Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SA
SayCyberOnceMore @ Cyber @feddit.uk
Posts
18
Comments
558
Joined
2 yr. ago

  • Kinda Scenario 1 is the standard way: firewall at the perimeter with separately isolated networks for DMZ, LAN & Wifi

    The Firewall provides a proxy for anything in the DMZ, so all the filtering is done there and not on the DMZ device(s).

    GeoIP on the firewall, so anything that's opened to the interweb - inc. inbound VPNs can only come from selected regions.

    Fail2Ban on DMZ device(s), to prevent repeated login attacks.

    Wifi has multiple SSIDs to block / permit outbound access to the internet (IoT stuff), LAN (Guests), etc.

    Then regular updates / patching / backups....

  • 2nd hand Ruckus.

    They're decent quality that you'd see in a commercial / enterprise setting (so PoE), but Ruckus also have their “Unleashed” firmware which removes the need for a WLC.

    I have 2 in a mesh at home and easily support many IoT devices, phones, laptops, etc on multiple SSIDs

  • Yeah, I admit they cost more, but I'm not playing high perf games on it, so it's absolutely fine - no apps struggle.

    And the eco thing has to start somewhere and that's not something Google's aiming for (afaik)

    Plus, watching other's expression when I swap a battery to be fully charged in 60 seconds is great.

  • To take that a little further, I recruit on enthusiasm, experience then certs last.

    There's too many “experts” out there that I might not be able to fire due to employment laws.

    Certs are what I'd train my team for, to show to our clients.