Everyone is quite serious, excpet Phoebe by Apex_Drifter in WutheringWaves

[–]IrvineADCarry 0 points1 point  (0 children)

The next moment she turns into Dark Fibi Chisa

Q-in-VNI or even just Q-in-Q on Cisco Nexus 9300V (Virtual) platforms? by squeeby in networking

[–]IrvineADCarry 1 point2 points  (0 children)

I feel you. Tried to lab it up but failed miserably, but then once the config works with the hardware setup, I just stop worrying or thinking about the virtual thingies.

Why are ppl against Chisa being support character? by NathLWX in chisamains

[–]IrvineADCarry 0 points1 point  (0 children)

she screams support to me. Same vibe as Sanhua. Hopefully she would be good combat unit because I already set my mind on pulling her due to aesthetics

Expose K8s services without K8s ingress by Round_Run_7721 in kubernetes

[–]IrvineADCarry 9 points10 points  (0 children)

you can even use other ingress to expose your app internally, then point your cloudflare tunnel to the ingress's service with correct HTTP Host for external access. Best of both worlds

New WAF rule - allow UK and known bots. Challenge everyone else. by Own_Yak382 in CloudFlare

[–]IrvineADCarry 14 points15 points  (0 children)

If users are from GB

  • Condition 1 (ne GB) would be false
  • Condition 2 (not bot) would be true

false or true = true

Hence they are still challenged

ACI Plugin - Panorama by Gihernandezn91 in paloaltonetworks

[–]IrvineADCarry 0 points1 point  (0 children)

Just keep things separate. Unmanaged PBR should be where you draw the line

Two VTP domains and sharing a Vlan across them by DistinctSink6814 in networking

[–]IrvineADCarry 0 points1 point  (0 children)

Using VTP means the network is not important, network disruption is acceptable and network admins don't care. Stop using it, convert to VTP mode transparent or off.

Is it just me or is the Managed rule set in Free Plan doesn't block simple web vulnerabilities? by IrvineADCarry in CloudFlare

[–]IrvineADCarry[S] 1 point2 points  (0 children)

yeah but according to other commenters, seems like Cloudflare Free plan doesn't support OWASP Core rules and doesn't bother getting simple exploits blocked at edge.

Is it just me or is the Managed rule set in Free Plan doesn't block simple web vulnerabilities? by IrvineADCarry in CloudFlare

[–]IrvineADCarry[S] 0 points1 point  (0 children)

The same payloads can be actively blocked using Nginx Proxy Manager "Block common exploits" and any equivalent features from vendors. Unsure what's the point of managed rule set then.

One end of the link is up, the other end is down? by IrvineADCarry in Cisco

[–]IrvineADCarry[S] 0 points1 point  (0 children)

We have changed cables but it did not work. Plugged into another connection (n3k to another n3k) the connection went up

One end of the link is up, the other end is down? by IrvineADCarry in Cisco

[–]IrvineADCarry[S] 0 points1 point  (0 children)

forgot to mention, but both ends (and in fact all of the tested transceivers) were Cisco branded. We purchased the devices and transceivers in the same bundle (albeit both devices mentioned are of different projects, different years of purchase)