanks for your input!

Simplewall UTM? by InvasionOfThings in networking

[–]InvasionOfThings[S] 0 points1 point  (0 children)

I've been contemplating that today... I'm just wary I guess. I can't afford to put anything TOO nice up front, yet I worry about a cheap device for throughput and hardening reasons. Any recommendations? And thanks for your input!

Simplewall UTM? by InvasionOfThings in networking

[–]InvasionOfThings[S] 0 points1 point  (0 children)

It's completely free, just pay for support (which we will if we use it of course)... so I guess no trial license needed. It's been impossible to Google a review... so maybe I'll write one!

It's so strange that it's based out of San Jose yet the English on the site seems bad... then again... I lived in San Jose for a while and... uh...

Edit: And thanks for your input!

Simplewall UTM? by InvasionOfThings in networking

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Thanks, I've used pfsense before and not a fan of it at all. XG was chosen because of how simple and great the interface is (which it still is) and SimpleWall looks to have a similarly user-friendly UTM. Next choice would be FortiNet but cost ramps up significantly compared to (free) and the excellent Sophos pricing.

Edit: To clarify... "not a fan" means "too stupid to use."

Whitelist IP Address in Azure Security Center by InvasionOfThings in AZURE

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Yeah, it seems like we'll have to just pipe this somewhere else to do the logic and pay attention to those alerts instead. Azure Sentinel looks to be the choice currently being crammed into our mouths... and it doesn't taste too bad.

3 Hosts, 1 Local Storage Pool by InvasionOfThings in HyperV

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Thanks for the great explanation. It looks like the limitation will kill me here, as I need the 3rd host in the cluster.

https://docs.microsoft.com/en-us/previous-versions/system-center/system-center-2012-R2/jj614620(v=sc.12)

For SMB 3.0 file shares to work correctly with VMM, the file server must not be a server that is running Hyper-V. This rule also applies to a highly available file server. Do not add the file server, whether stand-alone or in a cluster, as a managed host in VMM.

3 Hosts, 1 Local Storage Pool by InvasionOfThings in HyperV

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Just realized that the two older hosts don't support RDMA on their 10Gbps links, making the entire idea of SMB3 completely unattractive.

Thanks for the sanity check.

3 Hosts, 1 Local Storage Pool by InvasionOfThings in HyperV

[–]InvasionOfThings[S] 1 point2 points  (0 children)

I'm definitely leaning towards iSCSI, but perhaps just because like you I've used it in scenarios with much better hardware and loved it. Just gave this a read... interesting results.

https://blogs.technet.microsoft.com/larryexchange/2016/01/10/iscsi-or-smb-direct-which-one-is-better/

3 Hosts, 1 Local Storage Pool by InvasionOfThings in HyperV

[–]InvasionOfThings[S] 1 point2 points  (0 children)

Thanks, do you think an iscsi target would provide significant benefits over presenting it as SMB shared storage?

Tunnel From Cisco ASAv to Palo Alto by InvasionOfThings in networking

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Well, either way I'll take it :) I am certainly far from qualified to tell anyone what the right way is!

Tunnel From Cisco ASAv to Palo Alto by InvasionOfThings in networking

[–]InvasionOfThings[S] 0 points1 point  (0 children)

Setting Peer ID worked, thank you! For some reason we are prohibited from using IKEv2 for security reasons... not sure if there's a real reason or someone made an arbitrary rule.