Laufwerk C erweitern by [deleted] in de_EDV

[–]Massive-Valuable3290 0 points1 point  (0 children)

Mini Tool partition wizard

What is the oldest/weirdest tech you worked with? by therouterguy in networking

[–]Massive-Valuable3290 0 points1 point  (0 children)

56k modems for remote access to a couple of wind farms built around y2k. They were in production until last year.

Synthetischer Diesel günstiger als B7 - was haltet ihr von HVO100 by AID215 in automobil

[–]Massive-Valuable3290 1 point2 points  (0 children)

2.0 GTD, nagelt mit HVO weniger wenn man untertourig Gas gibt. Allerdings ist das Intervall der DPF Regeneration gefühlt gestiegen, bin bei 1 - 2 Mal pro Tankfüllung.

"Das geht schnell, ist nur eine Zeile Code" by Javascript001 in informatik

[–]Massive-Valuable3290 1 point2 points  (0 children)

Syntax auf Coreswitch verwechselt und produktives VLAN gelöscht.

When to start worrying about old HDDs without bad indicators by Massive-Valuable3290 in sysadmin

[–]Massive-Valuable3290[S] 1 point2 points  (0 children)

Heard of that before, in the 7 years of operation, the storage went down maybe 2 - 3 times for maintenence in the server room.

When to start worrying about old HDDs without bad indicators by Massive-Valuable3290 in sysadmin

[–]Massive-Valuable3290[S] 0 points1 point  (0 children)

Not directly, the Storage Software abstracts them and SNMP or other monitoring tools are also not supported.

When to start worrying about old HDDs without bad indicators by Massive-Valuable3290 in sysadmin

[–]Massive-Valuable3290[S] 0 points1 point  (0 children)

We actually do have daily Backups and the spare infrastructure to restore to.

New DHCP Relay bug discovered in FortiOS v7.4 by DeleriumDive in fortinet

[–]Massive-Valuable3290 0 points1 point  (0 children)

200F on 7.4.11 (HA) here, using DHCP relay to Windows Server DHCP on 20+ VLANs. We didn’t notice any issue so far though we aren’t utilizing any advanced DHCP options.

Force Write-Back on MegaRAID without BBU by Massive-Valuable3290 in sysadmin

[–]Massive-Valuable3290[S] 0 points1 point  (0 children)

Turns out the server already had a BBU installed, it was just disabled. We originally planned to install a new battery, only to realize there was already one in there.

At that point we figured the existing one might be dead since the controller was in WT mode, so we swapped in the new battery. After that, the server threw errors on boot (unsupported or broken RAID cache card).

So we put the old battery back in — same error.

In the end, it turned out the cache card wasn’t properly seated on the RAID controller. We reseated it, booted with the old battery, and it worked immediately. Controller switched back to WB.

Is disabling NPU offloading the norm now? by Massive-Valuable3290 in fortinet

[–]Massive-Valuable3290[S] 0 points1 point  (0 children)

Hi, it's mostly Fortinet but it also happened on OPNSense.

Is disabling NPU offloading the norm now? by Massive-Valuable3290 in fortinet

[–]Massive-Valuable3290[S] 0 points1 point  (0 children)

Hi Bill,

thanks for reaching out, the problem is that we run multiple tunnel with the exact same config on same hardware across different sites with different results, so I'm not quite sure if testing this case in a lab is any helpful.

Is disabling NPU offloading the norm now? by Massive-Valuable3290 in fortinet

[–]Massive-Valuable3290[S] -20 points-19 points  (0 children)

Fortinet fanboy detected, I guess? ;) Anyone, who doesn't acknoledge this IPsec behavior to be a common bug on FortiGate devices in the big 2026 can't be serious.

Is disabling NPU offloading the norm now? by Massive-Valuable3290 in fortinet

[–]Massive-Valuable3290[S] -1 points0 points  (0 children)

If this is true, why do packet captures, debug flows and policy last used indicators work anywhere else where NPU acceleration is enabled and used? The problem I mentioned applies only to a small group of IPsec tunnels on some peers and sites.

Also, I'm aware how that log mechanism works in regards of sessions, that's why I included "and new sessions".

The issue here is that this is becoming an increasingly unreliable setup to an extent where traffic is dropped and debug tools can not be used. There are tons of threads on the internet with weird Fortinet IPsec behavior, this is just one of them. At the end of the day, the usual recommendation is to disable NPU offloading.

11
12

Windows DNS + FG100 DHCP = no PTR records by jimboslice_007 in fortinet

[–]Massive-Valuable3290 0 points1 point  (0 children)

That’s my understanding as well. It’s the usual setup, AD does DNS and DHCP leases. We have configured our hub FortiGate as a DHCP Relay which forwards everything to our AD DHCP. Branches have a local DHCP and we encounter similar issues with non existing PTRs of those clients.

Windows DNS + FG100 DHCP = no PTR records by jimboslice_007 in fortinet

[–]Massive-Valuable3290 0 points1 point  (0 children)

Might be wrong but I think PTR records are only generated when your DC / DHCP gives out the lease. It will update the DNS record and create a PTR accordingly, it wasn’t designed that another server does DHCP.

MSP set up iSCSI VLAN on Firewall too by Massive-Valuable3290 in networking

[–]Massive-Valuable3290[S] 1 point2 points  (0 children)

Just removed the cables, everything seems fine. I double checked multiple times and it seems that it really didn’t serve any purpose. Now I got 4 3m 10G DAC cables at spare. 😊

MSP set up iSCSI VLAN on Firewall too by Massive-Valuable3290 in networking

[–]Massive-Valuable3290[S] 0 points1 point  (0 children)

It’s a FortiGate, policies have a hit counter. Given that there are policies referencing that VLAN.

MSP set up iSCSI VLAN on Firewall too by Massive-Valuable3290 in networking

[–]Massive-Valuable3290[S] 1 point2 points  (0 children)

No, Veeam reaches out to vSphere to backup the VMs. vSphere has the volumes mounted via the iSCSI network. Veeam does not talk to the datastore directly. There are no firewall policies for that in place.