social.anoxinon.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Die offizielle Mastodon Instanz des Vereins Anoxinon e.V.

Serverstatistik:

1,1 Tsd.
aktive Profile

#vxlan

0 Beiträge0 Beteiligte0 Beiträge heute
Grzegorz Surmann :verified:<p>Juniper EVPN/VXLAN mesh or ring <a href="https://blog.funil.de/3457/sinuspl/english/juniper-networks/juniper-evpn-vxlan-mesh-or-ring/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.funil.de/3457/sinuspl/eng</span><span class="invisible">lish/juniper-networks/juniper-evpn-vxlan-mesh-or-ring/</span></a> <a href="https://mstdn.funil.de/tags/evpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>evpn</span></a> <a href="https://mstdn.funil.de/tags/jumboframes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jumboframes</span></a> <a href="https://mstdn.funil.de/tags/juniper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>juniper</span></a> <a href="https://mstdn.funil.de/tags/mesh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mesh</span></a> <a href="https://mstdn.funil.de/tags/ring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ring</span></a> <a href="https://mstdn.funil.de/tags/vxlan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vxlan</span></a></p>
Grzegorz Surmann :verified:<p>Quick fixes for Juniper problems <a href="https://blog.funil.de/3551/sinuspl/english/juniper-networks/quick-fixes-for-juniper-problems/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.funil.de/3551/sinuspl/eng</span><span class="invisible">lish/juniper-networks/quick-fixes-for-juniper-problems/</span></a> <a href="https://mstdn.funil.de/tags/clear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clear</span></a> <a href="https://mstdn.funil.de/tags/cli" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cli</span></a> <a href="https://mstdn.funil.de/tags/error" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>error</span></a> <a href="https://mstdn.funil.de/tags/evpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>evpn</span></a> <a href="https://mstdn.funil.de/tags/juniper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>juniper</span></a> <a href="https://mstdn.funil.de/tags/junos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>junos</span></a> <a href="https://mstdn.funil.de/tags/loop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>loop</span></a> <a href="https://mstdn.funil.de/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://mstdn.funil.de/tags/statistics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>statistics</span></a> <a href="https://mstdn.funil.de/tags/vxlan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vxlan</span></a></p>
Thomas Liske<p><a href="https://ibh.social/tags/ifstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ifstate</span></a> 1.13.2 was released:<br><a href="https://codeberg.org/liske/ifstate/releases/tag/1.13.2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/liske/ifstate/rel</span><span class="invisible">eases/tag/1.13.2</span></a></p><p>(available in <span class="h-card" translate="no"><a href="https://fosstodon.org/@alpinelinux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alpinelinux</span></a></span> edge + 3.21 3.20 + 3.19 and in <span class="h-card" translate="no"><a href="https://c3d2.social/@m4rc3l" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>m4rc3l</span></a></span>'s Nix flake <a href="https://codeberg.org/m4rc3l/ifstate.nix" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/m4rc3l/ifstate.ni</span><span class="invisible">x</span></a>)</p><p>This maintenance release includes fixes for configuring FDB entries.</p><p>The configuration of VXLAN with non-default UDP ports, unicast and static flooding now works correctly: <a href="https://ifstate.net/examples/vxlan.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ifstate.net/examples/vxlan.htm</span><span class="invisible">l</span></a></p><p><a href="https://ibh.social/tags/linuxnetworking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxnetworking</span></a> <a href="https://ibh.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ibh.social/tags/vxlan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vxlan</span></a></p>
Freifunk Stuttgart<p>Neues aus dem Maschinenraum: wir haben unsere beiden Proxmox-Cluster miteinander vernetzt. Wir verwenden dazu <a href="https://chaos.social/tags/vxlan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vxlan</span></a>. Als Underlay dienen <a href="https://chaos.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> Tunnel mit <a href="https://chaos.social/tags/babel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>babel</span></a> als Routingprotokoll. Ziel ist unsere gesamte Infrastruktur in <a href="https://chaos.social/tags/stuttgart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stuttgart</span></a> zu hosten, aber immer noch die Möglichkeit zu haben auf einen anderen Standort auszuweichen. <a href="https://chaos.social/tags/ffs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ffs</span></a> <a href="https://chaos.social/tags/hostlocally" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hostlocally</span></a></p>
Mike Lossmann<p>It's the long-awaited part two of the EVPN Series! Next is a quick overview of What is VxLAN! <a href="https://bit.ly/480p41F" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/480p41F</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/VXLAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VXLAN</span></a> <a href="https://mastodon.social/tags/DC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DC</span></a> <a href="https://mastodon.social/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a></p>
Daniel ツ<p>VXLAN (Virtual Extensible LAN) is a network virtualization technology that helps overcome the limitations of traditional VLANs by enabling larger, scalable L2 networks over L3 infrastructure.</p><p>In <a href="https://infosec.exchange/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubernetes</span></a>, VXLAN can be used by CNI plugins (like <a href="https://infosec.exchange/tags/Flannel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Flannel</span></a>) to create overlay networks, allowing Pods across different nodes to communicate seamlessly, regardless of underlying physical networks. This makes multi-node clusters easier to manage at scale! 🚀</p><p><a href="https://infosec.exchange/tags/VXLAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VXLAN</span></a> <a href="https://infosec.exchange/tags/K8s" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>K8s</span></a> <a href="https://infosec.exchange/tags/CloudNative" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudNative</span></a> <a href="https://infosec.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a></p>
Wireshark<p>Here are even more agenda highlights from the upcoming SharkFest'24 EUROPE conference!<br> <br>- VXLAN, EVPN &amp; other intricacies unpacked (Pierre Besombes)<br>- Why web pages remain vulnerable to Layer 7 DoS Attacks (Michal Soltysik)<br>- Wireshark Techniques for Security Analysts (Walter Hofstetter)</p><p>More info: <a href="https://sharkfest.wireshark.org/sfeu" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sharkfest.wireshark.org/sfeu</span><span class="invisible"></span></a></p><p>See you soon in Vienna, Austria! </p><p><a href="https://ioc.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireshark</span></a> <a href="https://ioc.exchange/tags/VXLAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VXLAN</span></a> <a href="https://ioc.exchange/tags/EVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EVPN</span></a> <a href="https://ioc.exchange/tags/DoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoS</span></a></p>
Stefano Marinelli<p>Bridging Networks Across VPS With Wireguard and VXLAN on FreeBSD</p><p><a href="https://it-notes.dragas.net/2024/07/15/bridging-networks-across-vps-wireguard-vxlan-freebsd/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it-notes.dragas.net/2024/07/15</span><span class="invisible">/bridging-networks-across-vps-wireguard-vxlan-freebsd/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/VXLan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VXLan</span></a> <a href="https://mastodon.bsd.cafe/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> <a href="https://mastodon.bsd.cafe/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://mastodon.bsd.cafe/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://mastodon.bsd.cafe/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mastodon.bsd.cafe/tags/NoteHUB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoteHUB</span></a></p>
Thomas Liske<p><a href="https://ibh.social/tags/ifstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ifstate</span></a> 1.10.0 has been released:<br><a href="https://github.com/liske/ifstate/releases/tag/1.10.0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/liske/ifstate/relea</span><span class="invisible">ses/tag/1.10.0</span></a></p><p>(available in @alpinelinux edge)</p><p>This release allows to bind tunnel interfaces to another namespace. This allows to put the underlay and the overlay of a tunnel interface (<a href="https://ibh.social/tags/vxlan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vxlan</span></a>, xfrm, wireguard, ...) into different netns namespaces.</p><p>The lo interface is now configured in all netns namespaces implicitly, including it's layer3 addresses.</p><p>Bridge fdb entry and sysctl MPLS processing support for links were added.</p><p><a href="https://ibh.social/tags/linuxnetworking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxnetworking</span></a></p>
Stefano Marinelli<p>Good morning, friends of the <a href="https://mastodon.bsd.cafe/tags/BSDcafe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSDcafe</span></a> and <a href="https://mastodon.bsd.cafe/tags/fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediverse</span></a> <br> I'd like to share some details on the infrastructure of BSD.cafe with you all. </p><p>Currently, it's quite simple (we're not many and the load isn't high), but I've structured it to be scalable. It's based on <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, connected in both ipv4 and ipv6, and split into jails:</p><p>* A dedicated jail with nginx acting as a reverse proxy - managing certificates and directing traffic<br>* A jail with a small <a href="https://mastodon.bsd.cafe/tags/opensmtpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensmtpd</span></a> server - handling email dispatch - didn't want to rely on external services<br>* A jail with <a href="https://mastodon.bsd.cafe/tags/redis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redis</span></a> - the heart of the communication between <a href="https://mastodon.bsd.cafe/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> services - the nervous system of BSDcafe<br>* A jail with <a href="https://mastodon.bsd.cafe/tags/postgresql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postgresql</span></a> - the database, the memory of BSDcafe<br>* A jail for media storage. The 'multimedia memory' of BSDcafe. This jail is on an external server with rotating disks, behind <a href="https://mastodon.bsd.cafe/tags/cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudflare</span></a>. Aim is georeplicated caching of multimedia data to reduce bandwidth usage.<br>* A jail with Mastodon itself - <a href="https://mastodon.bsd.cafe/tags/sidekiq" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sidekiq</span></a>, <a href="https://mastodon.bsd.cafe/tags/puma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>puma</span></a>, <a href="https://mastodon.bsd.cafe/tags/streaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>streaming</span></a>. Here is where all processing and connection management takes place.</p><p>All communicate through a private LAN (in bridge) and is set up for VPN connection to external machines - in case I want to move some services, replicate or add them. The VPN connection can occur via <a href="https://mastodon.bsd.cafe/tags/zerotier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerotier</span></a> or <a href="https://mastodon.bsd.cafe/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>, and I've also set up a bridge between machines through a <a href="https://mastodon.bsd.cafe/tags/vxlan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vxlan</span></a> interface over <a href="https://mastodon.bsd.cafe/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>.</p><p>Backups are constantly done via <a href="https://mastodon.bsd.cafe/tags/zfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zfs</span></a> snapshots and external replication on two different machines, in two different datacenters (and different from the production VPS datacenter).</p><p><a href="https://mastodon.bsd.cafe/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.bsd.cafe/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.bsd.cafe/tags/servers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>servers</span></a> <a href="https://mastodon.bsd.cafe/tags/ITinfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITinfrastructure</span></a> <a href="https://mastodon.bsd.cafe/tags/BSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSD</span></a></p>
Peter N. M. Hansteen<p>Tunneling vxlan(4) over WireGuard wg(4) <a href="https://undeadly.org/cgi?action=article;sid=20230214061330" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20230214061330</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/vxlan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vxlan</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/wg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wg</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a> <a href="https://mastodon.social/tags/tunneling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tunneling</span></a></p>
p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:<p>Currently patching my Proxmox cluster to prep the experimental SDN functionality to enable me to do VXLAN across my cluster of nodes.</p><p>I want to test this so I can have virtual routers with devices on the same internal networks but spread across multiple physical nodes.</p><p>I'm familiar with doing this on VMware with dVSes and VLANs but trying to replicate it on Proxmox. If this doesn't work as expected I may end up trying some other options. Hope to solve this in software so I don't have to buy gear.</p><p><a href="https://infosec.exchange/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://infosec.exchange/tags/proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxmox</span></a> <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://infosec.exchange/tags/sdn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sdn</span></a> <a href="https://infosec.exchange/tags/vxlan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vxlan</span></a> <a href="https://infosec.exchange/tags/ovs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ovs</span></a> <a href="https://infosec.exchange/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a> <a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a></p>
heise online (inoffiziell)heise+ | Netzvirtualisierung: VXLAN für standortübergreifende Layer-2-Vernetzung<br><br>Das VXLAN kombiniert die Vorteile des Routings wie die parallele Nutzung mehrerer Links mit der Möglichkeit, Layer-2-Segmente zu vergrößern.<br><a href="https://www.heise.de/hintergrund/Netzvirtualisierung-VXLAN-fuer-standortuebergreifende-Layer-2-Vernetzung-4875789.html" rel="nofollow noopener noreferrer" target="_blank">Netzvirtualisierung: VXLAN für standortübergreifende Layer-2-Vernetzung</a><br><a href="https://squeet.me/search?tag=Layer-2-Vernetzung" rel="nofollow noopener noreferrer" target="_blank">#Layer-2-Vernetzung</a> <a href="https://squeet.me/search?tag=Netzvirtualisierung" rel="nofollow noopener noreferrer" target="_blank">#Netzvirtualisierung</a> <a href="https://squeet.me/search?tag=VXLAN" rel="nofollow noopener noreferrer" target="_blank">#VXLAN</a> <a href="https://squeet.me/search?tag=VirtualeXtensibleLocalAreaNetwork" rel="nofollow noopener noreferrer" target="_blank">#VirtualeXtensibleLocalAreaNetwork</a> <a href="https://squeet.me/search?tag=Virtualisierung" rel="nofollow noopener noreferrer" target="_blank">#Virtualisierung</a>