|
You are here |
medo64.com | ||
| | | | |
kaspars.net
|
|
| | | | | WireGuard provides unlimited possibilities for creating private and secure networks without having to expose devices to the public internet. In this example I wanted to access the Mikrotik router configuration panel from anywhere in the world similar to how Cloud Key and Cloud Access enables it for Ubiquity devices. Note that RouterOS already supports VPN... | |
| | | | |
blog.oddbit.com
|
|
| | | | | My internet service provider (FIOS) doesn't yet (sad face) offer IPv6 capable service, so I've set up an IPv6 tunnel using the Hurricane Electric tunnel broker. I want to provide IPv6 connectivity to multiple systems in my house, but not to all systems in my house 1. In order to meet those requirements, I'm going to set up the tunnel on the router, and then expose connectivity over an IPv6-only VLAN. In this post, we'll walk through the steps necessary to set that up. | |
| | | | |
blog.daknob.net
|
|
| | | | | [AI summary] The article details a comprehensive setup of a VyOS router configured as an IPv6-First LAN, connecting to an ISP via PPPoE, requesting a /56 IPv6 prefix using DHCPv6-PD, and creating two VLANs with IPv4 and IPv6 capabilities. It includes NAT64, DNS64, SLAAC, and firewall configurations to ensure IPv6 connectivity and IPv4 fallback, while promoting IPv6 usage over IPv4 where possible. | |
| | | | |
blog.coffinsec.com
|
|
| | | While working on berry-sense and learning about network traffic analysis recently, I had the need for a dedicated device to use as an Ethernet bridge/tap for capturing traffic. This would give me a chance to test the Raspberry Pi's performance while performing traffic captures, as well as produce a usable device for performing simple captures. | ||