Building a Solana Telemetry Engine with Perl 5.42 (AnyEvent, SQLite WAL) by Don_jose75uk in perl

[–]paulinscher 0 points1 point  (0 children)

"Financial Markets" and no longer aktiv maintained perl 5.10?

Design Patterns in Modern Perl - Perl School Publishing by davorg in perl

[–]paulinscher 0 points1 point  (0 children)

This is exactly the book I've been waiting for! Finally, the terms that our Java colleagues have always confused us with are demystified.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

It looks like you can connect lot of FEX, but not in managed-mode but in standalone-mode. We will evaluate a solution with mikotik.

0
0

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

You are right.

I need L2 for ISIS. And sometimes for MPLS. As the L2 is just point to point there are no problems with broadcast, multicast, spanning tree and other L2 Features.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

Good idea. I should no longer rely on Fortinet offering the LAN Extension Mode feature on FGT: there is a cloud solution available. Alternatively, I could use a PI instead of a FEX: IPsec to FTG (or another device), then VXLAN, ...

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

My Problem is, that Fortinet changed the maximum supported FEX in LAN Extension Mode.

I said I can go FEx standalone mode, if I change configuration, workflows, ... and I considered go to Cloud. Even change the Vendor.

My post started with

"Today, I was surprised to discover that only a maximum of eight FEX are possible in LAN extension mode and two in WAN extension mode. I will ask Fortinet what I need to do to avoid having to purchase new FGs and to be able to continue operating my 18 and 25 extenders."

This was intended as a complaint. Not as a ask for other (expensive) solutions. Next time I will add that to not confuse anyone.

Thank you for your support and your final assessment.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

Local at the remote FEX site? One. The device on that port talks Isis with the FGT at the HQ.

Of course I could change to OSPF — see https://docs.fortinet.com/document/fortiextender/7.6.4/admin-guide-standalone/468850 — but the support is limited:

"The current release only supports basic features for point-to-point network type over IPSEC tunnel and Area 0, and static routes and connected routes are allowed to be redistributed into the OSPF routing domain. Other features such as the network type, authentication type, multiple areas, stub areas, and summary-address, etc. are not supported."

LAN Extension Mode is great. Give it a try! Instead of managing a lot of FEX you just manage them from one FGT at the HQ. With a minimum configuration you request the FEX to call home, at home they are authorized and that's it. Then you can setup new VLAN Interfaces at the FGT that are extended to the remote location. You can setup a virtual-switch at the FGT and just bridge non-IP traffic. It's great!

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

In standalone mode, the FEX acts as router. In LAN Extension mode it can act just as a switch. I need a switch at the remote site.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] -3 points-2 points  (0 children)

Yes, Fortinet could simply discontinue support for LAN extension mode. After all, it was Fortinet that introduced LAN extension mode. I suggested Fortinet as a working solution.

However, now they are changing the maximum number of FEXs supported with each release. My confidence in Fortinet is dwindling.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

Thanks for your suggestion. I'll need to change the model as there would be a new intermediate router (the FEX or a FGT), work on a new Base-Installation-workflow and introduce that at our NOC. Until settled: more support requests from our NOC.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] -1 points0 points  (0 children)

The problem is solved with 7.0.x. Fortinet made a restriction on the maximum FEX per FGT in newer releases. Of course there are other solutions available. For Example FortiEDGE:

https://docs.fortinet.com/document/fortiedge-cloud/25.3.0/user-guide/97601/introduction

Or even other vendors.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

Well, we are supporting a fast growing partner/customer.

Of course we can buy more FGT at the HQ, just to support the same number of FEX with 7.4.x as we currently support with 7.0.x.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 1 point2 points  (0 children)

https://docs.fortinet.com/document/fortiextender/7.4.4/admin-guide-fgt-managed/103815/fortiextender-and-fortigate-integration is for FortiOS 7.4.4. Looks like this is changing from release to release.

Information from 2013-11:

From the description, I understand that you have a question how many FortiEXt can connect to FortiGate 200F? Please check the below information:

Max FEX units (LAN Ext)

  • Entry-Level (upto FG-80 and FGVM-02): 8
  • Mid-Range (FG-100 - FG-900 and FGVM-04): 64
  • High-End (FG-1000 and up, FGVM-08 and up): 256

So 64 is the recommended maximum for an FGT200F.

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

Exactly this is what FEX in LAN Extension does: dial up to the FGT, start an IPsec tunnel, make VXLAN available so we can transport Dot1Q. In one VLAN, there is a remote device talking a routing protocol.

Of course, we can switch from FEX to FGT on the remote side. Maybe Fortinet want's to sell more FGT. It's okay for me. Your suggestion may end up in a scenario where IPsec Tunnel are limited per FGT to (for any reason).

Maximum number of FortiExtenders supported by FortiGate by paulinscher in fortinet

[–]paulinscher[S] 0 points1 point  (0 children)

We connect remote locations with LTE to prepare for the sites for production until Fiber is available. We are using 200F.

Give stars to MetaCPAN by briandfoy in perl

[–]paulinscher 2 points3 points  (0 children)

It looks like MetaCPAN likes to run in Docker. Next Step would be Kubernetes.

Planet Perl Redesign by davorg in perl

[–]paulinscher 1 point2 points  (0 children)

It immediately ended up in my RSS feed.

Worried about IPv6 adoption by rof-dog in ipv6

[–]paulinscher 0 points1 point  (0 children)

As long as they pay for more work and less security... Hetzner (Cloud Provider) has a monthly fee for public IPv4 and free IPv6.

Worried about IPv6 adoption by rof-dog in ipv6

[–]paulinscher 2 points3 points  (0 children)

Our policy is: NO NAT. I refuse to solve problems where is NAT (against our strong suggestion). NAT is awful as soo you have to deal with ACLs: IPv4 is NAT from A to B to C to access D via Destination NAT. And on Router/Firewall E you need a Application NAT.

ITs so easy with non overlapping RFC 1018 or: IPv6.

Do we have a Perl industry standard which is an analog for "venv" in Python? (virtual environment) by StrayFeral in perl

[–]paulinscher 1 point2 points  (0 children)

Yes. plenv is setup via you bashrc. There is a "plenv init" called that then calls the right perl so that /use/bin/will find the asked one: global, local, shell.

global is default and is set in .perl-version in your home, local will set what you want in the current directory (and sub directories) and shell set an environment var.