20250907
This commit is contained in:
4
.obsidian/core-plugins.json
vendored
4
.obsidian/core-plugins.json
vendored
@@ -27,5 +27,7 @@
|
||||
"file-recovery": true,
|
||||
"publish": false,
|
||||
"sync": false,
|
||||
"webviewer": false
|
||||
"webviewer": false,
|
||||
"footnotes": false,
|
||||
"bases": true
|
||||
}
|
||||
105
.obsidian/workspace.json
vendored
105
.obsidian/workspace.json
vendored
@@ -4,16 +4,16 @@
|
||||
"type": "split",
|
||||
"children": [
|
||||
{
|
||||
"id": "74039cad74999421",
|
||||
"id": "7bf165bf92e4778a",
|
||||
"type": "tabs",
|
||||
"children": [
|
||||
{
|
||||
"id": "26c38753458fc744",
|
||||
"id": "9249aec0580dbde7",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "diary/2025-07-15.md",
|
||||
"file": "projects/20250729-current-projects.md",
|
||||
"mode": "source",
|
||||
"source": true,
|
||||
"backlinks": true,
|
||||
@@ -28,16 +28,16 @@
|
||||
}
|
||||
},
|
||||
"icon": "lucide-file",
|
||||
"title": "2025-07-15"
|
||||
"title": "20250729-current-projects"
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "cabaadcfcf089534",
|
||||
"id": "1307cde95c6930f2",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "projects/tu/general/network-infra.md",
|
||||
"file": "diary/2025-09-05.md",
|
||||
"mode": "source",
|
||||
"source": true,
|
||||
"backlinks": true,
|
||||
@@ -52,16 +52,16 @@
|
||||
}
|
||||
},
|
||||
"icon": "lucide-file",
|
||||
"title": "network-infra"
|
||||
"title": "2025-09-05"
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "f2ff4ec066764cf6",
|
||||
"id": "f4972d1b75dba67d",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "projects/apsa/nextcloud/nextcloud.md",
|
||||
"file": "projects/neosphere/ml-server/20250827-new-server-setup.md",
|
||||
"mode": "source",
|
||||
"source": true,
|
||||
"backlinks": true,
|
||||
@@ -76,11 +76,11 @@
|
||||
}
|
||||
},
|
||||
"icon": "lucide-file",
|
||||
"title": "nextcloud"
|
||||
"title": "20250827-new-server-setup"
|
||||
}
|
||||
}
|
||||
],
|
||||
"currentTab": 2
|
||||
"currentTab": 1
|
||||
}
|
||||
],
|
||||
"direction": "vertical"
|
||||
@@ -246,6 +246,7 @@
|
||||
},
|
||||
"left-ribbon": {
|
||||
"hiddenItems": {
|
||||
"bases:Create new base": false,
|
||||
"switcher:Open quick switcher": false,
|
||||
"graph:Open graph view": false,
|
||||
"canvas:Create new canvas": false,
|
||||
@@ -256,54 +257,54 @@
|
||||
"templater-obsidian:Templater": false
|
||||
}
|
||||
},
|
||||
"active": "f2ff4ec066764cf6",
|
||||
"active": "1307cde95c6930f2",
|
||||
"lastOpenFiles": [
|
||||
"diary/2025-07-15.md",
|
||||
"projects/tu/meetings/20250904-meeting.md",
|
||||
"diary/2025-09-05.md",
|
||||
"diary/2025-09-04.md",
|
||||
"projects/neosphere/ml-server/20250827-new-server-setup.md",
|
||||
"projects/tu/general/TODO-TUM.md",
|
||||
"projects/tu/general/network-infra.md",
|
||||
"projects/apsa/nextcloud/nextcloud.md",
|
||||
"projects/gg/avahi_mdns-reflector/20250713-infrastructure.md",
|
||||
"areas/nextcloud/tum-netxtcloud.md",
|
||||
"archive/kwa",
|
||||
"archive/ssr",
|
||||
"diary/2025-09-01.md",
|
||||
"diary/2025-09-03.md",
|
||||
"projects/neosphere/ml-server/20250708-qwerty-talk.md",
|
||||
"projects/sbx/firewall-std/opnsense/aliases.md",
|
||||
"projects/sbx/firewall-std/opnsense/categories.md",
|
||||
"projects/neosphere/ml-server/20250901-after-thoughts.md",
|
||||
"projects/neosphere/ml-server/20250711-qwerty_multi-GPU.md",
|
||||
"projects/20250729-current-projects.md",
|
||||
"diary/2025-08-14.md",
|
||||
"diary/2025-08-16.md",
|
||||
"diary/2025-08-17.md",
|
||||
"diary/2025-08-19.md",
|
||||
"diary/2025-08-20.md",
|
||||
"diary/2025-08-23.md",
|
||||
"diary/2025-08-25.md",
|
||||
"diary/2025-08-27.md",
|
||||
"diary/2025-08-30.md",
|
||||
"diary/2025-08-31.md",
|
||||
"projects/neosphere/ml-server/20250707-main.md",
|
||||
"projects/neosphere/ml-server/20250708-qwerty-summary.md",
|
||||
"projects/neosphere/ml-server/20250708-qwerty-talk.md",
|
||||
"projects/ssr/firewall_migration/20250611-VPN_config_new_FW.md",
|
||||
"projects/gg/avahi_mdns-reflector/20250712-avahi-mdns-planning.md",
|
||||
"projects/gg/avahi_mdns-reflector/20250714-esxi-networking.md",
|
||||
"projects/gg/avahi_mdns-reflector/20250714-apple-tv-devices.md",
|
||||
"projects/neosphere/ml-server/ubt03-netplan-bonding.conf",
|
||||
"projects/cqse/fw-ipv6",
|
||||
"projects/gg/packetfence",
|
||||
"projects/sbx/firewall-std/opnsense",
|
||||
"projects/OPNsense/defaults",
|
||||
"projects/tu/TU_Homepage/landing-page 1.png",
|
||||
"files/tu/landing-page.png",
|
||||
"files/Pasted image 20241022152235.png",
|
||||
"files/Pasted image 20250429110706.png",
|
||||
"projects/gg/avahi_mdns-reflector/new-nets",
|
||||
"projects/gg/avahi_mdns-reflector/prep",
|
||||
"projects/cqse/fw-migration/opnsense-licenses.json",
|
||||
"projects/froschwollmann",
|
||||
"projects/tu/meetings",
|
||||
"files/gg/Pasted image 20250727185114.png",
|
||||
"projects/apsa/nextcloud/20250602-bluechip-preis.png",
|
||||
"diary/2025-07-14.md",
|
||||
"projects/gg/avahi_mdns-reflector/20250714-linux-interface-conf.md",
|
||||
"projects/gg/avahi_mdns-reflector",
|
||||
"projects/neosphere/ml-server/20250711-qwerty_multi-H100-GPU.md",
|
||||
"diary/2025-07-13.md",
|
||||
"diary/2025-07-11.md",
|
||||
"diary/2025-07-12.md",
|
||||
"projects/gg",
|
||||
"areas/nextcloud/66-installing-from-commandline.md",
|
||||
"areas/nextcloud/66-command-line-installation-and-upgrade.md",
|
||||
"areas/nextcloud/04-installation-on-linux.md",
|
||||
"areas/nextcloud/03-required-pkgs.md",
|
||||
"areas/nextcloud/02-php_modules-and-configuration.md",
|
||||
"areas/nextcloud/01-requirements.md",
|
||||
"areas/nextcloud/00-init.md",
|
||||
"projects/OPNsense/Cluster/20250307-cluster-test-on-sg310.md",
|
||||
"projects/tu/glt-mail",
|
||||
"projects/bvv",
|
||||
"projects/neosphere/ml-server",
|
||||
"projects/tu/messschacht-ubnt",
|
||||
"archive/shz",
|
||||
"projects/kwa/neue_mcs",
|
||||
"archive/radiochemie/regineering-mbrosche.png",
|
||||
"archive/radiochemie/canvas.png",
|
||||
"files/ssr/PP-FW-Migration/part6.png",
|
||||
"files/ssr/PP-FW-Migration/part5.png",
|
||||
"files/ssr/PP-FW-Migration/part4.png",
|
||||
"files/ssr/PP-FW-Migration/part3.png",
|
||||
"files/ssr/PP-FW-Migration/part2.png",
|
||||
"files/ssr/PP-FW-Migration/part1.png",
|
||||
"files/ssr/PP-FW-Migration/Screenshot 2025-06-23 at 11.17.43.png",
|
||||
"files/ssr/PP-FW-Migration/Screenshot 2025-06-23 at 11.17.33.png",
|
||||
"files/ssr/PP-FW-Migration/Screenshot 2025-06-23 at 11.17.23.png",
|
||||
"projects/firewall-migrations/Untitled.canvas"
|
||||
]
|
||||
}
|
||||
0
diary/2025-07-26.md
Normal file
0
diary/2025-07-26.md
Normal file
0
diary/2025-07-27.md
Normal file
0
diary/2025-07-27.md
Normal file
79
diary/2025-07-28.md
Normal file
79
diary/2025-07-28.md
Normal file
@@ -0,0 +1,79 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA:kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Production
|
||||
- [x] GG: Broadcast: Beamer. Was fuer ein. Protokoll? -> 3620/udp broadcast -> geht nicht -> nutze statische IP Adressen
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] NeoSphere: identity management server
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [ ] APSA: Nextcloud
|
||||
- [ ] GG: radius
|
||||
- [ ] TU: Updates aller VMs
|
||||
|
||||
## Timestamps (Monday 20250728)
|
||||
|
||||
- 08:30 - 08:45: Ankunft, alles anschalten, klarkommen aufs Dasein
|
||||
- 08:45 - 09:15: Ticketpflege
|
||||
- 09:15 - 09:30: Rauchen. Meeting mit Max Kriesmair zur Lage der Firma
|
||||
- 09:30 - 10:00: GG: FreeRADIUS
|
||||
- 10:00 - 10:15: meeting mit maxi kugler: Proxmox cluster
|
||||
- 10:15 - 10:30: Meeting mit Marko: Umsetzung und Status des FreeRADIUS Server Projekts. Ruckus config mit Policies. Einbindung in DC und Ruckus Cloud netzwerk config
|
||||
- 10:30 - 10:45: Besprechung mit Max
|
||||
- 10:45 - 11:45: GG: FreeRadius projekt. Test ntlm auth zu DC. Klappt. Pruefe radius Config.
|
||||
- 11:45 - 12:30: Pause
|
||||
- 12:30 - 12:45: Marko Telefonat
|
||||
- 13:00 - 17:00: 3V Apple kack geraete. Radius Server config
|
||||
|
||||
## Timestamps (Friday 20250725)
|
||||
|
||||
- 09:00 - 09:15: Telefonat mit Dominik Thoma. PP und VW23 irgendwann auf seinem Rechner hinterlegen. Lasse ihm Link zukommen von unserer Nextcloud zu deren Paketen.
|
||||
- 09:15 - 09:30: SSR: Neue Userin erstellen in Kerio Connect
|
||||
- 09:30 - 09:45: Ticketpflege. Mail Kommunikation mit SSR: Neue Mitarbeiterin
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
103
diary/2025-07-29.md
Normal file
103
diary/2025-07-29.md
Normal file
@@ -0,0 +1,103 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Production
|
||||
- [x] GG: Broadcast: Beamer. Was fuer ein. Protokoll? -> 3620/udp broadcast -> geht nicht -> nutze statische IP Adressen
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] NeoSphere: identity management server
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [x] APSA: Nextcloud
|
||||
- [ ] GG: radius
|
||||
- [ ] TU: Updates aller VMs
|
||||
|
||||
## Timestamps (Wednesday 20250730)
|
||||
|
||||
- 09:00 - 10:00: Telefonat mit Nina Schiffel. Rechner Anika Zeman einrichten. Gespraech mit Marko zu Proxmox. Ruckus Lizenz fuer sbx Switch einspielen.
|
||||
- 10:00 - 10:30: SSR: Mac fuer Anika fertig einrichten
|
||||
- 10:30 - 10:45: Mailpflege. Sortieren und ebantowrten
|
||||
- 10:45 - 12:15: APSA: Nextcloud weiter einrichten. Firewall Setup mit Reverse Proxy. HAProxy und ACME konfigurieren fuer SSL certs. Design setzen. SSL konfigurieren.
|
||||
- 13:15 - 17:15: APSA Nextcloud. Helfe Marko mit Proxmox: Storage. RAID Controller. Jan helfen, PPPoE bei SG zu finden.
|
||||
|
||||
## Timestamps (Tuesday 20250729)
|
||||
|
||||
- 08:00 - 08:30: SSR/KWA: Stromzaehleraustausch. Schalte ESXi und NAS bei SSR ab.
|
||||
- 08:30 - 09:00: Ticketpflege und Projektplaene. Schreibe alle Projekte raus; zeitlichen Aufwand und (potenitelle) Terminierung.
|
||||
- 09:00 - 09:15: Labortisch aufraeumen
|
||||
- 09:15 - 09:30: Projektplanung
|
||||
- 09:30 - 09:45: Telefonat mit Marko: GG Planung und Umsetzung.
|
||||
- 09:45 - 10:00: Outlook Termine eintragen
|
||||
- 10:00 - 10:15: APSA: Benoetigtes bestellen und Bluechip Cloud einrichten. Sie haben schon eine Nextcloud. Kann sein schon aufgesetzt.
|
||||
- 10:15 - 10:45: GG: Teste Ruckus mDNS Proxy. Wird nur an WLAN angewendet. Keine Moeglichkeit zu testen ohne Rechner.
|
||||
- 10:45 - 11:15: Telefonat mit Frau Tiling und Mail schreiben. Bestehende Nextcloud ist bekannt.
|
||||
- 11:15 - 12:15: APSA: pfSense Update. Install HAProxy. DNS setzen fuer ambulanz.psychoanalyse-muenchen.de. VM, Kerne, RAM und DMZ kaufen/bestellen.
|
||||
- 12:15 - 13:15: Pause
|
||||
- 13:15 - 16:15: BlueChip Cloud Konfigurieren. DNS. DMZ - FW und NC. pfSense anpassen: GUI Port. VM installieren. Firewall Regeln definieren. Mit ansible Nextcloud installieren. Erstinstallation
|
||||
- 16:15 - 18:00: GG: Teste mDNS. Radius
|
||||
|
||||
## Timestamps (Monday 20250728)
|
||||
|
||||
- 08:30 - 08:45: Ankunft, alles anschalten, klarkommen aufs Dasein
|
||||
- 08:45 - 09:15: Ticketpflege
|
||||
- 09:15 - 09:30: Rauchen. Meeting mit Max Kriesmair zur Lage der Firma
|
||||
- 09:30 - 10:00: GG: FreeRADIUS
|
||||
- 10:00 - 10:15: meeting mit maxi kugler: Proxmox cluster
|
||||
- 10:15 - 10:30: Meeting mit Marko: Umsetzung und Status des FreeRADIUS Server Projekts. Ruckus config mit Policies. Einbindung in DC und Ruckus Cloud netzwerk config
|
||||
- 10:30 - 10:45: Besprechung mit Max
|
||||
- 10:45 - 11:45: GG: FreeRadius projekt. Test ntlm auth zu DC. Klappt. Pruefe radius Config.
|
||||
- 11:45 - 12:30: Pause
|
||||
- 12:30 - 12:45: Marko Telefonat
|
||||
- 13:00 - 17:00: 3V Apple kack geraete. Radius Server config (T20250327.0021)
|
||||
|
||||
## Timestamps (Friday 20250725)
|
||||
|
||||
- 09:00 - 09:15: Telefonat mit Dominik Thoma. PP und VW23 irgendwann auf seinem Rechner hinterlegen. Lasse ihm Link zukommen von unserer Nextcloud zu deren Paketen.
|
||||
- 09:15 - 09:30: SSR: Neue Userin erstellen in Kerio Connect
|
||||
- 09:30 - 09:45: Ticketpflege. Mail Kommunikation mit SSR: Neue Mitarbeiterin
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
103
diary/2025-07-30.md
Normal file
103
diary/2025-07-30.md
Normal file
@@ -0,0 +1,103 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Production
|
||||
- [x] GG: Broadcast: Beamer. Was fuer ein. Protokoll? -> 3620/udp broadcast -> geht nicht -> nutze statische IP Adressen
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] NeoSphere: identity management server
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [x] APSA: Nextcloud
|
||||
- [ ] GG: radius
|
||||
- [ ] TU: Updates aller VMs
|
||||
|
||||
## Timestamps (Wednesday 20250730)
|
||||
|
||||
- 09:00 - 10:00: Telefonat mit Nina Schiffel. Rechner Anika Zeman einrichten. Gespraech mit Marko zu Proxmox. Ruckus Lizenz fuer sbx Switch einspielen.
|
||||
- 10:00 - 10:30: SSR: Mac fuer Anika fertig einrichten
|
||||
- 10:30 - 10:45: Mailpflege. Sortieren und ebantowrten
|
||||
- 10:45 - 12:15: APSA: Nextcloud weiter einrichten. Firewall Setup mit Reverse Proxy. HAProxy und ACME konfigurieren fuer SSL certs. Design setzen. SSL konfigurieren.
|
||||
- 13:15 - 17:15: APSA Nextcloud. Helfe Marko mit Proxmox: Storage. RAID Controller. Jan helfen, PPPoE bei SG zu finden.
|
||||
|
||||
## Timestamps (Tuesday 20250729)
|
||||
|
||||
- 08:00 - 08:30: SSR/KWA: Stromzaehleraustausch. Schalte ESXi und NAS bei SSR ab.
|
||||
- 08:30 - 09:00: Ticketpflege und Projektplaene. Schreibe alle Projekte raus; zeitlichen Aufwand und (potenitelle) Terminierung.
|
||||
- 09:00 - 09:15: Labortisch aufraeumen
|
||||
- 09:15 - 09:30: Projektplanung
|
||||
- 09:30 - 09:45: Telefonat mit Marko: GG Planung und Umsetzung.
|
||||
- 09:45 - 10:00: Outlook Termine eintragen
|
||||
- 10:00 - 10:15: APSA: Benoetigtes bestellen und Bluechip Cloud einrichten. Sie haben schon eine Nextcloud. Kann sein schon aufgesetzt.
|
||||
- 10:15 - 10:45: GG: Teste Ruckus mDNS Proxy. Wird nur an WLAN angewendet. Keine Moeglichkeit zu testen ohne Rechner.
|
||||
- 10:45 - 11:15: Telefonat mit Frau Tiling und Mail schreiben. Bestehende Nextcloud ist bekannt.
|
||||
- 11:15 - 12:15: APSA: pfSense Update. Install HAProxy. DNS setzen fuer ambulanz.psychoanalyse-muenchen.de. VM, Kerne, RAM und DMZ kaufen/bestellen.
|
||||
- 12:15 - 13:15: Pause
|
||||
- 13:15 - 16:15: BlueChip Cloud Konfigurieren. DNS. DMZ - FW und NC. pfSense anpassen: GUI Port. VM installieren. Firewall Regeln definieren. Mit ansible Nextcloud installieren. Erstinstallation
|
||||
- 16:15 - 18:00: GG: Teste mDNS. Radius
|
||||
|
||||
## Timestamps (Monday 20250728)
|
||||
|
||||
- 08:30 - 08:45: Ankunft, alles anschalten, klarkommen aufs Dasein
|
||||
- 08:45 - 09:15: Ticketpflege
|
||||
- 09:15 - 09:30: Rauchen. Meeting mit Max Kriesmair zur Lage der Firma
|
||||
- 09:30 - 10:00: GG: FreeRADIUS
|
||||
- 10:00 - 10:15: meeting mit maxi kugler: Proxmox cluster
|
||||
- 10:15 - 10:30: Meeting mit Marko: Umsetzung und Status des FreeRADIUS Server Projekts. Ruckus config mit Policies. Einbindung in DC und Ruckus Cloud netzwerk config
|
||||
- 10:30 - 10:45: Besprechung mit Max
|
||||
- 10:45 - 11:45: GG: FreeRadius projekt. Test ntlm auth zu DC. Klappt. Pruefe radius Config.
|
||||
- 11:45 - 12:30: Pause
|
||||
- 12:30 - 12:45: Marko Telefonat
|
||||
- 13:00 - 17:00: 3V Apple kack geraete. Radius Server config (T20250327.0021)
|
||||
|
||||
## Timestamps (Friday 20250725)
|
||||
|
||||
- 09:00 - 09:15: Telefonat mit Dominik Thoma. PP und VW23 irgendwann auf seinem Rechner hinterlegen. Lasse ihm Link zukommen von unserer Nextcloud zu deren Paketen.
|
||||
- 09:15 - 09:30: SSR: Neue Userin erstellen in Kerio Connect
|
||||
- 09:30 - 09:45: Ticketpflege. Mail Kommunikation mit SSR: Neue Mitarbeiterin
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
93
diary/2025-07-31.md
Normal file
93
diary/2025-07-31.md
Normal file
@@ -0,0 +1,93 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Production
|
||||
- [x] GG: Broadcast: Beamer. Was fuer ein. Protokoll? -> 3620/udp broadcast -> geht nicht -> nutze statische IP Adressen
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] NeoSphere: identity management server
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [x] APSA: Nextcloud
|
||||
- [ ] GG: radius
|
||||
- [ ] TU: Updates aller VMs
|
||||
|
||||
## Timestamps (Thursday 20250731)
|
||||
|
||||
- 09:00 - 10:00: Meeting RCM: Tobias Moser, Philipp Weise, Christoph LIerse, Anton Kastenmueller
|
||||
- 11:00 - 12:00: Displays pruefen Alte Mensa (VBI)
|
||||
- 12:00 - 12:30: Pause
|
||||
- 12:30 - 13:00: '2 leitungen in schrank. 4 geraete. Jedes Geraet soll mit eigenem Anschluss an der Switch anliegen.' Telefonat mit Max Brosche
|
||||
- 13:00 - 14:45: RCM. Lierse und Sebastian Wichtler das Problem von Regineering anschauen. Pruefe FW (opnsense). Pruefe Erreichbarkeit der Geraete: welche nicht erreichbar. Gehe zum schaltschrank. Neu Verkabeln. Geraete sind alle erreichbar. Test durch Reginieering steht aus.
|
||||
- 15:00 - 15:15: APSA: Nextcloud. Ninja Agent installieren. Acc fuer Frau Tiling erstellen. Mail verfassen
|
||||
- 15:15 - 15:30: Mail an NeoSphere
|
||||
- 15:30 - 16:00: RCM: Problem liegt wohl doch am VPN Netzwerk.
|
||||
- 16:00 - 17:00: TUM: Firewall Regeln anpassen, sodass alle Server auch ohne Internet geupdatet werden kann. 20 min RCM Firewall checken.
|
||||
|
||||
## Timestamps (Wednesday 20250730)
|
||||
|
||||
- 10:45 - 12:15: APSA: Nextcloud weiter einrichten. Firewall Setup mit Reverse Proxy. HAProxy und ACME konfigurieren fuer SSL certs. Design setzen. SSL konfigurieren.
|
||||
- 13:15 - 17:15: APSA Nextcloud. Helfe Marko mit Proxmox: Storage. RAID Controller. Jan helfen, PPPoE bei SG zu finden.
|
||||
|
||||
## Timestamps (Tuesday 20250729)
|
||||
|
||||
- 08:00 - 08:30: SSR/KWA: Stromzaehleraustausch. Schalte ESXi und NAS bei SSR ab.
|
||||
|
||||
|
||||
- 10:00 - 10:15: APSA: Benoetigtes bestellen und Bluechip Cloud einrichten. Sie haben schon eine Nextcloud. Kann sein schon aufgesetzt.
|
||||
|
||||
- 10:45 - 11:15: Telefonat mit Frau Tiling und Mail schreiben. Bestehende Nextcloud ist bekannt.
|
||||
- 11:15 - 12:15: APSA: pfSense Update. Install HAProxy. DNS setzen fuer ambulanz.psychoanalyse-muenchen.de. VM, Kerne, RAM und DMZ kaufen/bestellen.
|
||||
|
||||
- 13:15 - 16:15: BlueChip Cloud Konfigurieren. DNS. DMZ - FW und NC. pfSense anpassen: GUI Port. VM installieren. Firewall Regeln definieren. Mit ansible Nextcloud installieren. Erstinstallation
|
||||
|
||||
## Timestamps (Monday 20250728)
|
||||
|
||||
- 13:00 - 15:00: 3V Apple kack geraete. (T20250327.0021)
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
74
diary/2025-08-01.md
Normal file
74
diary/2025-08-01.md
Normal file
@@ -0,0 +1,74 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Production
|
||||
- [x] GG: Broadcast: Beamer. Was fuer ein. Protokoll? -> 3620/udp broadcast -> geht nicht -> nutze statische IP Adressen
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [x] APSA: Nextcloud
|
||||
- [ ] GG: radius
|
||||
- [ ] TU: Updates aller VMs
|
||||
|
||||
## Timestamps (Friday 20250801)
|
||||
|
||||
- 08:45 - 09:00: Ticketpflege
|
||||
- 09:00 - 09:30: 1:1 Meeting mit Saulius
|
||||
- 09:30 - 10:00: Telefonat mit Bjoern Schwalb von NeoSphere
|
||||
- 10:00 - 10:30: Ticketpflege
|
||||
- 10:30 - 10:45: Meeting mit Jan zum Windows Upgrade Projekt
|
||||
- 10:45 - 11:00: GG: Marko helfen mit Proxmox Installation
|
||||
- 11:00 - 12:00: NetAdmin Meeting
|
||||
- 12:30 - 13:15: Pause
|
||||
- 13:15 - 13:30: Fernseher hoch tragen
|
||||
- 13:30 - 15:00: GG: marko helfen
|
||||
- 15:00 - 17:00: CQSE: OPNsense Cluster
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
0
diary/2025-08-02.md
Normal file
0
diary/2025-08-02.md
Normal file
0
diary/2025-08-03.md
Normal file
0
diary/2025-08-03.md
Normal file
87
diary/2025-08-04.md
Normal file
87
diary/2025-08-04.md
Normal file
@@ -0,0 +1,87 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Produktion
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] SHZ: Setze S2S Tunnel zu uns auf und teste Verfuegbarkeit
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [ ] GG: RADIUS
|
||||
- [ ] TU: Updates aller VMs
|
||||
- [ ] SHZ: Pfeiffer schreiben. S2S VPN aufsetzen und Monitoring informieren. Erweitere Monitoring auf alle Standorte
|
||||
|
||||
## Timestamps (Monday 20250804)
|
||||
|
||||
- 07:45 - 08:15: Ticketpflege
|
||||
- 08:15 - 08:45: Projektpflege in Saulius und meine Liste
|
||||
- 08:45 - 09:15: SSR: Projekt Pro SSL Zertifikate vereitstellen
|
||||
- 09:15 - 09:45: SHZ: Tulbeck Tunnel down. Reconnect S2S in Main Sophos Firewall.
|
||||
- 09:45 - 10:15: Telefonat mit Marko zu GG und SHZ. Ideen. Setze S2S Tunnel auf und teste Verbindung
|
||||
- 10:15 - 11:00: Richte Uptime-Kuma ein zur Ueberwachung der SHZ Firewalls
|
||||
- 11:00 - 12:00: Pause
|
||||
- 12:00 - 12:30: Verschieden Softbox Web Dienste zu Kuma hinzufuegen. Pruefe OPNcentral: KWA Zertifikat abgelaufen; ernuere es.
|
||||
- 12:30 - 13:15: TU Untersuche Problematik bei IFP Netz. Sophos: gw und gw2. Macmon. IPAM.
|
||||
- 13:15 - 13:30: Lizenzablauf der BJKS Lizenz pruefen
|
||||
- 13:30 - 14:00: APSA: Meeting vorbereiten. Nextcloud
|
||||
- 14:00 - 14:45: APSA: Meeting
|
||||
- 14:45 - 15:00: Denken, Sammeln nach dem Meeting.
|
||||
- 15:00 - 15:30: Meeting mit Maxi. PVE. Was ich moechte: IP Adressen ueberlgen, Hostnamen, Bilder malen,
|
||||
- 15:30 - 16:15: SHZ: Binde RED devices in monitoring ein. Ein RED device nicht ping-bar. Analyse. Telefonat mit Marko.
|
||||
- 16:30 - 17:00: APSA: Nextcloud Einrichtung weitermachen. Neue Gruppenautfeilung. Auf Deutsch uebersetzen. Recherche: autocreation user folder
|
||||
|
||||
## Timestamps (Friday 20250801)
|
||||
|
||||
- 10:45 - 11:00: GG: Marko helfen mit Proxmox Installation
|
||||
|
||||
- 13:30 - 15:00: GG: marko helfen
|
||||
- 15:00 - 16:00: CQSE: OPNsense Cluster
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
104
diary/2025-08-05.md
Normal file
104
diary/2025-08-05.md
Normal file
@@ -0,0 +1,104 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Produktion
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] SHZ: Setze S2S Tunnel zu uns auf und teste Verfuegbarkeit
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [ ] GG: RADIUS
|
||||
- [ ] TU: Updates aller VMs
|
||||
- [ ] SHZ: Pfeiffer schreiben. S2S VPN aufsetzen und Monitoring informieren. Erweitere Monitoring auf alle Standorte
|
||||
|
||||
## Timestamps (Tuesday 20250805)
|
||||
|
||||
- 08:45 - 09:15: [x] TUM: Seb Fischer (Bachner) kommen nicht auf Geraete drauf
|
||||
- 09:15 - 09:45: Gespraech mit Saulius zu Schulungs Idee. Fruehstueck
|
||||
- 09:45 - 10:00: SHZ. Untersuche S2S und SSL VPN einstellungen. Aktiviere debug logs fuer SSL VPN. 110 Sekunden Timeout Zeit fuer IPsec.
|
||||
- 10:00 - 10:15: Racuhen. Gespraech mit Maxi zu Linux Projekt in Schule?
|
||||
- 10:15 - 10:45: SHZ: Frau Pfeiffer kontaktieren. Informiere sie ueber Taetigkeit um das Problem in den Griff zu bekommen. red in 151 muss bis 15 Uhr wieder laufen.
|
||||
- 10:45 - 11:15: Setze S2S auf zu unserer Firewall. OPNcentral oder pfSense in Cloud. Nehme gw.test.softbox.net damit keine von unseren Produktion Systemen betroffen ist. PLANUNG. Erstelle Ticket zur Problematik.
|
||||
- 11:15 - 12:15: Pause
|
||||
- 12:15 - 12:30: 03Arch kein Internet? Pruefe Ruckus Dubag APs; komische WiFi Settings. Plane s2s zu shz haupt fw
|
||||
- 12:30 - 13:00: Pruefe Moeglichkeit von zweiten s2s tunnel auf gw.shz-meunchen.de zu gw.test.softbox.net
|
||||
- 13:00 - 14:00: Anfahrt zu shz
|
||||
- 14:00 - 15:00: Westend151 RED device pruefen
|
||||
- 15:00 - 17:00: fickifacki
|
||||
|
||||
## Timestamps (Monday 20250804)
|
||||
|
||||
- 07:45 - 08:15: Ticketpflege
|
||||
- 08:15 - 08:45: Projektpflege in Saulius und meine Liste
|
||||
- 08:45 - 09:15: SSR: Projekt Pro SSL Zertifikate vereitstellen
|
||||
- 09:15 - 09:45: SHZ: Tulbeck Tunnel down. Reconnect S2S in Main Sophos Firewall.
|
||||
- 09:45 - 10:15: Telefonat mit Marko zu GG und SHZ. Ideen. Setze S2S Tunnel auf und teste Verbindung
|
||||
- 10:15 - 11:00: Richte Uptime-Kuma ein zur Ueberwachung der SHZ Firewalls
|
||||
|
||||
- 12:00 - 12:30: Verschieden Softbox Web Dienste zu Kuma hinzufuegen. Pruefe OPNcentral: KWA Zertifikat abgelaufen; ernuere es.
|
||||
|
||||
- 13:15 - 13:30: Lizenzablauf der BJKS Lizenz pruefen
|
||||
- 13:30 - 14:00: APSA: Meeting vorbereiten. Nextcloud
|
||||
- 14:00 - 14:45: APSA: Meeting
|
||||
- 14:45 - 15:00: Denken, Sammeln nach dem Meeting.
|
||||
- 15:00 - 15:30: Meeting mit Maxi. PVE. Was ich moechte: IP Adressen ueberlgen, Hostnamen, Bilder malen,
|
||||
- 15:30 - 16:15: SHZ: Binde RED devices in monitoring ein. Ein RED device nicht ping-bar. Analyse. Telefonat mit Marko.
|
||||
- 16:30 - 17:00: APSA: Nextcloud Einrichtung weitermachen. Neue Gruppenautfeilung. Auf Deutsch uebersetzen. Recherche: autocreation user folder
|
||||
|
||||
## Timestamps (Friday 20250801)
|
||||
|
||||
- 10:45 - 11:00: GG: Marko helfen mit Proxmox Installation
|
||||
|
||||
- 13:30 - 15:00: GG: marko helfen
|
||||
- 15:00 - 16:00: CQSE: OPNsense Cluster
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
108
diary/2025-08-06.md
Normal file
108
diary/2025-08-06.md
Normal file
@@ -0,0 +1,108 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Produktion
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] SHZ: Setze S2S Tunnel zu uns auf und teste Verfuegbarkeit
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [ ] GG: RADIUS
|
||||
- [ ] TU: Updates aller VMs
|
||||
- [=] SHZ: S2S VPN aufsetzen und Monitoring informieren. Erweitere Monitoring auf alle Standorte
|
||||
|
||||
## Timestamps (Wednesday 20250806)
|
||||
|
||||
- 08:30 - 08:45: Pruefe Cloud Monitoring von SHZ
|
||||
|
||||
## Timestamps (Tuesday 20250805)
|
||||
|
||||
- 08:45 - 09:15: [x] TUM: Seb Fischer (Bachner) kommen nicht auf Geraete drauf
|
||||
- 09:15 - 09:45: Gespraech mit Saulius zu Schulungs Idee. Fruehstueck
|
||||
- 09:45 - 10:00: SHZ. Untersuche S2S und SSL VPN einstellungen. Aktiviere debug logs fuer SSL VPN. 110 Sekunden Timeout Zeit fuer IPsec.
|
||||
- 10:00 - 10:15: Racuhen. Gespraech mit Maxi zu Linux Projekt in Schule?
|
||||
- 10:15 - 10:45: SHZ: Frau Pfeiffer kontaktieren. Informiere sie ueber Taetigkeit um das Problem in den Griff zu bekommen. red in 151 muss bis 15 Uhr wieder laufen.
|
||||
- 10:45 - 11:15: Setze S2S auf zu unserer Firewall. OPNcentral oder pfSense in Cloud. Nehme gw.test.softbox.net damit keine von unseren Produktion Systemen betroffen ist. PLANUNG. Erstelle Ticket zur Problematik.
|
||||
- 11:15 - 12:15: Pause
|
||||
- 12:15 - 12:30: 03Arch kein Internet? Pruefe Ruckus Dubag APs; komische WiFi Settings. Plane s2s zu shz haupt fw
|
||||
- 12:30 - 13:00: Pruefe Moeglichkeit von zweiten s2s tunnel auf gw.shz-meunchen.de zu gw.test.softbox.net
|
||||
- 13:00 - 14:00: Anfahrt zu shz
|
||||
- 14:00 - 15:00: Westend151 RED device pruefen
|
||||
- 15:00 - 17:00: fickifacki
|
||||
|
||||
## Timestamps (Monday 20250804)
|
||||
|
||||
- 07:45 - 08:15: Ticketpflege
|
||||
- 08:15 - 08:45: Projektpflege in Saulius und meine Liste
|
||||
- 08:45 - 09:15: SSR: Projekt Pro SSL Zertifikate vereitstellen
|
||||
- 09:15 - 09:45: SHZ: Tulbeck Tunnel down. Reconnect S2S in Main Sophos Firewall.
|
||||
- 09:45 - 10:15: Telefonat mit Marko zu GG und SHZ. Ideen. Setze S2S Tunnel auf und teste Verbindung
|
||||
- 10:15 - 11:00: Richte Uptime-Kuma ein zur Ueberwachung der SHZ Firewalls
|
||||
|
||||
- 12:00 - 12:30: Verschieden Softbox Web Dienste zu Kuma hinzufuegen. Pruefe OPNcentral: KWA Zertifikat abgelaufen; ernuere es.
|
||||
|
||||
- 13:15 - 13:30: Lizenzablauf der BJKS Lizenz pruefen
|
||||
- 13:30 - 14:00: APSA: Meeting vorbereiten. Nextcloud
|
||||
- 14:00 - 14:45: APSA: Meeting
|
||||
- 14:45 - 15:00: Denken, Sammeln nach dem Meeting.
|
||||
- 15:00 - 15:30: Meeting mit Maxi. PVE. Was ich moechte: IP Adressen ueberlgen, Hostnamen, Bilder malen,
|
||||
- 15:30 - 16:15: SHZ: Binde RED devices in monitoring ein. Ein RED device nicht ping-bar. Analyse. Telefonat mit Marko.
|
||||
- 16:30 - 17:00: APSA: Nextcloud Einrichtung weitermachen. Neue Gruppenautfeilung. Auf Deutsch uebersetzen. Recherche: autocreation user folder
|
||||
|
||||
## Timestamps (Friday 20250801)
|
||||
|
||||
- 10:45 - 11:00: GG: Marko helfen mit Proxmox Installation
|
||||
|
||||
- 13:30 - 15:00: GG: marko helfen
|
||||
- 15:00 - 16:00: CQSE: OPNsense Cluster
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
126
diary/2025-08-07.md
Normal file
126
diary/2025-08-07.md
Normal file
@@ -0,0 +1,126 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Produktion
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] SHZ: Setze S2S Tunnel zu uns auf und teste Verfuegbarkeit
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [=] GG: RADIUS
|
||||
- [ ] TU: Updates aller VMs
|
||||
- [ ] RCM: 24 Port Switch Angebot schicken
|
||||
- [=] SHZ: S2S VPN aufsetzen und Monitoring informieren. Erweitere Monitoring auf alle Standorte
|
||||
|
||||
## Timestamps (Thursday 20250807)
|
||||
|
||||
- 08:30 - 09:00: Pruefe UniFi WiFI Bridge. Pruefe Funktion des Alarm-Mail Servers. Stelle Sprache bei Alarm Mail Server um. Mail Flow Diagram erstellen.
|
||||
- 09:00 - 09:30: Backup Server Windows Update. Firewall Regeln pruefen. Mail Server pruefen.
|
||||
- 09:30 - 10:00: Meeting mit Tobias Moser.
|
||||
- 10:00 - 10:45: Mario Peter. Nextcloud Themen. Geht auf iOS nicht. -> bug in app. Kalendar fragen.
|
||||
- 10:45 - 11:45: Landing Page weiter bearbeiten
|
||||
- 11:45 - 12:45: Pause
|
||||
- 12:45 - 13:00: Vorbereiten fuer Meeting mit Tobias: Mail Server vorstellen
|
||||
- 13:00 - 13:15: Homepage weitermachen.
|
||||
- 13:15 - 13:30: Meeting mit Thomas Henriss: MXi64 glt Zugang
|
||||
- 13:30 - 14:00: Vorstellung des Alarm Mail Servers
|
||||
- 14:00 - 14:30: Pause
|
||||
- 14:30 - 15:30: Tobias und Philip Weise getroffen. Gespraech zu Kinderhaus/ Nivus/ Messschacht. Tobias Telefonat mir Herrn Fissl. -> Geraete waren zeitweise aus
|
||||
- 15:30 - 17:00: Dokumentation fuer mx server setzen und it glue und auf nextcloud. Landing Page weiter bearbeiten.
|
||||
|
||||
## Timestamps (Wednesday 20250806)
|
||||
|
||||
- 08:30 - 08:45: Pruefe Cloud Monitoring von SHZ
|
||||
- 09:00 - 17:00: RADIUS Server, mDNS proxy
|
||||
|
||||
## Timestamps (Tuesday 20250805)
|
||||
|
||||
- 08:45 - 09:15: [x] TUM: Seb Fischer (Bachner) kommen nicht auf Geraete drauf
|
||||
- 09:15 - 09:45: Gespraech mit Saulius zu Schulungs Idee. Fruehstueck
|
||||
- 09:45 - 10:00: SHZ. Untersuche S2S und SSL VPN einstellungen. Aktiviere debug logs fuer SSL VPN. 110 Sekunden Timeout Zeit fuer IPsec.
|
||||
- 10:00 - 10:15: Racuhen. Gespraech mit Maxi zu Linux Projekt in Schule?
|
||||
- 10:15 - 10:45: SHZ: Frau Pfeiffer kontaktieren. Informiere sie ueber Taetigkeit um das Problem in den Griff zu bekommen. red in 151 muss bis 15 Uhr wieder laufen.
|
||||
- 10:45 - 11:15: Setze S2S auf zu unserer Firewall. OPNcentral oder pfSense in Cloud. Nehme gw.test.softbox.net damit keine von unseren Produktion Systemen betroffen ist. PLANUNG. Erstelle Ticket zur Problematik.
|
||||
- 11:15 - 12:15: Pause
|
||||
- 12:15 - 12:30: 03Arch kein Internet? Pruefe Ruckus Dubag APs; komische WiFi Settings. Plane s2s zu shz haupt fw
|
||||
- 12:30 - 13:00: Pruefe Moeglichkeit von zweiten s2s tunnel auf gw.shz-meunchen.de zu gw.test.softbox.net
|
||||
- 13:00 - 14:00: Anfahrt zu shz
|
||||
- 14:00 - 15:00: Westend151 RED device pruefen
|
||||
- 15:00 - 17:00: fickifacki
|
||||
|
||||
## Timestamps (Monday 20250804)
|
||||
|
||||
- 07:45 - 08:15: Ticketpflege
|
||||
- 08:15 - 08:45: Projektpflege in Saulius und meine Liste
|
||||
- 08:45 - 09:15: SSR: Projekt Pro SSL Zertifikate vereitstellen
|
||||
- 09:15 - 09:45: SHZ: Tulbeck Tunnel down. Reconnect S2S in Main Sophos Firewall.
|
||||
- 09:45 - 10:15: Telefonat mit Marko zu GG und SHZ. Ideen. Setze S2S Tunnel auf und teste Verbindung
|
||||
- 10:15 - 11:00: Richte Uptime-Kuma ein zur Ueberwachung der SHZ Firewalls
|
||||
|
||||
- 12:00 - 12:30: Verschieden Softbox Web Dienste zu Kuma hinzufuegen. Pruefe OPNcentral: KWA Zertifikat abgelaufen; ernuere es.
|
||||
|
||||
- 13:15 - 13:30: Lizenzablauf der BJKS Lizenz pruefen
|
||||
- 13:30 - 14:00: APSA: Meeting vorbereiten. Nextcloud
|
||||
- 14:00 - 14:45: APSA: Meeting
|
||||
- 14:45 - 15:00: Denken, Sammeln nach dem Meeting.
|
||||
- 15:00 - 15:30: Meeting mit Maxi. PVE. Was ich moechte: IP Adressen ueberlgen, Hostnamen, Bilder malen,
|
||||
- 15:30 - 16:15: SHZ: Binde RED devices in monitoring ein. Ein RED device nicht ping-bar. Analyse. Telefonat mit Marko.
|
||||
- 16:30 - 17:00: APSA: Nextcloud Einrichtung weitermachen. Neue Gruppenautfeilung. Auf Deutsch uebersetzen. Recherche: autocreation user folder
|
||||
|
||||
## Timestamps (Friday 20250801)
|
||||
|
||||
- 10:45 - 11:00: GG: Marko helfen mit Proxmox Installation
|
||||
|
||||
- 13:30 - 15:00: GG: marko helfen
|
||||
- 15:00 - 16:00: CQSE: OPNsense Cluster
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
112
diary/2025-08-08.md
Normal file
112
diary/2025-08-08.md
Normal file
@@ -0,0 +1,112 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: Avahi: Erstelle Liste aller Apple TV's
|
||||
- [ ] GG: Avahi: Pruefe Skalierung, und Belastung. Ab September in Produktion
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] SHZ: Setze S2S Tunnel zu uns auf und teste Verfuegbarkeit
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
- [=] GG: RADIUS
|
||||
|
||||
- [x] TU: Updates aller VMs -> Firewall freigabe einrichten -> fehlgeschlagen
|
||||
- [ ] RCM: 24 Port Switch Angebot schicken -> Am Montag Sebastian fragen
|
||||
- [ ] NeoSphere: Termin umplanen
|
||||
- [x] Wollmann: Proxmox Server aufsetzen
|
||||
- [ ] cqse: opnsense cluster aufsetzen
|
||||
- [ ] Ticketpflege
|
||||
- [x] phytron: nextcloud smtp server -> spf record fehlt noch
|
||||
- [ ] apsa: nextcloud user/folder autocreate
|
||||
- [x] BVV: rproxy haerten. fail2ban installieren. Admir noch zeigen ->
|
||||
- [=] SHZ: S2S VPN aufsetzen und Monitoring informieren. Erweitere Monitoring auf alle Standorte
|
||||
|
||||
## Timestamps (Friday 20250808)
|
||||
|
||||
- 07:45 - 08:00: Gespraech mit Saulius zu Wollmann Proxmox Server
|
||||
- 08:00 - 08:10: Tagesaufgaben sortieren
|
||||
- 08:10 - 08:20: BVV: Reverse Proxy. Fail2ban einrichten fuer nginx
|
||||
- 08:20 - 08:45: Wollmann: Neuen Server aufbauen und anstecken. Vorbereiten fuer Installation. Keine Platten?
|
||||
- 08:45 - 09:00: Kuechentaetigkeiten
|
||||
- 09:00 - 09:30: Gespraech mit Maxi zu Proxmox.
|
||||
- 09:30 - 10:30: TUM: Windows Updates. Firewall. Funktioniert nicht... benoetigte Domains nicht bekannt.. funktioniert nicht
|
||||
|
||||
- 11:30 - 12:30: Phytron smtp server fuer Nextcloud einstellen
|
||||
- 12:30 - 13:30: Pause
|
||||
- 13:30 - 14:30: FroschWollmann. Server Hardware zusammenbauen mit Saulius und Jan
|
||||
- 14:30 - 16:30: FroschWollmann Proxmox aufsetzen. iLo aufsetzen. RAID eirnichten. RAID1 fuer VM und RAID5 fuer Datastore.
|
||||
- 16:30 - 17:00: OPNsense. Cluster aufsetzen. WAN und LAN
|
||||
|
||||
## Timestamps (Thursday 20250807)
|
||||
|
||||
- 08:30 - 09:00: Pruefe UniFi WiFI Bridge. Pruefe Funktion des Alarm-Mail Servers. Stelle Sprache bei Alarm Mail Server um. Mail Flow Diagram erstellen.
|
||||
- 09:00 - 09:30: Backup Server Windows Update. Firewall Regeln pruefen. Mail Server pruefen.
|
||||
- 09:30 - 10:00: Meeting mit Tobias Moser.
|
||||
- 10:00 - 10:45: Mario Peter. Nextcloud Themen. Geht auf iOS nicht. -> bug in app. Kalendar fragen.
|
||||
- 10:45 - 11:45: Landing Page weiter bearbeiten
|
||||
- 11:45 - 12:45: Pause
|
||||
- 12:45 - 13:00: Vorbereiten fuer Meeting mit Tobias: Mail Server vorstellen
|
||||
- 13:00 - 13:15: Homepage weitermachen.
|
||||
- 13:15 - 13:30: Meeting mit Thomas Henriss: MXi64 glt Zugang
|
||||
- 13:30 - 14:00: Vorstellung des Alarm Mail Servers
|
||||
- 14:00 - 14:30: Pause
|
||||
- 14:30 - 15:30: Tobias und Philip Weise getroffen. Gespraech zu Kinderhaus/ Nivus/ Messschacht. Tobias Telefonat mir Herrn Fissl. -> Geraete waren zeitweise aus
|
||||
- 15:30 - 17:00: Dokumentation fuer mx server setzen und it glue und auf nextcloud. Landing Page weiter bearbeiten.
|
||||
|
||||
## Timestamps (Tuesday 20250805)
|
||||
|
||||
- 12:15 - 12:30: 03Arch kein Internet? Pruefe Ruckus Dubag APs; komische WiFi Settings. Plane s2s zu shz haupt fw
|
||||
|
||||
## Timestamps (Monday 20250804)
|
||||
|
||||
- 08:45 - 09:15: SSR: Projekt Pro SSL Zertifikate vereitstellen
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
0
diary/2025-08-10.md
Normal file
0
diary/2025-08-10.md
Normal file
89
diary/2025-08-11.md
Normal file
89
diary/2025-08-11.md
Normal file
@@ -0,0 +1,89 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: OPNsense: Doku fuer Update von OPNsense Cluster
|
||||
- [ ] sbx: OPNsense: Doku how to add new public IP
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] SHZ: Setze S2S Tunnel zu uns auf und teste Verfuegbarkeit
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
|
||||
- [x] TU: Updates aller VMs -> Firewall freigabe einrichten -> fehlgeschlagen
|
||||
- [ ] RCM: 24 Port Switch Angebot schicken -> Am Montag Sebastian fragen
|
||||
- [=] cqse: opnsense cluster aufsetzen
|
||||
- [x] phytron: nextcloud smtp server -> spf record fehlt noch
|
||||
- [ ] apsa: nextcloud user/folder autocreate
|
||||
|
||||
- [ ] GG: freeradius: accounting mit sql; mdns in neue netze zufuegen; udp broadcast relay nochmal testen
|
||||
|
||||
## Timestamps (Wednesday 20250813)
|
||||
|
||||
- 10:00 - 10:30: Analyse warum mdnsproxy down. -> Netze nicht mehr vorhanden. freeradius starten
|
||||
|
||||
## Timestamps (Tuesday 20250812)
|
||||
|
||||
- 08:45 - 09:00: Pruefe Gate Garching Verfuegbarkeit
|
||||
- 09:00 - 09:30: wollmann ninja agent installieren. cqse vorbereiten
|
||||
- 09:30 - 09:45: Telefonat mit Nina Schiffel. PP Zertifikate einbinden
|
||||
- 09:45 - 10:15: Wollmann Server fertig vorbereiten
|
||||
- 10:15 - 12:00: OPNsense Cluster
|
||||
- 12:00 - 13:00: Pause
|
||||
- 13:00 - 16:30: OPNsesen Cluster. CARP konfigurieren. 2x WAN (temp sbx und buero public ip), MGMT. Teste Verbindung. Richte erstes VLAN ein: Auch CARP und VIP notwendig
|
||||
|
||||
## Timestamps (Monday 20250811)
|
||||
|
||||
- 09:15 - 09:45: Ticketpflege
|
||||
- 09:45 - 10:15: NeoSPhere Termin festelgen, Sebastian schreiben wegen RCM Switch. Mails schreiben an Frau Pfeiffer und Frau Tiling
|
||||
- 10:15 - 10:45: FreeRadius Server weitermachen
|
||||
- 10:45 - 17:00: Radius Server
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
0
diary/2025-08-12.md
Normal file
0
diary/2025-08-12.md
Normal file
0
diary/2025-08-13.md
Normal file
0
diary/2025-08-13.md
Normal file
73
diary/2025-08-14.md
Normal file
73
diary/2025-08-14.md
Normal file
@@ -0,0 +1,73 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: OPNsense: Doku fuer Update von OPNsense Cluster
|
||||
- [ ] sbx: OPNsense: Doku how to add new public IP in Cluster
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
|
||||
- [ ] RCM: 24 Port Switch Angebot schicken -> Am Montag Sebastian fragen
|
||||
- [x] phytron: nextcloud smtp server -> spf record fehlt noch
|
||||
- [ ] apsa: nextcloud user/folder autocreate. Schicke Datenschutz an Beauftragten
|
||||
- [ ] SSR/KWA: Fuechsle anschreiben
|
||||
|
||||
- [ ] GG: freeradius: accounting mit sql; mdns in neue netze zufuegen; udp broadcast relay nochmal testen -> installiere packetfence
|
||||
|
||||
## Timestamps (Tuesday 20250819)
|
||||
|
||||
|
||||
- 14:30 - 15:30: Ticketpflege; cqse bilder in itglue pflegen;
|
||||
- 15:30 - 16:00: Mail an cqse (hummel)
|
||||
- 16:00 - 16:30: KWA: Passwoerter fuer Apple Business Manager und Starface raussuchen, auf NAS hinterlegen und dahingehend Seb. Peter informieren;
|
||||
- 16:30 - 17:00: OPNsense Standard in IT-Glue hinterlegen
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
0
diary/2025-08-16.md
Normal file
0
diary/2025-08-16.md
Normal file
0
diary/2025-08-17.md
Normal file
0
diary/2025-08-17.md
Normal file
0
diary/2025-08-19.md
Normal file
0
diary/2025-08-19.md
Normal file
70
diary/2025-08-20.md
Normal file
70
diary/2025-08-20.md
Normal file
@@ -0,0 +1,70 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: OPNsense: Doku fuer Update von OPNsense Cluster
|
||||
- [ ] sbx: OPNsense: Doku how to add new public IP in Cluster
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] GG: FreeRADIUS Server aufsetzen fuer neues BYOD network
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
|
||||
- [ ] RCM: 24 Port Switch Angebot schicken -> Am Montag Sebastian fragen
|
||||
- [x] phytron: nextcloud smtp server -> spf record fehlt noch
|
||||
|
||||
- [ ] GG: freeradius: accounting mit sql; mdns in neue netze zufuegen; udp broadcast relay nochmal testen -> installiere packetfence
|
||||
|
||||
- [x] CQSE schreiben wegen ipv6
|
||||
- [x] Projekte notieren
|
||||
- [ ] APSA Nextcloud auto User Ordner und Datenschutz
|
||||
- [ ] kwa/ssr fuechsle schreiben
|
||||
- [ ] NeoSphere anfangen vorbereiten
|
||||
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
0
diary/2025-08-23.md
Normal file
0
diary/2025-08-23.md
Normal file
0
diary/2025-08-25.md
Normal file
0
diary/2025-08-25.md
Normal file
8
diary/2025-08-27.md
Normal file
8
diary/2025-08-27.md
Normal file
@@ -0,0 +1,8 @@
|
||||
|
||||
## TODO
|
||||
|
||||
- [=] neosphere vorbereiten
|
||||
- [=] gg: packetfence weiter konfigurieren
|
||||
- [x] pinux: hetzner dedicated server kaufen
|
||||
- [ ] pinux: gewerbe anmelden
|
||||
- [ ] sbx: aufgaben zum weitergeben raussuchen
|
||||
0
diary/2025-08-30.md
Normal file
0
diary/2025-08-30.md
Normal file
0
diary/2025-08-31.md
Normal file
0
diary/2025-08-31.md
Normal file
96
diary/2025-09-01.md
Normal file
96
diary/2025-09-01.md
Normal file
@@ -0,0 +1,96 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: OPNsense: Doku fuer Update von OPNsense Cluster
|
||||
- [ ] sbx: OPNsense: Doku how to add new public IP in Cluster
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
|
||||
- [x] phytron: nextcloud smtp server -> spf record fehlt noch
|
||||
|
||||
- [ ] GG: freeradius: accounting mit sql; mdns in neue netze zufuegen; udp broadcast relay nochmal testen -> installiere packetfence
|
||||
- [ ] GG: Radius mit Holger besprechen
|
||||
|
||||
- [=] APSA Nextcloud auto User Ordner und Datenschutz
|
||||
- [x] APSA: OPNsense Regeln abhaerten
|
||||
- [ ] kwa/ssr fuechsle schreiben
|
||||
|
||||
## Timestamps (Wednesday 20250903)
|
||||
|
||||
- 08:30 - 09:00: Gespraech mit Kollegen zu aktuellem Stand. Breefing nach Abwesenheit
|
||||
- 09:00 - 09:15: Panik wegen 03Arch: USV Sturtzt ab. Schalte USV ab? Relax; it's just a brown out.
|
||||
- 09:15 - 09:30: Gespraech mit Saulius und Michael zu Wollmann Server. Neuer Serverrack aufgebaut. Server physisch aufgebaut. PVE Host laeuft
|
||||
- 09:30 - 09:45: Mails sortieren
|
||||
- 09:45 - 10:00: Thilo briefen zu NeoSphere Projekt
|
||||
- 10:00 - 10:30: APSA: Nextcloud impersonate plugin installieren und testen, Frau Tiling eine Mail schreiben
|
||||
- 10:30 - 10:45: APSA: Firewall Aliases und Categories setzen
|
||||
- 10:45 - 11:00: Gespraech mit Holger zu Oberhaching Sophos und NeoSphere Hypervisor
|
||||
- 11:00 - 11:30: freeradius/packetfence.
|
||||
- 11:30 - 12:00: NeoSphere. Erstelle User in Beszel. Hinterlege in IT-GLue. Skript zum Neustart udn Update der Container
|
||||
- 12:00 - 13:00: Pause
|
||||
- 13:00 - 14:00: Physio
|
||||
- 14:00 - 14:15: Mail an Bjoern: MMseqs2 installation
|
||||
- 14:15 - 14:30: Gespraech mit Holger zu OPNsense und Proxmox Schulungen
|
||||
- 14:30 - 15:15:
|
||||
- 15:15 - 15:45: Privat. AOK Unfalldokument ausfuellen
|
||||
-
|
||||
|
||||
## Timestamps (Tuesday 20250902)
|
||||
|
||||
- 09:15 - 09:45: Gespraech mit Marko
|
||||
- 09:45 - 10:15: Ticketpfelge NeoSphere und Mail
|
||||
- 10:15 - 10:45: Meeting mit Holger und Marko zu: GG FreeRadius Thematik, APSA Nextcloud, NeoSphere Hypervisor
|
||||
- 10:45 - 11:00: Beamer test, Gespraech mit Marko zu offenen Themen
|
||||
- 11:00 - 11:15: Telefonat mit Oliver zu TUM Termin, GG Radius, NeoSphere, Wohlbefinden
|
||||
- 11:15 - 12:30: Packetfence versuchen zum laufen zu bringen
|
||||
- 12:30 - 13:00: Pause
|
||||
- 13:00 - 16:30: Verzweifeln an PacketFence/FreeRADIUS
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
0
diary/2025-09-03.md
Normal file
0
diary/2025-09-03.md
Normal file
109
diary/2025-09-04.md
Normal file
109
diary/2025-09-04.md
Normal file
@@ -0,0 +1,109 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: OPNsense: Doku fuer Update von OPNsense Cluster
|
||||
- [ ] sbx: OPNsense: Doku how to add new public IP in Cluster
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
|
||||
- [x] phytron: nextcloud smtp server -> spf record fehlt noch
|
||||
|
||||
- [ ] GG: freeradius: accounting mit sql; mdns in neue netze zufuegen; udp broadcast relay nochmal testen -> installiere packetfence
|
||||
- [ ] GG: Radius mit Holger besprechen
|
||||
|
||||
- [=] APSA Nextcloud auto User Ordner und Datenschutz
|
||||
- [x] APSA: OPNsense Regeln abhaerten
|
||||
- [ ] kwa/ssr fuechsle schreiben
|
||||
|
||||
## Timestamps (Thursday 20250904)
|
||||
|
||||
- 09:00 - 09:15: Erstgespraech mit Tobias und Thom
|
||||
- 09:15 - 09:30: K&P im CRC besuchen
|
||||
- 09:30 - 10:00: Gespraech mit Tobias und Tom zu Termin bei RCM und offenen Themen
|
||||
- 10:00 - 12:00: Meeting mit RCM
|
||||
- 12:00 - 13:00: Pause
|
||||
- 13:00 - 14:00: Gespraech mit Oli und mit Bjoern von NeoSphere
|
||||
- 14:00 - 15:00: Gespraech mit Tom und Philip
|
||||
- 15:00 - 16:30: NeoSphere. Passe netplan conf an. Reboot. Ninja Agent Installation. Kommunikation mit Bjoern Schwalb
|
||||
|
||||
|
||||
## Timestamps (Wednesday 20250903)
|
||||
|
||||
- 08:30 - 09:00: Gespraech mit Kollegen zu aktuellem Stand. Breefing nach Abwesenheit
|
||||
- 09:00 - 09:15: Panik wegen 03Arch: USV Sturtzt ab. Schalte USV ab? Relax; it's just a brown out.
|
||||
- 09:15 - 09:30: Gespraech mit Saulius und Michael zu Wollmann Server. Neuer Serverrack aufgebaut. Server physisch aufgebaut. PVE Host laeuft
|
||||
- 09:30 - 09:45: Mails sortieren
|
||||
- 09:45 - 10:00: Thilo briefen zu NeoSphere Projekt
|
||||
- 10:00 - 10:30: APSA: Nextcloud impersonate plugin installieren und testen, Frau Tiling eine Mail schreiben
|
||||
- 10:30 - 10:45: APSA: Firewall Aliases und Categories setzen
|
||||
- 10:45 - 11:00: Gespraech mit Holger zu Oberhaching Sophos und NeoSphere Hypervisor
|
||||
- 11:00 - 11:30: freeradius/packetfence.
|
||||
- 11:30 - 12:00: NeoSphere. Erstelle User in Beszel. Hinterlege in IT-GLue. Skript zum Neustart udn Update der Container
|
||||
- 12:00 - 13:00: Pause
|
||||
- 13:00 - 14:00: Physio
|
||||
- 14:00 - 14:15: Mail an Bjoern: MMseqs2 installation
|
||||
- 14:15 - 14:30: Gespraech mit Holger zu OPNsense und Proxmox Schulungen
|
||||
- 14:30 - 15:15:
|
||||
- 15:15 - 15:45: Privat. AOK Unfalldokument ausfuellen
|
||||
- 15:45 - 17:00
|
||||
- 17:00 - 17:30: Meeting mit Holger und Oliver zu Radius bei GG
|
||||
|
||||
## Timestamps (Tuesday 20250902)
|
||||
|
||||
- 09:15 - 09:45: Gespraech mit Marko
|
||||
- 09:45 - 10:15: Ticketpfelge NeoSphere und Mail
|
||||
- 10:15 - 10:45: Meeting mit Holger und Marko zu: GG FreeRadius Thematik, APSA Nextcloud, NeoSphere Hypervisor
|
||||
- 10:45 - 11:00: Beamer test, Gespraech mit Marko zu offenen Themen
|
||||
- 11:00 - 11:15: Telefonat mit Oliver zu TUM Termin, GG Radius, NeoSphere, Wohlbefinden
|
||||
- 11:15 - 12:30: Packetfence versuchen zum laufen zu bringen
|
||||
- 12:30 - 13:00: Pause
|
||||
- 13:00 - 16:30: Verzweifeln an PacketFence/FreeRADIUS
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
97
diary/2025-09-05.md
Normal file
97
diary/2025-09-05.md
Normal file
@@ -0,0 +1,97 @@
|
||||
|
||||
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||
|
||||

|
||||
|
||||
### SSR offene Themen
|
||||
|
||||
- [ ] Domaenen umziehen
|
||||
|
||||
### TODO
|
||||
|
||||
- [ ] bgsm: anleitung um neue nutzerinnen zu erstellen
|
||||
|
||||
- [ ] sbx: powershell script to clean `C:\Temp` folder on Windows machines
|
||||
- [ ] sbx: Nextcloud Updates
|
||||
- [ ] sbx: Doku fuer OPNsense User Portal
|
||||
- [ ] sbx: OPNsense: Doku fuer Update von OPNsense Cluster
|
||||
- [ ] sbx: OPNsense: Doku how to add new public IP in Cluster
|
||||
- [ ] sbx: Ninja: Custom Field to monitor specific Services
|
||||
- [ ] sbx: Generall ansible-nextcloud-role
|
||||
- [ ] sbx: PVE. Terraform. Automate VM deployment
|
||||
|
||||
- [ ] KWA: Margit Bosch Outlook fragt immer wieder nach schluesselbund.
|
||||
- [ ] KWA: kontakte in busycontacts bis mittwoch klaeren
|
||||
- [ ] KWA/SSR: Installationsdateien in IT-Glue hinterlegen
|
||||
|
||||
- [ ] APSA: Backup Loesung fuer Cloud??
|
||||
|
||||
- [ ] NeoSphere: identity management server -> neuer Hypervisor Server.
|
||||
|
||||
#### TODAY
|
||||
|
||||
- [ ] KWA/SSR: APN renewal
|
||||
|
||||
- [x] phytron: nextcloud smtp server -> spf record fehlt noch
|
||||
|
||||
- [ ] GG: freeradius: accounting mit sql; mdns in neue netze zufuegen; udp broadcast relay nochmal testen -> installiere packetfence
|
||||
- [ ] GG: Radius mit Holger besprechen
|
||||
|
||||
- [=] APSA Nextcloud auto User Ordner und Datenschutz
|
||||
- [x] APSA: OPNsense Regeln abhaerten
|
||||
- [ ] kwa/ssr fuechsle schreiben
|
||||
|
||||
- [ ] apsa schreiben
|
||||
- [ ] linux standards definieren und itglue
|
||||
- [ ] opnsense: anleitung: opnsense cluster update
|
||||
|
||||
## Timestamps (Friday 20250905)
|
||||
|
||||
- 09:00 - 10:00: Physio Therapie
|
||||
- 10:00 - 11:00: Meeting mit Kirsten, Thilo und Max zu M365 bei KWA und SSR
|
||||
- 11:00 - 11:15: NeoSphere. Python venv laesst sich an neuem Ort nicht ausfuehren
|
||||
- 11:15 - 11:30: Ticketfplege
|
||||
- 11:30 - 11:45: Kommunikation mit Holger und Bjoern, um Meeting auszumachen
|
||||
- 11:45 - 12:30: Ticketfplege
|
||||
- 12:30 - 13:30: Pause
|
||||
- 13:30 - 14:45: Ticketpflege
|
||||
- 14:45 - 15:15: Gespraech mit Holger zu Studio2010
|
||||
- 15:15 - 15:45: Bearbeitung Warnungen Linux Server
|
||||
- 15:45 - 16:15: APSA: Mail an Frau Tiliing. Suche Vertrag mit BlueChip raus. Schreibe Mail an Herrn Krischke zu Datenschutzfragen
|
||||
- 16:15 - 17:00: Update OPNsense Cluster bei CQSE
|
||||
|
||||
## Timestamps (Thursday 20250904)
|
||||
|
||||
|
||||
- 13:00 - 14:00: Gespraech mit Oli und mit Bjoern von NeoSphere
|
||||
|
||||
- 15:00 - 16:30: NeoSphere. Passe netplan conf an. Reboot. Ninja Agent Installation. Kommunikation mit Bjoern Schwalb
|
||||
|
||||
## Timestamps (Wednesday 20250903)
|
||||
|
||||
- 13:00 - 14:00: Physio
|
||||
- 14:00 - 14:15: [x] Mail an Bjoern: MMseqs2 installation
|
||||
- 14:30 - 17:00:
|
||||
|
||||
## todo
|
||||
|
||||
### General
|
||||
|
||||
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||
|
||||
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||
|
||||
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||
- [ ] kwa/ssr snmp karten fuer usv
|
||||
- [ ] update filewave admin und central
|
||||
|
||||
### SBX
|
||||
|
||||
- [ ] backup on external drive for pve.lab.softbox.net
|
||||
|
||||
- [ ] check if possible to monitor vsphere passwd expiration
|
||||
- [ ] create obsidian templates (Meetings, People, )
|
||||
- [ ] sbx - opsreportcard summary for action plan
|
||||
|
||||
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||
- [ ] erstelle connectsecure report fuer grasslfing
|
||||
BIN
files/gg/Pasted image 20250727185114.png
Normal file
BIN
files/gg/Pasted image 20250727185114.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 2.4 MiB |
BIN
projects/.DS_Store
vendored
BIN
projects/.DS_Store
vendored
Binary file not shown.
27
projects/20250729-current-projects.md
Normal file
27
projects/20250729-current-projects.md
Normal file
@@ -0,0 +1,27 @@
|
||||
|
||||
|
||||
## One Time
|
||||
|
||||
| Firma | Projekt | Termin | Zeitaufwand | DONE | Mitarbeiter | Kommentar |
|
||||
| --------------- | ------------------------------------- | ------------------------------------- | ----------- | ---- | ------------------ | -------------------- |
|
||||
| CQSE | FW Migration - SG -> OPNsense Cluster | 18.08 - 20.08 | 3 Tage | 2% | me | |
|
||||
| NeoSphere | AI Server HW + SW Setup | | 2-3 Tage | 10% | Alijah + Maxi + me | 2x GPUs, 25 Gbit NIC |
|
||||
| Gym Oberhaching | FW Migration - SG - XGS Cluster | Sommerferien: 04.08.2025 - 15.09.2025 | 4 min Tage | 2% | Saulius (+ me) | Scheisse |
|
||||
| APSA | Nextcloud in Bluechip Cloud | | 2 Tage | 80% | me | Dringend |
|
||||
| GG | FreeRADIUS Server | 29.07 - 01.08 | 5 Tage | 40% | Marko + me | Ruckus + MS AD |
|
||||
| GG | mDNS Proxy | 29.07 - 01.08 | 3 Tage | 80% | Marko + me | Linux Srv or Ruckus |
|
||||
| SBX | PVE Cluster - ZFS and Ceph | Abgabe 01.2026 | 5 Tage | 10% | Maxi - me | Betreuung |
|
||||
| TUM | local-only alert mail server | / | 2 Tage | 90% | me | |
|
||||
|
||||
## Ongoing
|
||||
|
||||
| Firma | Projekt | Termin | Zeitaufwand | Mitarbeiter | Kommentar |
|
||||
| ----- | ------------ | --------- | ----------- | ----------- | --------- |
|
||||
| TUM | Landing Page | Thursdays | | me | |
|
||||
|
||||
|
||||
## Ideas
|
||||
|
||||
- Schulungen fuer Proxmox (Ninja Agent, Grundlagen, Storage fragen, Clustering)
|
||||
- Schulungen zu OPNsense (Monitoring, Traffic Analysis)
|
||||
- Firewall Standards und Dokumentation
|
||||
@@ -1,13 +1,39 @@
|
||||
## 20250804 Meeting
|
||||
|
||||
- [x] admin userIn mit Zugang zu allem? Sonja Tiling
|
||||
- [x] Gruppen Anamnesepraktikum - ETH und - KJP , wenn Nutzer erstellt werden
|
||||
- [ ] Daten in Ihren eigenen spezifischen Ordnern. Hochladen und Anschauen. Download geht nicht. Allgemein files schon.
|
||||
- [x] Auf deutsch uebersetzen
|
||||
|
||||
## Umsetzung 20250729
|
||||
|
||||
- DNS (IONOS DNS Mgmt):
|
||||
- `gw-cloud.psychoanalyse-muenchen.de IN A 185.228.9.37`
|
||||
- `ambulanz.psychoanalyse-muenchen.de CNAME gw-cloud`
|
||||
- DMZ: 192.168.50.10/24, gw: 192.168.50.1
|
||||
- Hostname: cloud.psychoanalyse.local
|
||||
- spf record: `TXT ambulanz "v=spf1 ip4:185.228.9.37/32 -all"`
|
||||
|
||||
## Umsetzung 20250730
|
||||
|
||||
- [x] ACME auf pfSense fuer SSL certs
|
||||
- [x] HA Proxy fuer Reverse Proxying
|
||||
- [x] APSA Design
|
||||
- [x] go though all errors and warnings
|
||||
- [x] Change defaults files and folder for new users
|
||||
- [x] Create user groups (and plugins)
|
||||
- [ ] Create folder structure
|
||||
- [x] Change language to german (LAST STEP!!) -> nc automatically uses the language of the browser
|
||||
|
||||
## Recherche
|
||||
|
||||
### Resources VM
|
||||
|
||||
- [ ] 2x CPU
|
||||
- [ ] 4 GB RAM
|
||||
- [ ] 50 GB Storage
|
||||
- [ ] Needs Private IP and DMZ IP (DMZ needs to be bought and integrated into existing Virtual Private Cloud)
|
||||
- [ ] hostname: cloud; private IP: 172.17.3.30, dmz IP
|
||||
- [x] 2x CPU
|
||||
- [x] 4 GB RAM
|
||||
- [x] 50 GB Storage
|
||||
- [x] Needs Private IP and DMZ IP (DMZ needs to be bought and integrated into existing Virtual Private Cloud)
|
||||
- [x] hostname: `cloud.psychoanalyse.local`; private IP: `172.17.3.30`, dmz IP
|
||||
- [ ] up to 50 users
|
||||
|
||||
### Kosten
|
||||
@@ -79,9 +105,10 @@
|
||||
8. Ordner KJP mit drei bis drei Unterordnern (Absage, nicht erreicht, Terminvereinbarung/Anamnese) - nur Zugriff Sekretariat
|
||||
9. Ordner SKEPT mit zwei Unterordnern (Absage, Terminvereinbarung) - nur Zugriff Sekretariat
|
||||
**Prozess 2 – Patientenzuteilung Anamnesenpraktikanten – optional:**
|
||||
Ca. 40 Ordner > je einer pro Nutzer – schwankend je nach Beginn/Ende einzelner Praktika
|
||||
Ca. 40 Ordner > je einer pro Nutzer – schwankend je nach Beginn/Ende einzelner Praktika -> automatisch Ordner erzeugen lassen
|
||||
**Prozess 3 – Zulieferung Supervisionswechsel – optional:**
|
||||
1 Ordner zum reinen Upload (keine Einsicht) für 60 Therapiepraktikanten
|
||||
|
||||
### genaue vorgesehene Funktionalität (mehr als Up- und Downloads über Portal-Webseite?)
|
||||
1. anonyme Uploadfunktion für Prozess 1 über Website und Prozess 3 über an Ausbildungsteilnehmer versendeten Link
|
||||
2. Ambulanzleiter bekommen Zugriff auf Anmeldeformulare in ihrem Ornder, können diese ansehen, die Datei kommentieren und in entsprechende Unterordner verschieben.
|
||||
|
||||
@@ -5,3 +5,86 @@
|
||||
|
||||
## General
|
||||
|
||||
- Interfaces need to be defined on each device. They are not synced
|
||||
|
||||
|
||||
## Current Firewall
|
||||
|
||||
| Name | Ethernet | VLAN | Network | Gateway | DHCP | Comment |
|
||||
| -------------- | -------- | ---- | ---------------- | --------------- | --------------------------------- | ------------------- |
|
||||
| WAN | eth1 | none | 62.245.142.26/29 | 62.245.142.25 | none | Mnet 500 Mbit Fiber |
|
||||
| LAN | eth0 | 1 | 172.22.0.0/22 | 172.22.3.254 | 172.22.0.10 - 172.22.3.199 | |
|
||||
| GA | eht2 | 400 | 172.22.4.0/24 | 172.22.4.254 | 172.22.4.100 - 172.22.4.199 | Gebaeudeautomation |
|
||||
| DMZ | eth4 | none | 172.22.5.0/24 | 172.22.5.254 | | DMZ? |
|
||||
| Homematic | eht2 | 600 | 172.22.6.0/24 | 172.22.6.254 | 172.22.6.100 - 172.22.6.199 | Home? |
|
||||
| W-LAN CQSE_VPN | eth2 | 147 | 192.168.147.0/24 | 192.168.147.254 | 192.168.147.100 - 192.168.147.199 | Was |
|
||||
| | eht3 | | | | | HA Sync if |
|
||||
|
||||
## New Firewall
|
||||
|
||||
|
||||
| Name | Ethernet | VLAN | Network | Gateway | DHCP | Comment |
|
||||
| -------------- | ------------ | ---- | ------------------- | --------------- | --------------------------------- | ------------------- |
|
||||
| WAN | igc1 | none | 62.245.142.26-27/29 | 62.245.142.25 | none | Mnet 500 Mbit Fiber |
|
||||
| LAN | igc0 | 1 | 172.22.0.0/22 | 172.22.3.254 | 172.22.0.10 - 172.22.3.199 | |
|
||||
| GA | parent: igc2 | 400 | 172.22.4.0/24 | 172.22.4.254 | 172.22.4.100 - 172.22.4.199 | Gebaeudeautomation |
|
||||
| DMZ | igc3 | none | 172.22.5.0/24 | 172.22.5.254 | | DMZ? |
|
||||
| Homematic | parent: igc2 | 600 | 172.22.6.0/24 | 172.22.6.254 | 172.22.6.100 - 172.22.6.199 | Home? |
|
||||
| W-LAN CQSE_VPN | parent: igc2 | 147 | 192.168.147.0/24 | 192.168.147.254 | 192.168.147.100 - 192.168.147.199 | Was |
|
||||
| | ax0 | | 10.0.0.0/31 | / | / | HA Sync if |
|
||||
|
||||
|
||||
## WAN
|
||||
|
||||
- External WAN: 62.245.142.26/29
|
||||
- WAN gateway: 62.245.142.25
|
||||
- WAN broadcast: 62.245.142.31
|
||||
- WAN not-used addresses: 62.245.142.27-30
|
||||
|
||||
## OPNsense Cluster
|
||||
|
||||
### Master
|
||||
|
||||
MGMT: 172.22.3.252/24
|
||||
WAN: 62.245.142.28/29
|
||||
WANsbx: 10.11.12.2/24
|
||||
pfSync: 10.0.0.1/31
|
||||
|
||||
### Slave
|
||||
|
||||
MGMT: 172.22.3.253/24
|
||||
WAN: 62.245.142.27/29
|
||||
WANsbx: 10.11.12.3/24
|
||||
pfSync: 10.0.0.2/31
|
||||
|
||||
### Virtual IP
|
||||
|
||||
WANsbx IP: 10.11.12.4/24
|
||||
WAN IP: 62.245.142.26/29
|
||||
LAN IP address: 172.22.3.254/24
|
||||
|
||||
## Switches
|
||||
|
||||
### cqse-sw-1og-1.cqse.lan
|
||||
|
||||
- IP: 172.22.3.200
|
||||
- untagged in MGMT VLAN
|
||||
- carries 3 VLANs on igc2: GA, Homematic, WLAN-CQSE_VPN
|
||||
- Trk1: 49-50 (Sw2Sw Trunk)
|
||||
- Port 1: Sophos Node1 eth0
|
||||
- Port 2: Sophos Node2 eth0
|
||||
- Port 3: Sophos Node1 eth2
|
||||
- Port 4: Sophos Node2 eth2
|
||||
|
||||
### cqse-sw-1og-2.cqse.lan
|
||||
|
||||
- IP: 172.22.3.201
|
||||
- untagged in MGMT VLAN
|
||||
- carries 3 VLANs on igc2: GA, Homematic, WLAN-CQSE_VPN
|
||||
- Trk1: 49-50 (Sw2Sw Trunk)
|
||||
|
||||
### cqse-sw-3.cqse.lan
|
||||
|
||||
- IP: 172.22.5.200
|
||||
- All ports in DMZ
|
||||
|
||||
|
||||
48
projects/cqse/fw-migration/20250818-migration.md
Normal file
48
projects/cqse/fw-migration/20250818-migration.md
Normal file
@@ -0,0 +1,48 @@
|
||||
## general
|
||||
|
||||
|
||||
## 20250819 Vor Ort
|
||||
|
||||
### Fragen
|
||||
|
||||
- esxi?
|
||||
- Cloud key?
|
||||
- dmz switch?
|
||||
|
||||
### WiFi
|
||||
|
||||
SSID: CQSE
|
||||
Pass: iaKqhunm0P
|
||||
|
||||
### Location
|
||||
|
||||
- Freiham. Centa-Hafenbrädl-Straße 59
|
||||
|
||||
## Pre TODO
|
||||
|
||||
- [x] Firewall Aliases
|
||||
- [x] Firewall Rules
|
||||
- [x] Firewall NAT
|
||||
- [x] MGMT VPN for sbx
|
||||
- [x] DNS Config
|
||||
- [x] DHCP config (static mappings)
|
||||
- [x] ACME config
|
||||
- [x] (optional) IPS/IDS
|
||||
|
||||
## TODO
|
||||
|
||||
- [x] Set VIPs for all Interfaces
|
||||
- [x] switch belegung pruefen.
|
||||
- [x] Firewall beschriften
|
||||
- ~MFA setzen (?)~
|
||||
- [x] root ausschalten
|
||||
|
||||
## After TODO
|
||||
|
||||
- [x] ACME: issue certs.
|
||||
- [x] Check IPS/IDS
|
||||
- [x] OPNcentral: connect
|
||||
- [ ] OPNcentral: Backups konfigurieren
|
||||
- [x] dns verwaltung -> liegt bei google -> schreibe Herrn Hummel deshalb
|
||||
- [ ] anleitung - opnsense cluster update
|
||||
- [ ] opnsense standard in itglue hinterlegen
|
||||
1
projects/cqse/fw-migration/opnsense-licenses.json
Normal file
1
projects/cqse/fw-migration/opnsense-licenses.json
Normal file
@@ -0,0 +1 @@
|
||||
[{"value":"b2670a5d-78c0-4ac0-8823-f7c01e422196","sku":"DEC2770EU","name":"DEC2770 - OPNsense\u00ae Rack Security Appliance - EU","training_voucher":"CBDEB4D39222CF0A05A082A8C7F57F"},{"value":"3406eae4-cd9b-421f-90ba-cf645d724bcb","sku":"DEC2770EU","name":"DEC2770 - OPNsense\u00ae Rack Security Appliance - EU","training_voucher":"1D579C5F442904A162017DD51F492C"}]
|
||||
0
projects/drei-v/20250728-iPhones-mdm.md
Normal file
0
projects/drei-v/20250728-iPhones-mdm.md
Normal file
7
projects/froschwollmann/20250808-proxmox-server.md
Normal file
7
projects/froschwollmann/20250808-proxmox-server.md
Normal file
@@ -0,0 +1,7 @@
|
||||
|
||||
|
||||
## Basis
|
||||
|
||||
- Hostname: srv-pve-01.wollmann.lan
|
||||
- IP Address: `192.168.75.15`
|
||||
- iLo IP Address: `192.168.75.16`
|
||||
4
projects/gg/20250806-network.md
Normal file
4
projects/gg/20250806-network.md
Normal file
@@ -0,0 +1,4 @@
|
||||
|
||||
|
||||
## Subnets
|
||||
|
||||
10
projects/gg/avahi_mdns-reflector/new-nets/20250813-main.md
Normal file
10
projects/gg/avahi_mdns-reflector/new-nets/20250813-main.md
Normal file
@@ -0,0 +1,10 @@
|
||||
|
||||
## Networks
|
||||
|
||||
- gg-lehrer, VLAN: 110, 10.10.115.254/22 (255.255.252.0)
|
||||
- gg-lehrer_byod, VLAN: 120: 10.10.120.254/24 (255.255.255.0)
|
||||
- gg-schueler-pc, VLAN: 125, 10.10.125.254/24 (255.255.255.0)
|
||||
- gg-schueler_byod: VLAN: 130, 10.10.135.254/22 (255.255.252.0)
|
||||
- gg-schueler_mdm, VLAN: 140, 10.10.143.254/22 (255.255.252.0)
|
||||
- gg-apple, VLAN: 150, 10.10.150.254/24 (255.255.255.0)
|
||||
- gg-beamer, VLAN: 155, 10.10.155.254/255.255.255.0
|
||||
@@ -0,0 +1,40 @@
|
||||
|
||||
## Now
|
||||
|
||||
- Probably MS Radius Server. -> Network Policy Server on gg-srv-pd-app-01
|
||||
|
||||
![[Pasted image 20250727185114.png]]
|
||||
- eap type: secured peap (proprietary?)
|
||||
- mschapv2 as second next
|
||||
|
||||
## TODO
|
||||
|
||||
- [x] ruckus network config
|
||||
- [x] network config
|
||||
- [x] Ruckus filter via username (identity + group). If user already connected with one device do not allow other device. Measure time -> next 8 hours device is connected and can not connect with other device
|
||||
- [x] test authentication with user not being in ldap group
|
||||
- [ ] Restrict user login to only one device at a time
|
||||
- [ ] Auto logout after 8h
|
||||
|
||||
## Notes
|
||||
|
||||
- MS AD makes things complicated
|
||||
- RADIUS does not get 'good password' from AD which it needs
|
||||
|
||||
## Questions
|
||||
|
||||
- Which authorization and authentication methods do the iPads use?
|
||||
- How should the system behave when the same user connects with different devices?
|
||||
- Do we track the used devices?
|
||||
- Are rules applied depending on the user or/and on the device?
|
||||
|
||||
## Resources
|
||||
|
||||
- [ruckus radius attributes](https://docs.commscope.com/bundle/fastiron-10010-securityguide/page/GUID-15CBE7F1-4898-4311-8A4E-28ED2268BD86.html)
|
||||
- <https://www.golinuxcloud.com/configure-freeradius-pap-chap-authentication/>
|
||||
- <https://www.freeradius.org/documentation/freeradius-server/3.2.8/concepts/modules/ldap/authentication.html>
|
||||
- <https://www.inkbridgenetworks.com/blog/blog-10/how-to-connect-freeradius-to-active-directory-for-authentication-105>
|
||||
- <https://www.inkbridgenetworks.com/blog/blog-10/can-you-use-freeradius-and-active-directory-together-121>
|
||||
- <https://cloudinfrastructureservices.co.uk/setup-freeradius-active-directory-authentication-integration/>
|
||||
- <https://nbailey.ca/post/peap-freeradius/>
|
||||
|
||||
|
||||
137
projects/gg/freeradius/20250726-setup_for_byod.md
Normal file
137
projects/gg/freeradius/20250726-setup_for_byod.md
Normal file
@@ -0,0 +1,137 @@
|
||||
|
||||
### **FreeRADIUS Setup for Student Network Access (IPv4-Only)**
|
||||
**Context:**
|
||||
- **FreeRADIUS Server IP:** `172.16.2.5`
|
||||
- **AD Server IP:** `172.16.2.10`
|
||||
- **Student VLAN:** `10.10.135.254/22` (ensure this VLAN is isolated and routed to the RADIUS server).
|
||||
- **Goal:**
|
||||
- Students authenticate via AD.
|
||||
- Prevent multiple devices per user (same credentials) from connecting.
|
||||
- Track connected devices per user.
|
||||
|
||||
---
|
||||
|
||||
### **1. FreeRADIUS Configuration (Key Sections)**
|
||||
#### **A. LDAP Authentication to AD**
|
||||
Edit `/etc/freeradius/3.0/sites-enabled/inner-tunnel` (or `default`):
|
||||
```ini
|
||||
ldap {
|
||||
server = "172.16.2.10" # AD Server IP
|
||||
base_dn = "DC=example,DC=com" # Replace with your domain
|
||||
bind_dn = "CN=radius,OU=ServiceAccounts,DC=example,DC=com" # AD service account
|
||||
bind_password = "your_ad_password" # AD service account password
|
||||
ldap_filter = "(sAMAccountName=%{User-Name})" # Query for user
|
||||
timeout = 5
|
||||
retry = 3
|
||||
start_tls = no
|
||||
}
|
||||
```
|
||||
- **Note:** Ensure the AD service account has read access to user attributes (e.g., `sAMAccountName`, `userPrincipalName`).
|
||||
|
||||
---
|
||||
|
||||
#### **B. Prevent Multiple Devices per User**
|
||||
Use the `Limit` directive to enforce **1 session per user**:
|
||||
```ini
|
||||
authorize {
|
||||
...
|
||||
Limit-User-Name {
|
||||
max = 1 # Max 1 session per user
|
||||
reject # Reject if limit is exceeded
|
||||
}
|
||||
}
|
||||
```
|
||||
- **How it works:**
|
||||
- The `Limit` directive checks the `User-Name` attribute.
|
||||
- If a user is already logged in, the second request is rejected.
|
||||
- **Limitations:**
|
||||
- Requires **persistent session tracking** (e.g., a database or file).
|
||||
- FreeRADIUS itself does not natively track active sessions.
|
||||
|
||||
#### **C. Track Connected Devices (Optional)**
|
||||
If you need to **track devices per user**, use a **database** (e.g., MySQL, PostgreSQL) or a **file** to store active sessions. Example:
|
||||
```ini
|
||||
authorize {
|
||||
...
|
||||
if (User-Name == "student1") {
|
||||
update {
|
||||
User-Name := "student1"
|
||||
Framed-IP-Address := "%{Framed-IP-Address}"
|
||||
Calling-Station-Id := "%{Calling-Station-Id}"
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
- **Store this data in a database** to check for duplicates.
|
||||
- Use `radacct` for accounting records (requires `accounting` section).
|
||||
|
||||
---
|
||||
|
||||
### **2. VLAN Configuration (Network Layer)**
|
||||
Ensure the **student VLAN** (`10.10.135.254/22`) is properly routed to the RADIUS server:
|
||||
- **NAS (Network Access Server):**
|
||||
- Configure the NAS to send the **`Framed-Interface-Id`** (VLAN ID) in the RADIUS request.
|
||||
- Example:
|
||||
```ini
|
||||
[nas]
|
||||
type = other
|
||||
shortname = NAS-Name
|
||||
secret = shared_secret
|
||||
framed-interface-id = 135 # VLAN ID
|
||||
```
|
||||
- **Firewall Rules:**
|
||||
- Allow traffic between the student VLAN and the RADIUS server (`172.16.2.5`).
|
||||
- Block unauthorized access to the VLAN.
|
||||
|
||||
---
|
||||
|
||||
### **3. NAS Configuration (Example: Cisco IOS)**
|
||||
If using a router as the NAS:
|
||||
```bash
|
||||
aaa authentication login default group radius local
|
||||
aaa authentication login default group radius
|
||||
aaa authorization network default group radius
|
||||
aaa accounting network default start-stop group radius
|
||||
|
||||
radius-server host 172.16.2.5 key your_shared_secret
|
||||
radius-server vsa send-template
|
||||
```
|
||||
- Ensure the NAS sends the **`Calling-Station-Id`** (MAC address) and **`Framed-IP-Address`** in the RADIUS request.
|
||||
|
||||
---
|
||||
|
||||
### **4. Testing and Debugging**
|
||||
1. **Test LDAP Authentication:**
|
||||
- Use `radtest` to simulate a login:
|
||||
```bash
|
||||
radtest student1 password 172.16.2.5 1812 testing123
|
||||
```
|
||||
2. **Check Logs:**
|
||||
- `/var/log/freeradius/radius.log` for authentication errors.
|
||||
3. **Monitor Active Sessions:**
|
||||
- Use `radwho` or a database query to list active users.
|
||||
|
||||
---
|
||||
|
||||
### **5. Advanced: Session Tracking with a Database**
|
||||
If you need precise tracking, set up a database (e.g., MySQL) with a table like:
|
||||
```sql
|
||||
CREATE TABLE active_sessions (
|
||||
username VARCHAR(255) PRIMARY KEY,
|
||||
ip_address VARCHAR(45),
|
||||
mac_address VARCHAR(45),
|
||||
session_id VARCHAR(255),
|
||||
timestamp TIMESTAMP DEFAULT CURRENT_TIMESTAMP
|
||||
);
|
||||
```
|
||||
- Update the RADIUS config to insert session data into the table.
|
||||
- Use a script to clean up old sessions (e.g., every 5 minutes).
|
||||
|
||||
---
|
||||
|
||||
### **Final Notes**
|
||||
- **Security:** Ensure the RADIUS secret and AD credentials are encrypted.
|
||||
- **Scalability:** For large deployments, use a **database** to track sessions.
|
||||
- **Fallback:** If the `Limit` directive is insufficient, use a **script** to check the database for active sessions and reject new ones.
|
||||
|
||||
This configuration ensures students authenticate via AD, prevents multiple devices per user, and isolates their VLAN for secure access.
|
||||
16
projects/gg/freeradius/20250728-FreeRADIUS-docs.md
Normal file
16
projects/gg/freeradius/20250728-FreeRADIUS-docs.md
Normal file
@@ -0,0 +1,16 @@
|
||||
|
||||
## Authenticating Users with LDAP
|
||||
|
||||
Please be aware the FreeRADIUS is an AAA server, and LDAP is a _database_. This separation of roles means that FreeRADIUS supports multiple kinds of authentication protocols such as `PAP`, `CHAP`, `MS-CHAP`, etc. An LDAP database supports only one authentication method: "bind as user". This authentication method is compatible only with PAP.
|
||||
|
||||
Our recommendation is to use LDAP as a database. FreeRADIUS should read the "known good" password from LDAP, and then use that information to authenticate the user. It is almost always wrong to use the LDAP "bind as user" method for authenticating users.
|
||||
|
||||
The only caveat to the above recommendation is Active Directory. For "security" reasons, Active Directory will not return the "known good" password to FreeRADIUS over a standard LDAP query. Therefore when Active Directory is used, the choices are:
|
||||
|
||||
PAP
|
||||
|
||||
- Use "bind as user"
|
||||
|
||||
[MS-CHAP::](https://github.com/FreeRADIUS/freeradius-server/blob/v3.2.x/raddb/mods-available/mschap) Use [`ntlm`](https://github.com/FreeRADIUS/freeradius-server/blob/v3.2.x/raddb/mods-available/ntlm_auth) and [`winbind`](https://github.com/FreeRADIUS/freeradius-server/blob/v3.2.x/raddb/mods-available/mschap) configuration.
|
||||
|
||||
Due to the limitations of Active Directory, There are unfortunately no other possible choices.
|
||||
@@ -0,0 +1,189 @@
|
||||
|
||||
To configure your **FreeRADIUS server** for **LDAP authentication** (via LDAPS) in your home lab, follow these steps. The configuration will ensure the Unifi Access Point (AP) can authenticate users against your LDAP server (AD) via the FreeRADIUS server.
|
||||
|
||||
---
|
||||
|
||||
### **1. Install Required Packages**
|
||||
Install **FreeRADIUS** and the necessary modules. Since you're using **FreeRADIUS 3.2.1**, ensure you install the correct version. On **Proxmox**, you can use `apt` or install via Docker.
|
||||
|
||||
#### **For Ubuntu/Debian (if using a VM or bare metal):**
|
||||
```bash
|
||||
sudo apt update
|
||||
sudo apt install freeradius freeradius-ldap freeradius-mysql
|
||||
```
|
||||
|
||||
#### **If using Docker (optional):**
|
||||
```bash
|
||||
docker run -d \
|
||||
--name freeradius \
|
||||
--network host \
|
||||
--restart unless-stopped \
|
||||
--volume /path/to/config:/etc/freeradius \
|
||||
--volume /path/to/ldap-cert:/etc/ssl/certs \
|
||||
--volume /path/to/mariadb:/var/lib/mysql \
|
||||
freeradius/freeradius:3.2.1
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
### **2. Configure FreeRADIUS to Use LDAP (LDAPS)**
|
||||
|
||||
#### **2.1. Edit `radiusd.conf`**
|
||||
Set the listening address to **IPv4 and IPv6**:
|
||||
```bash
|
||||
sudo nano /etc/freeradius/radiusd.conf
|
||||
```
|
||||
Update the following lines:
|
||||
```ini
|
||||
listen {
|
||||
ipaddr = 0.0.0.0
|
||||
port = 1812
|
||||
instance = main
|
||||
}
|
||||
|
||||
listen {
|
||||
ipaddr = ::
|
||||
port = 1812
|
||||
instance = main
|
||||
}
|
||||
```
|
||||
|
||||
#### **2.2. Configure LDAP Backend in `ldap` Module**
|
||||
Create or edit the LDAP configuration file:
|
||||
```bash
|
||||
sudo nano /etc/freeradius/ldap
|
||||
```
|
||||
Add the following (replace placeholders with your actual values):
|
||||
```ini
|
||||
ldap {
|
||||
server = ad.reliyya.xyz
|
||||
port = 6360
|
||||
timeout = 5
|
||||
bind = yes
|
||||
base_dn = DC=reliyya,DC=xyz
|
||||
filter = (objectClass=person)
|
||||
start_tls = yes
|
||||
ldap_tls_cafile = /etc/ssl/certs/ca-certificates.crt
|
||||
ldap_tls_cacertdir = /etc/ssl/certs
|
||||
ldap_tls_certfile = /etc/ssl/certs/client-cert.pem
|
||||
ldap_tls_keyfile = /etc/ssl/certs/client-key.pem
|
||||
}
|
||||
```
|
||||
|
||||
**Key Notes:**
|
||||
- `server` = DNS entry for your LDAP server (`ad.reliyya.xyz`).
|
||||
- `port` = LDAPS port (`6360`).
|
||||
- `start_tls = yes` enables TLS (if your LDAP server uses LDAPS).
|
||||
- If your LDAP server requires a certificate, specify `ldap_tls_cafile` or `ldap_tls_cacertdir`.
|
||||
|
||||
#### **2.3. Configure `ldap` Module in `radiusd.conf`**
|
||||
Enable the LDAP module:
|
||||
```bash
|
||||
sudo nano /etc/freeradius/radiusd.conf
|
||||
```
|
||||
Add this line under `[modules]`:
|
||||
```ini
|
||||
ldap
|
||||
```
|
||||
|
||||
#### **2.4. Configure `users` File (Optional)**
|
||||
If you want to test without LDAP, you can use a static user:
|
||||
```bash
|
||||
sudo nano /etc/freeradius/users
|
||||
```
|
||||
Add:
|
||||
```ini
|
||||
testuser Cleartext-Password := "password"
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
### **3. Configure Clients in `clients.conf`**
|
||||
Set up the Unifi controller as a client:
|
||||
```bash
|
||||
sudo nano /etc/freeradius/clients.conf
|
||||
```
|
||||
Add:
|
||||
```ini
|
||||
client unifi-controller {
|
||||
ipaddr = 10.56.0.0/24
|
||||
secret = your_shared_secret
|
||||
require_client_certificate = no
|
||||
}
|
||||
```
|
||||
Replace `your_shared_secret` with a secure password (same on Unifi controller).
|
||||
|
||||
---
|
||||
|
||||
### **4. Test LDAP Connectivity**
|
||||
Verify the LDAP server is reachable:
|
||||
```bash
|
||||
ldapsearch -x -H ldaps://ad.reliyya.xyz:6360 -b "DC=reliyya,DC=xyz" -D "CN=testuser,DC=reliyya,DC=xyz" -w password
|
||||
```
|
||||
Replace `testuser` and `password` with a valid LDAP user.
|
||||
|
||||
---
|
||||
|
||||
### **5. Test FreeRADIUS Authentication**
|
||||
Use `radtest` to test authentication:
|
||||
```bash
|
||||
radtest testuser password 10.56.1.251 0 testing123
|
||||
```
|
||||
If successful, you'll see:
|
||||
```
|
||||
Sending Access-Request of type Auth-Request
|
||||
...
|
||||
Access-Accept
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
### **6. Configure Unifi Controller to Use FreeRADIUS**
|
||||
1. Log in to the Unifi controller web UI.
|
||||
2. Navigate to **Network > Radius**.
|
||||
3. Add a new RADIUS server:
|
||||
- **Name**: `radius.reliyya.xyz`
|
||||
- **IP Address**: `radius.reliyya.xyz` (DNS entry)
|
||||
- **Port**: `1812` (Authentication), `1813` (Accounting)
|
||||
- **Shared Secret**: `your_shared_secret`
|
||||
- **NAS ID**: `unifi-controller`
|
||||
4. Save and test the connection.
|
||||
|
||||
---
|
||||
|
||||
### **7. Optional: Set Up MariaDB for Session Tracking**
|
||||
If you want to store session data:
|
||||
1. Install MariaDB:
|
||||
```bash
|
||||
sudo apt install mariadb-server
|
||||
```
|
||||
2. Configure `radiusd.conf` to use MySQL:
|
||||
```bash
|
||||
sudo nano /etc/freeradius/radiusd.conf
|
||||
```
|
||||
Add:
|
||||
```ini
|
||||
mysql
|
||||
```
|
||||
3. Configure `sql` module in `radiusd.conf`:
|
||||
```bash
|
||||
sudo nano /etc/freeradius/sql.conf
|
||||
```
|
||||
Set the database connection details and table schema.
|
||||
|
||||
---
|
||||
|
||||
### **8. Security Considerations**
|
||||
- Ensure **TLS is enforced** for LDAPS.
|
||||
- Use **strong secrets** for RADIUS and LDAP.
|
||||
- Restrict access to the FreeRADIUS server via OPNsense firewall.
|
||||
|
||||
---
|
||||
|
||||
### **Summary**
|
||||
- **Packages**: `freeradius`, `freeradius-ldap`, `freeradius-mysql`
|
||||
- **Key Config Files**: `radiusd.conf`, `ldap`, `clients.conf`, `users`
|
||||
- **LDAP Server**: Use `ad.reliyya.xyz:6360` with TLS
|
||||
- **Unifi Controller**: Point to `radius.reliyya.xyz` with shared secret
|
||||
|
||||
Let me know if you need help with certificate setup or advanced LDAP filters! 🚀
|
||||
134
projects/gg/freeradius/homelab/20250726-tls_certs_peap.md
Normal file
134
projects/gg/freeradius/homelab/20250726-tls_certs_peap.md
Normal file
@@ -0,0 +1,134 @@
|
||||
|
||||
The error **"TLS Alert: fatal: unknown CA"** indicates that the client (your phone) is trying to establish a **TLS connection** with the FreeRADIUS server, but it **cannot verify the server's certificate** because the **CA (Certificate Authority)** is not trusted. This is a **common issue when using PEAP (Protected Extensible Authentication Protocol)** with TLS. Let's fix it step by step.
|
||||
|
||||
---
|
||||
|
||||
### **1. Understand the Root Cause**
|
||||
- **PEAP (PEAP-MSCHAPv2)** requires **TLS** for secure communication.
|
||||
- Your phone is trying to connect to the FreeRADIUS server using **PEAP**, but the server is not presenting a **trusted certificate**.
|
||||
- The client (phone) is not trusting the **CA** that signed the server's certificate.
|
||||
|
||||
---
|
||||
|
||||
### **2. Fix: Configure TLS for PEAP on FreeRADIUS**
|
||||
You need to **set up a valid TLS certificate** for the FreeRADIUS server. Here's how:
|
||||
|
||||
#### **A. Generate a Self-Signed Certificate (For Testing)**
|
||||
If you're in a testing environment, you can create a **self-signed certificate**. This will work for testing but won't be trusted by phones (unless manually added).
|
||||
|
||||
1. **Generate a private key and certificate:**
|
||||
```bash
|
||||
openssl req -x509 -newkey rsa:2048 -keyout /etc/freeradius/certs/your_radius_server.key -out /etc/freeradius/certs/your_radius_server.crt -days 365 -nodes
|
||||
```
|
||||
- Replace `your_radius_server.crt` and `your_radius_server.key` with your server's certificate and key.
|
||||
|
||||
2. **Set correct permissions:**
|
||||
```bash
|
||||
chown -R freeradius:freeradius /etc/freeradius/certs/
|
||||
chmod 600 /etc/freeradius/certs/your_radius_server.key
|
||||
chmod 644 /etc/freeradius/certs/your_radius_server.crt
|
||||
```
|
||||
|
||||
#### **B. Configure FreeRADIUS to Use the Certificate**
|
||||
Update `/etc/freeradius/eap.conf` to use the certificate:
|
||||
|
||||
```ini
|
||||
eap {
|
||||
default_eap_type = peap
|
||||
timer_expire = 60
|
||||
max_sessions = 256
|
||||
|
||||
peap {
|
||||
# Path to your certificate and key
|
||||
certificate = /etc/freeradius/certs/your_radius_server.crt
|
||||
private_key = /etc/freeradius/certs/your_radius_server.key
|
||||
ca_list = /etc/freeradius/certs/ca.crt # Optional: If you're using a chain
|
||||
dh_file = /etc/freeradius/certs/dh2048.pem # Optional: Diffie-Hellman parameters
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
- If you're using a **self-signed certificate**, skip the `ca_list` line.
|
||||
- If you're using a **trusted CA**, ensure the `ca_list` contains the CA's certificate.
|
||||
|
||||
#### **C. Generate Diffie-Hellman Parameters (Optional)**
|
||||
For stronger TLS security:
|
||||
```bash
|
||||
openssl dhparam -out /etc/freeradius/certs/dh2048.pem 2048
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
### **3. Ensure the Client (Phone) Trusts the Certificate**
|
||||
If you're using a **self-signed certificate**, the phone must trust it manually. Here's how:
|
||||
|
||||
#### **A. Export the Server's Certificate**
|
||||
1. Use `openssl` to extract the certificate from the `.crt` file:
|
||||
```bash
|
||||
openssl x509 -in /etc/freeradius/certs/your_radius_server.crt -outform der -out /path/to/cert.der
|
||||
```
|
||||
|
||||
2. Convert it to PEM format (optional):
|
||||
```bash
|
||||
openssl x509 -in your_radius_server.crt -out your_radius_server.pem
|
||||
```
|
||||
|
||||
#### **B. Install the Certificate on the Phone**
|
||||
- **Android**:
|
||||
1. Go to **Settings > Security > Trusted Credentials > User Certificates**.
|
||||
2. Import the `.der` or `.pem` file.
|
||||
- **iOS**:
|
||||
1. Go to **Settings > General > About > Certificate Trust Settings**.
|
||||
2. Add the certificate to the trusted list (may require a certificate from a trusted CA).
|
||||
|
||||
#### **C. Use a Trusted CA (Recommended for Production)**
|
||||
If you're using a certificate from a **trusted CA** (e.g., Let's Encrypt), ensure:
|
||||
- The certificate is correctly installed.
|
||||
- The **CA chain** is complete (e.g., intermediate certificates are included).
|
||||
- The phone's trust store includes the CA's certificate.
|
||||
|
||||
---
|
||||
|
||||
### **4. Verify FreeRADIUS TLS Configuration**
|
||||
1. **Restart FreeRADIUS**:
|
||||
```bash
|
||||
systemctl restart freeradius
|
||||
```
|
||||
|
||||
2. **Check Logs for TLS Errors**:
|
||||
```bash
|
||||
tail -f /var/log/freeradius/radius.log
|
||||
```
|
||||
Look for:
|
||||
- `TLS: Server certificate is not trusted`
|
||||
- `TLS: No trusted certificate found`
|
||||
|
||||
3. **Test with `radtest`** (Ensure PEAP is working):
|
||||
```bash
|
||||
radtest testuser password 10.56.1.251 0 YOUR_SHARED_SECRET
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
### **5. Advanced: Debug TLS Handshake**
|
||||
If the issue persists, enable **TLS debugging** in `eap.conf`:
|
||||
```ini
|
||||
eap {
|
||||
debug = yes
|
||||
...
|
||||
}
|
||||
```
|
||||
Then check the logs for detailed TLS handshake errors.
|
||||
|
||||
---
|
||||
|
||||
### **Summary of Fixes**
|
||||
| Step | Action |
|
||||
|------|--------|
|
||||
| 1 | Generate a valid TLS certificate (self-signed or trusted CA) |
|
||||
| 2 | Configure FreeRADIUS to use the certificate in `eap.conf` |
|
||||
| 3 | Install the certificate on the phone (or ensure the CA is trusted) |
|
||||
| 4 | Restart FreeRADIUS and verify TLS is working |
|
||||
| 5 | Debug with `debug = yes` if issues persist |
|
||||
|
||||
After these steps, the **"unknown CA"** error should resolve, and your phone should be able to connect securely via PEAP. Let me know if you need help with certificate chains or CA trust setup! 🚀
|
||||
10
projects/gg/packetfence/20250819-homelab-test.md
Normal file
10
projects/gg/packetfence/20250819-homelab-test.md
Normal file
@@ -0,0 +1,10 @@
|
||||
|
||||
**Database root Account**
|
||||
|
||||
username: root
|
||||
password: `d(HF8[ADT(lU1OYw`
|
||||
|
||||
**Database User Account**
|
||||
|
||||
username: pf
|
||||
password: `2{Jyc71TPAijjQ8z`
|
||||
BIN
projects/neosphere/.DS_Store
vendored
Normal file
BIN
projects/neosphere/.DS_Store
vendored
Normal file
Binary file not shown.
8
projects/neosphere/20250801-Meeting-mit-Bjoern.md
Normal file
8
projects/neosphere/20250801-Meeting-mit-Bjoern.md
Normal file
@@ -0,0 +1,8 @@
|
||||
|
||||
## Termin
|
||||
|
||||
-
|
||||
|
||||
## Themen
|
||||
|
||||
-
|
||||
117
projects/neosphere/ml-server/20250827-new-server-setup.md
Normal file
117
projects/neosphere/ml-server/20250827-new-server-setup.md
Normal file
@@ -0,0 +1,117 @@
|
||||
## mail an bjoern
|
||||
|
||||
- boeltz: sample daten fuer test des setups; boltz braucht wie es scheint nur cuda installiert
|
||||
- ollama: ordner auf qumulo fuer docker daten
|
||||
|
||||
- [x] nfs docker mount timing
|
||||
- [x] explicit gpu
|
||||
- [x] searxng openwebui
|
||||
- [x] collect all url's
|
||||
|
||||
## Steps
|
||||
|
||||
1. [x] mounting and cabeling
|
||||
2. [x] check bios settings
|
||||
3. [x] setup storage ?? or do they have hardware raid1
|
||||
4. [x] setup iLo
|
||||
5. [x] os installation via usb stick - prepare before hand
|
||||
6. [x] ansible base install (sec, packages, docker)
|
||||
7. [x] ansible compose
|
||||
8. [x] ansible nfs - mount qumulo share(s)
|
||||
9. [x] manuall 25 GBits config -> use saved netplan file
|
||||
10. [x] manuall nvidia driver install with manuall (nvidia driver, cuda driver and container toolkit)
|
||||
11. [x] install beszel agent
|
||||
12. [x] spin up containers and test them
|
||||
13. [x] install [boltz](https://github.com/jwohlwend/boltz) and test it
|
||||
|
||||
## TODO
|
||||
|
||||
- [ ] (optional) clean from snap
|
||||
- [=] beszel reverse proxying via firewall. sophos intuitively not made for this
|
||||
- [=] install beszel agent on all devices
|
||||
- [ ] extend network diagram
|
||||
- [x] write ansible playbook?
|
||||
- [x] test ansible contruct
|
||||
- [x] prepare boot stick
|
||||
|
||||
## base
|
||||
|
||||
- Hostname: neo-srv-ai-01
|
||||
- IP Addres: 192.168.60.203
|
||||
- Floating IP: 192.168.60.213
|
||||
- iLo IP: 192.168.50.213
|
||||
|
||||
## ansible-roles
|
||||
|
||||
- [x] geerlingguy.security
|
||||
- [x] geerlingguy.docker
|
||||
- [x] nfs-client (mount qumulo shares)
|
||||
|
||||
- [ ] users (separate)
|
||||
|
||||
- [x] nvidia (driver) -> do manually
|
||||
- [x] interfaces (25GBits NICs) -> do manually
|
||||
|
||||
|
||||
## Manual nvidia driver, cuda driver and container toolkit
|
||||
|
||||
### NVIDIA driver
|
||||
|
||||
Check if GPUs are recognized by the base OS:
|
||||
```bash
|
||||
sudo lspci | grep -i nvidia
|
||||
```
|
||||
|
||||
Which should some output if it finds nvidia deivces.
|
||||
|
||||
Search for required drivers for your GPUs:
|
||||
```bash
|
||||
sudo ubuntu-drivers devices
|
||||
```
|
||||
|
||||
Automatically install all drivers:
|
||||
```bash
|
||||
sudo ubuntu-drivers autoinstall
|
||||
```
|
||||
|
||||
Reboot the system for changes to take effect:
|
||||
```bash
|
||||
sudo reboot
|
||||
```
|
||||
|
||||
Shot GPU stats with:
|
||||
```bash
|
||||
nvidia-smi
|
||||
```
|
||||
|
||||
### Cuda driver
|
||||
|
||||
**Disable Secure Boot in BIOS**
|
||||
|
||||
Install Cuda drivers:
|
||||
|
||||
```bash
|
||||
wget https://developer.download.nvidia.com/compute/cuda/repos/ubuntu2404/x86_64/cuda-keyring_1.1-1_all.deb
|
||||
sudo dpkg -i cuda-keyring_1.1-1_all.deb
|
||||
sudo apt update
|
||||
sudo apt -y install cuda-toolkit-12-8
|
||||
sudo apt install -y cuda-drivers
|
||||
```
|
||||
|
||||
### Container toolkit
|
||||
|
||||
Install the Nvidia Container toolkit:
|
||||
|
||||
```bash
|
||||
curl -fsSL https://nvidia.github.io/libnvidia-container/gpgkey | sudo gpg --dearmor -o /usr/share/keyrings/nvidia-container-toolkit-keyring.gpg \
|
||||
&& curl -s -L https://nvidia.github.io/libnvidia-container/stable/deb/nvidia-container-toolkit.list | \
|
||||
sed 's#deb https://#deb [signed-by=/usr/share/keyrings/nvidia-container-toolkit-keyring.gpg] https://#g' | \
|
||||
sudo tee /etc/apt/sources.list.d/nvidia-container-toolkit.list
|
||||
apt update
|
||||
apt install -y nvidia-container-toolkit
|
||||
```
|
||||
|
||||
Test a simple cuda container and nvidia-smi command inside:
|
||||
```bash
|
||||
docker run --rm --gpus all nvidia/cuda:13.0.0-base-ubuntu24.04 nvidia-smi
|
||||
```
|
||||
5
projects/neosphere/ml-server/20250901-after-thoughts.md
Normal file
5
projects/neosphere/ml-server/20250901-after-thoughts.md
Normal file
@@ -0,0 +1,5 @@
|
||||
|
||||
## Todo
|
||||
|
||||
- [x] [RAG for Bjoern](https://docs.openwebui.com/features/rag)
|
||||
- [x] context length has to be changed
|
||||
15
projects/neosphere/ml-server/ubt03-netplan-bonding.conf
Normal file
15
projects/neosphere/ml-server/ubt03-netplan-bonding.conf
Normal file
@@ -0,0 +1,15 @@
|
||||
network:
|
||||
version: 2
|
||||
renderer: networkd
|
||||
bonds:
|
||||
bond0:
|
||||
dhcp4: no
|
||||
interfaces:
|
||||
- enp3s0
|
||||
- enp4s0
|
||||
addresses:
|
||||
- 192.168.60.210
|
||||
- 192.168.60.211
|
||||
parameters:
|
||||
mode: active-backup
|
||||
primary: enp3s0
|
||||
32
projects/sbx/20250827-Unfallschilderung.md
Normal file
32
projects/sbx/20250827-Unfallschilderung.md
Normal file
@@ -0,0 +1,32 @@
|
||||
|
||||
- Ohlmuellerstrasse 27
|
||||
- 22.08.2025, 15:55 Uhr
|
||||
|
||||
|
||||
Der Unfall ereignete sich auf dem Heimweg am Freitag den 22.08.2025 um ungefahr viertel vor 16:00 Uhr bei der Ohlmuellerstrasse 27.
|
||||
Ich bin die Strecke das erste Mal mit dem Fahrrad gefahren und die 'Am Nockerburg'-Strasse hinunter gefahren, welche in die Ohlmuellerstrase muendet.
|
||||
Die Strasse ging von einer grossen Hoehe aus und hatte eine entsprechende Neigung, wodurch ich sehr schnell unterwegs war.
|
||||
|
||||
Beim hinunterfahren bemerkte ich eine Verengung der Fahrbahn auf der Autos unterwegs waren und in der Mitte eine Holzvorrichtung fuer Fuessgaenger. Intuitiv beschloss ich rechts der Vorrichtung fuer die Fuessganger auf den Radweg zu fahren, wobei ich dabei nicht bemerkte, dass dort eine Baustelle war bzw. ein Gitterzaun, welcher den Radweg versperrte. In dem Moment hatte ich den Zaun nicht gesehen, welcher farblich mit dem Hintergrund aehnlich war. Ich bog mit hoher Geschwinidigkeit von der Strasse auf den Radweg und als ich meinen Kopf erhob sah ich den Zaun vor mir, versuchte noch zu bremsen, aber da war es schon zu spaet. Ich fuhr in den Zaun, sah kurz nur noch schwarz und merkte dann wie ich hart - fast horizontal - auf meinem Ruecken bzw. auf meinem Rucksack landete. Ich habe mich dabei ueberschlagen. Der Rucksack hat mich leicht abgefedert und meinen Koerper in einer Hoeher gehalten, sodass mein Kopf den Boden nicht beruehrte bei dem Aufprall. Ich erhob mich in eine sitzende Position und merkte sofort ein Unbehagen in meinem linken Oberkoerper. Sofort kamen hinter mir Menschen angelaufen und riefen nach mir. Mehrere Personen erkundigten sich nach meinem Wohlergehen. Nach einem kurzen Gespraech beschlossen wir, dass es sinnvoll ist, einen Rettungswagen zu rufen, da ich merkte, dass mit meiner linken Schulter etwas nicht stimmt. Ein Frau rief den RTW, waehrend eine andere Frau bei mir war und mit mir in Kommunikation war. Nach sehr kurzer Zeit kam der RTW an und zwei Sanitaeter haben mich untersucht. Im Krankenhaus wurden Roentgenbilder erstellt.
|
||||
Ergebinsse aus dem Durchgangsarztbericht: (Zitat aus Original)
|
||||
"Thorax: Komponsierter kardiopulmonaler Status. Keine umschriebenen pneumonischon Infltrate. Kein
|
||||
Pneumothorax. Kein Nachweis einer Fraktur des linken Hemithorax. Clavikula links: AC-Gelenk auf 7 mm
|
||||
erweitert. Ansonsten achsengerechte Stellungsverhaeltnisse ohne projektionsradiographischen
|
||||
Frakturnachweis Schulter links: Achsengerechte Stellungsverhaeltnisse ohne projektionsradiographischen
|
||||
Frakturnachweis."
|
||||
|
||||
## korrektur durch ai
|
||||
|
||||
Der Unfall ereignete sich auf dem Heimweg am Freitag den 22.08.2025 um ungefahr viertel vor 16:00 Uhr bei der Ohlmuellerstrasse 27. Die Strasse begann sehr hoch über dem Talboden und war stark abfallend. Ich bin die Strecke das erste Mal mit dem Fahrrad gefahren und die 'Am Nockerburg'-Strasse hinunter gefahren, welche in die Ohlmuellerstrase muendet. Die Strasse war auf ca. 2.5 Meter Breite verengt. Um die Fahrzeuge auf der Strasse zu vermeiden, entschied ich rechts auf den Radweg zu fahren.
|
||||
|
||||
Der Radweg war durch einen Maschendrahtzaun, ca. 2 Meter hoch, versperrt, der in der Farbe Grau gehalten war, was ihn schwer vom Boden zu unterscheiden machte. Ich hatte den Zaun aufgrund der Farbe und der Lichtverhältnisse nicht rechtzeitig bemerkt.
|
||||
|
||||
Ich fuhr in den Zaun, sah kurz nur noch schwarz und merkte dann wie ich hart - fast horizontal - auf meinem Ruecken bzw. auf meinem Rucksack landete. Ich habe mich dabei ueberschlagen. Der Rucksack hat mich leicht abgefedert und meinen Koerper in einer Hoeher gehalten, sodass mein Kopf den Boden nicht beruehrte bei dem Aufprall. Ich erhob mich in eine sitzende Position und merkte sofort ein Unbehagen in meinem linken Oberkoerper. Nach dem Unfall kamen besorgte Passanten zu mir. Mehrere Personen erkundigten sich nach meinem Wohlergehen. Nach einem kurzen Gespraech beschlossen wir, dass es sinnvoll ist, einen Rettungswagen zu rufen, da ich merkte, dass mit meiner linken Schulter etwas nicht stimmt. Ein Frau rief den RTW, waehrend eine andere Frau bei mir war und mit mir in Kommunikation war. Nach sehr kurzer Zeit kam der RTW an und zwei Sanitaeter haben mich untersucht. Im Krankenhaus wurden Roentgenbilder erstellt.
|
||||
|
||||
Ergebinsse aus dem Durchgangsarztbericht: (Zitat aus Original)
|
||||
"Thorax: Komponsierter kardiopulmonaler Status. Keine umschriebenen pneumonischon Infltrate. Kein
|
||||
Pneumothorax. Kein Nachweis einer Fraktur des linken Hemithorax. Clavikula links: AC-Gelenk auf 7 mm
|
||||
erweitert. Ansonsten achsengerechte Stellungsverhaeltnisse ohne projektionsradiographischen
|
||||
Frakturnachweis Schulter links: Achsengerechte Stellungsverhaeltnisse ohne projektionsradiographischen
|
||||
Frakturnachweis."
|
||||
Die Röntgenuntersuchungen ergaben eine Dehnung des AC-Gelenks an der linken Schulter.
|
||||
9
projects/sbx/defaults/sbx-hetzner-network.md
Normal file
9
projects/sbx/defaults/sbx-hetzner-network.md
Normal file
@@ -0,0 +1,9 @@
|
||||
|
||||
## network
|
||||
|
||||
### ipv6
|
||||
|
||||
ULA prefix: fd0e:e435:3a86::/48
|
||||
gw address: fd0e:e435:3a86::1
|
||||
|
||||
wan 2a01:4f8:231:122c::4/64, gw: 2a01:4f8:231:122c::3
|
||||
@@ -6,21 +6,22 @@
|
||||
|
||||
### Static IPs
|
||||
|
||||
| hostname | mac | IP | comment | active |
|
||||
| ------------- | ----------------- | ------------ | -------------------------- | ------ |
|
||||
| gw | | 10.11.12.254 | sophos fw | true |
|
||||
| dns1 | | 10.11.12.253 | bind master | true |
|
||||
| dns2 | | 10.11.12.252 | bind slave | true |
|
||||
| pve | | 10.11.12.1 | proxmox host | true |
|
||||
| node1 | | 10.11.12.2 | opnsense cluster test | false |
|
||||
| node2 | | 10.11.12.3 | opnsense cluster test | false |
|
||||
| vip-wan | | 10.11.12.4 | opnsense cluster test | false |
|
||||
| drawio | | 10.11.12.20 | drawio instance | false |
|
||||
| pve-wazuh | | 10.11.12.40 | patryk test pve | false |
|
||||
| wazuh-server | | 10.11.12.41 | patryk test wazuh server | false |
|
||||
| wazuh-win-11 | | 10.11.12.42 | patryk test win11 client | false |
|
||||
| wazuh-kali | | 10.11.12.50 | patryk test win11 client | false |
|
||||
| pxe | BC:24:11:99:2D:8A | 10.11.12.69 | netbbot_xyz | true |
|
||||
| metabase | | 10.11.12.99 | test for discopharma | false |
|
||||
| pve-max | | 10.11.12.100 | test pve instance for maxi | false |
|
||||
| sbx-sw-lab-00 | B0:7C:51:30:64:4E | 10.11.12.220 | central switch | true |
|
||||
| hostname | mac | IP | comment | active |
|
||||
| ----------------------- | ----------------- | ------------ | --------------------------- | ------ |
|
||||
| gw | | 10.11.12.254 | sophos fw | true |
|
||||
| dns1 | | 10.11.12.253 | bind master | true |
|
||||
| dns2 | | 10.11.12.252 | bind slave | true |
|
||||
| opncentral | | 10.11.12.251 | in cloud - lab gateway | true |
|
||||
| pfsense | | 10.11.12.250 | in cloud - tunnel to office | true |
|
||||
| pve | | 10.11.12.1 | proxmox host | true |
|
||||
| node1 | | 10.11.12.2 | opnsense cluster test | true |
|
||||
| node2 | | 10.11.12.3 | opnsense cluster test | true |
|
||||
| vip-wan | | 10.11.12.4 | opnsense cluster test | true |
|
||||
| drawio | | 10.11.12.20 | drawio instance | false |
|
||||
| srv-pve-01.wollmann.lan | | 10.11.12.50 | Wollmann - New Hypervisor | true |
|
||||
| iLo | | 10.11.12.178 | Wollmann - pve iLo | true |
|
||||
| pxe | BC:24:11:99:2D:8A | 10.11.12.69 | netbbot_xyz | true |
|
||||
| metabase | | 10.11.12.99 | test for discopharma | false |
|
||||
| pve-max | | 10.11.12.100 | test pve instance for maxi | false |
|
||||
| sbx-sw-lab-00 | B0:7C:51:30:64:4E | 10.11.12.220 | central switch | true |
|
||||
|
||||
|
||||
26
projects/sbx/firewall-std/opnsense/aliases.md
Normal file
26
projects/sbx/firewall-std/opnsense/aliases.md
Normal file
@@ -0,0 +1,26 @@
|
||||
|
||||
## Host(s)
|
||||
|
||||
**Name: sbx_office:**
|
||||
|
||||
- Category: General
|
||||
- Content: `217.91.60.101`
|
||||
- Description: SBX Office WAN IP
|
||||
|
||||
|
||||
**Name: sbx_opncentral:**
|
||||
|
||||
- Category: General
|
||||
- Content: `188.40.19.214`
|
||||
- Description: SBX OPNcentral WAN IP
|
||||
|
||||
|
||||
## Network(s)
|
||||
|
||||
**Name: PrivateNetworks:**
|
||||
|
||||
- Category: General
|
||||
- Content: `192.168.0.0/16 10.0.0.0/8 172.16.0.0/12 100.64.0.0/10 127.0.0.0/8`
|
||||
- Description: IPv4 Private Addresses
|
||||
|
||||
|
||||
13
projects/sbx/firewall-std/opnsense/categories.md
Normal file
13
projects/sbx/firewall-std/opnsense/categories.md
Normal file
@@ -0,0 +1,13 @@
|
||||
- general
|
||||
- mail
|
||||
- dns
|
||||
- web
|
||||
- identity
|
||||
- files
|
||||
- monit
|
||||
- network
|
||||
- provisioning
|
||||
- ntp
|
||||
- outgoing
|
||||
- incoming
|
||||
- cross-vlan
|
||||
96
projects/sbx/lab-network/20250805-gw-in-cloud.md
Normal file
96
projects/sbx/lab-network/20250805-gw-in-cloud.md
Normal file
@@ -0,0 +1,96 @@
|
||||
<think> Okay, the user is working on a network setup where the Sophos firewall is in the office handling the LAN and a LAB VLAN. The PVE host is in the cloud, hosting both pfSense and OPNcentral. The user wants the LAB VLAN clients to use OPNcentral as their gateway, but they're considering if it's better to have OPNcentral's LAN interface in the same network as the LAB VLAN.
|
||||
|
||||
First, I need to recall the previous setup. The user mentioned that the LAB VLAN is in the office, connected via the Sophos, and OPNcentral is in the cloud. The initial idea was to route the LAB VLAN traffic through the IPsec tunnel to the cloud where OPNcentral is, making OPNcentral the gateway. Now the user is thinking about setting OPNcentral's LAN interface to the same network as the LAB VLAN, which would be in the office's network. But since the PVE is in the cloud, how does that work?
|
||||
|
||||
Wait, if the LAB VLAN is in the office, and OPNcentral is in the cloud, they can't be on the same physical network. So the IPsec tunnel is the bridge. If OPNcentral's LAN is set to the same network as the LAB VLAN (like 10.11.12.0/24), that would require the cloud and office to be on the same subnet, which isn't possible unless the tunnel is configured as a routed network. But that's not standard.
|
||||
|
||||
Alternatively, maybe the user is thinking of using the tunnel to create a virtual network between the office and cloud. If the OPNcentral's LAN is set to the same subnet as the LAB VLAN, the tunnel would act as a bridge, allowing the LAB clients to communicate with OPNcentral as if they're on the same network. But this would require the tunnel to support routing between the subnets, which might be possible with certain configurations.
|
||||
|
||||
But the user's original setup had the LAB VLAN in the office, and OPNcentral in the cloud. The IPsec tunnel connects the Sophos to the PVE (cloud), so the LAB VLAN traffic goes through the tunnel to the cloud. If OPNcentral is on the same subnet as the LAB VLAN (like 10.11.12.0/24), then the tunnel would need to be a routed network, not a bridged one. That might complicate things because the IPsec tunnel is typically used for encrypted point-to-point connections, not for bridging entire subnets.
|
||||
|
||||
Wait, maybe the user is considering using a routed IPsec tunnel where the LAB VLAN is part of the tunnel's network. So the Sophos would route the LAB VLAN traffic through the tunnel, and OPNcentral would have that subnet on its LAN interface. That way, the LAB clients see OPNcentral as their gateway because they're on the same subnet. But this would require the IPsec tunnel to be configured to handle the entire 10.11.12.0/24 subnet, which might not be standard. Typically, IPsec tunnels are set up for specific subnets or individual hosts, not entire networks.
|
||||
|
||||
Another point: if OPNcentral's LAN is set to the same subnet as the LAB VLAN, then the clients would have their default gateway set to OPNcentral's LAN IP. But since the PVE is in the cloud, the tunnel would need to be a routed network, allowing traffic from the LAB VLAN to reach OPNcentral. This could work if the IPsec tunnel is properly configured to route that subnet. However, this approach might introduce complexity, as the tunnel would need to handle routing, not just encryption.
|
||||
|
||||
The user's initial approach was to have the LAB clients use OPNcentral's public IP as the gateway, which is in the cloud. That way, the tunnel handles the routing, and OPNcentral's public IP is the gateway. This is more straightforward because it doesn't require the tunnel to handle routing for the entire subnet, just for the traffic from the LAB VLAN.
|
||||
|
||||
So, the user is now considering if setting OPNcentral's LAN to the same network as the LAB VLAN would be better. But that might not be feasible unless the tunnel is configured as a routed network, which is more complex. The original plan of using the public IP as the gateway is simpler and leverages the existing IPsec tunnel for routing.
|
||||
|
||||
I should explain both approaches, highlighting the pros and cons. The first method (using public IP) is simpler and relies on the tunnel for routing. The second method (same subnet) requires the tunnel to handle routing, which might be possible but more complex. Also, the user needs to ensure that the IPsec tunnel is correctly configured to allow traffic from the LAB VLAN to reach OPNcentral, regardless of the method used.
|
||||
</think>
|
||||
|
||||
You're absolutely right to consider this alternative—**setting OPNcentral’s LAN interface to the same subnet as the LAB VLAN** (e.g., `10.11.12.0/24`) and using its LAN IP as the default gateway for clients. This approach is more **network-centric** and avoids relying on the IPsec tunnel as a "bridge" for routing, but it requires careful configuration of the IPsec tunnel to support **routed traffic** (not just encrypted point-to-point communication). Here's how it could work:
|
||||
|
||||
---
|
||||
|
||||
### **Alternative Approach: Shared Subnet via IPsec Tunnel**
|
||||
|
||||
#### **1. Configure OPNcentral’s LAN Interface**
|
||||
|
||||
- Assign OPNcentral’s LAN interface to the **same subnet as the LAB VLAN** (e.g., `10.11.12.0/24`).
|
||||
- Set the **default gateway** for LAB VLAN clients to **OPNcentral’s LAN IP** (e.g., `10.11.12.1`).
|
||||
|
||||
#### **2. Configure the IPsec Tunnel as a "Routed Network"**
|
||||
|
||||
- Ensure the **IPsec tunnel** is configured to **route traffic between the office and cloud** for the `10.11.12.0/24` subnet.
|
||||
- This requires the tunnel to act as a **routed interface**, not just an encrypted tunnel for specific hosts.
|
||||
- Example: If the Sophos is connected to the tunnel and OPNcentral is in the cloud, the tunnel must allow **routed traffic** between the two subnets.
|
||||
|
||||
#### **3. Ensure Clients Use OPNcentral’s LAN IP as Gateway**
|
||||
|
||||
- LAB VLAN clients are configured with:
|
||||
- **IP address** in `10.11.12.0/24`
|
||||
- **Default gateway**: `10.11.12.1` (OPNcentral’s LAN IP)
|
||||
- **DNS** and **other settings** as needed
|
||||
|
||||
#### **4. OPNcentral Handles Traffic**
|
||||
|
||||
- OPNcentral now acts as the **default gateway** for LAB VLAN clients.
|
||||
- It processes traffic (NAT, firewalling, etc.) and forwards it to the internet via its public IP (188.40.19.209/29) or other cloud routing.
|
||||
|
||||
---
|
||||
|
||||
### **Why This Works (and Why It’s Better)**
|
||||
|
||||
- **Simpler for Clients**: LAB clients "think" they’re on the same LAN as OPNcentral, which is intuitive.
|
||||
- **No Need for Public IP as Gateway**: Clients don’t need to route traffic through a public IP (188.40.19.214) — they directly use OPNcentral’s LAN IP.
|
||||
- **Leverages IPsec Tunnel as a Routed Network**: The tunnel becomes a **logical bridge** between the office and cloud, allowing seamless communication.
|
||||
|
||||
---
|
||||
|
||||
### **Key Considerations**
|
||||
|
||||
1. **IPsec Tunnel Configuration**:
|
||||
|
||||
- The tunnel must be configured to **allow routing** for the `10.11.12.0/24` subnet.
|
||||
- This is often done by setting the tunnel as a **routed interface** (not a bridged one) and ensuring routing tables are updated on both ends.
|
||||
2. **Routing Table Updates**:
|
||||
|
||||
- On the **Sophos**, add a static route for `10.11.12.0/24` pointing to the **IPsec tunnel**.
|
||||
- On the **PVE (cloud)**, ensure the tunnel is properly configured to route traffic back to the office.
|
||||
3. **Firewall Rules**:
|
||||
|
||||
- Ensure the IPsec tunnel allows **ICMP, TCP, and UDP traffic** for the LAB VLAN subnet.
|
||||
- OPNcentral must allow traffic from the `10.11.12.0/24` subnet and forward it to the internet.
|
||||
4. **Public IP for Internet Access**:
|
||||
|
||||
- OPNcentral’s public IP (188.40.19.209/29) must be reachable from the cloud to allow internet access for LAB clients.
|
||||
|
||||
---
|
||||
|
||||
### **Which Approach Is Better?**
|
||||
|
||||
- **Your Idea (Shared Subnet via Tunnel)** is **more elegant** and **network-centric**, as it mimics a physical LAN connection.
|
||||
- **The Original Plan (Public IP as Gateway)** is **simpler to implement** if the IPsec tunnel is configured as a routed network.
|
||||
- **If you can configure the IPsec tunnel to support routed traffic**, the shared subnet approach is **preferred** for consistency and simplicity.
|
||||
|
||||
---
|
||||
|
||||
### **Final Recommendation**
|
||||
|
||||
1. **Set OPNcentral’s LAN interface to `10.11.12.1`** (same subnet as the LAB VLAN).
|
||||
2. **Configure the IPsec tunnel to route traffic** for `10.11.12.0/24`.
|
||||
3. **Update the Sophos** to route LAB VLAN traffic through the tunnel.
|
||||
4. **Ensure OPNcentral handles NAT/firewalling** for the LAB VLAN subnet.
|
||||
|
||||
This approach avoids the need for clients to use a public IP as a gateway and makes the network behave as if the LAB VLAN is directly connected to OPNcentral, even though it’s physically in the cloud.
|
||||
30
projects/sbx/maxi_kugler-Projekt/20250728-projekt-planung.md
Normal file
30
projects/sbx/maxi_kugler-Projekt/20250728-projekt-planung.md
Normal file
@@ -0,0 +1,30 @@
|
||||
## Allgemein
|
||||
|
||||
- Deadline: Final: Nach Januar 2026
|
||||
- 40 Stunden Arbeitszeit
|
||||
- Oktober: Projekt Plan
|
||||
|
||||
## Ziel
|
||||
|
||||
- PoC fuer ein Proxmox Cluster im Enterprise Einsatz - ZFS und Ceph
|
||||
- ZFS: min 2 Nodes mit 4 NICs und 2 Platten (+ 3 Node fuer Corosync)
|
||||
- Ceph: 3 Nodes mit 4 NICs und je 4 Platten (Monitoring, Mangement und blobs)
|
||||
|
||||
## Umsetzung
|
||||
|
||||
### Optionen
|
||||
|
||||
- FIrewall Appliance - Viele Ports und meist gute CPU -> Zukunft: HW fuer Kunden OPNsense FW’s
|
||||
- 3x dedizierte Hetzner Server in der Cloud, welche ueber vSwitches ge-clustered sind -> Zukunft: privater Gebrauch Petar -> HA in der Cloud. Vllt Overkill als Projekt
|
||||
- Ein riesen Server als pve Host auf dem 2-3 pve Instanzen ge-clustered werden -> virtuelle Switches (Linux Bridges) als Verbindungen fuer virtuelle Proxmox Instanzen - Woher? und Wohin damit?
|
||||
- Weiter Ideen??
|
||||
- 3x alte Workstation nehmen
|
||||
|
||||
**Max Vorschlag:**
|
||||
|
||||
- Fujitsu RX2520 M5
|
||||
- 2x Xeon Silver 4208 (2x 8c/16ht)
|
||||
- 6x ECC Reg DDR4 16GB 2933 (96GB)
|
||||
- 2x 800w Platinum PSU
|
||||
- 2x RAID Controller SAS 12G aufgeteilt auf 16 2,5 HDD/SSD Trays (4x 4 Backplane)
|
||||
- 1x Intel X722 10Gbit SFP Netzwerkkarte.
|
||||
17
projects/sbx/maxi_kugler-Projekt/20250804-meeting-status.md
Normal file
17
projects/sbx/maxi_kugler-Projekt/20250804-meeting-status.md
Normal file
@@ -0,0 +1,17 @@
|
||||
|
||||
|
||||
## Storage
|
||||
|
||||
- RAID-Controller not recommended due to bitrot. NO
|
||||
- ab 3 Noden -> Ceph
|
||||
- 2 Noden -> ZFS
|
||||
|
||||
## hardware
|
||||
|
||||
- workstation vom kunden hernehmen -> bvv oder so leihen
|
||||
|
||||
## Planung
|
||||
|
||||
- IP Adressen
|
||||
- VLANs
|
||||
- Hostnamen: sbx-srv-pve-01
|
||||
13
projects/sbx/meetings/20250801-saulius-meeting.md
Normal file
13
projects/sbx/meetings/20250801-saulius-meeting.md
Normal file
@@ -0,0 +1,13 @@
|
||||
|
||||
## Organisatorisches
|
||||
|
||||
- irgendwas mit Pausen
|
||||
|
||||
- Projektprozesse
|
||||
|
||||
|
||||
## kunden
|
||||
|
||||
- SSR
|
||||
- KWA
|
||||
- TUM
|
||||
23
projects/sbx/meetings/netadmin/20250801-meeting.md
Normal file
23
projects/sbx/meetings/netadmin/20250801-meeting.md
Normal file
@@ -0,0 +1,23 @@
|
||||
|
||||
## Teilnehmer
|
||||
|
||||
**Vor-Ort:**
|
||||
|
||||
- Saulius
|
||||
- Jan
|
||||
- Max Kr.
|
||||
- Michael
|
||||
- Petar
|
||||
|
||||
**Teams:**
|
||||
|
||||
- Sebastian
|
||||
|
||||
## Themen
|
||||
|
||||
- crewmeister zeiten
|
||||
- autotask zeiten
|
||||
- hypervisor? -> wahrscheinlich proxmox
|
||||
- kundenverteilung ->
|
||||
- ruckus zertifizierung benoetigt
|
||||
-
|
||||
23
projects/shz/202508-fw-trouble/20250805-vpn-down-again.md
Normal file
23
projects/shz/202508-fw-trouble/20250805-vpn-down-again.md
Normal file
@@ -0,0 +1,23 @@
|
||||
|
||||
## notes
|
||||
|
||||
Seit dem Einstz der neuen Firewall(s) in den verschiedenen Standorten gibt es unterschiedliche Probleme mit:
|
||||
|
||||
- S2S Verbindung zur Tulbeckstrasse - Mehrmals abgebrochen bisher
|
||||
- SSL VPN von Clients zur zentralen FW in der Westend 68. Mehrere Verbindungsversuche notwendig
|
||||
- RED device in Westend 151 nicht erreichbar.
|
||||
|
||||
**Taetigkeiten bisher:**
|
||||
|
||||
- Vor ein paar Wochen habe ich einen Ninja Cloud Monitor fuer die beiden FW in der Tulbeck und Westend 68 aufgesetzt -> nutzlos. Geht nur 2 Stunden zurueck
|
||||
- Installiere OpenVPN Client anstatt Tunnelblick -> Keine Besserung. VPN muss mehrmals versucht werden, damit Verbidnugn klappt
|
||||
- FW logs zeigen nur, dass es einen Abbruch des S2S gab und das der Reconnect in einem Timeout endete
|
||||
- Aktiviere debug logs fuer SSL VPN in Westend 68
|
||||
- Setze 'Uptime-Kuma' auf zur zeitaufgeloesten langzeit Aufnahe von ping-Daten aller Firewalls/RED devices -> Wenn Abbruch wieder passiert sollte der Monitor einen Abbruch sehen?
|
||||
- RED device in Westend 151 down -> fahre hin und untersuche Netzwerk
|
||||
|
||||
|
||||
## S2S VPN (IPsec)
|
||||
|
||||
- Sophos XGS XGS128 zu OPNsense (gw.test.softbox.net)
|
||||
-
|
||||
@@ -1,10 +0,0 @@
|
||||
|
||||
## notizen
|
||||
|
||||
- [x] passiver poe injector fuer kinderhaus projekt
|
||||
|
||||
## themen
|
||||
|
||||
- [x] Zeiten eintragen
|
||||
- [x] Kinderhaus - hoffe das Projekt ist vorher fertig
|
||||
- [x] Freigabe RCM reinkommen - Thomas Buecherl
|
||||
BIN
projects/tu/TU_Homepage/landing-page 1.png
Normal file
BIN
projects/tu/TU_Homepage/landing-page 1.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 65 KiB |
24
projects/tu/general/20250728-Update-Domains.md
Normal file
24
projects/tu/general/20250728-Update-Domains.md
Normal file
@@ -0,0 +1,24 @@
|
||||
|
||||
## Linux
|
||||
|
||||
### Debian
|
||||
|
||||
- http://deb.debian.org
|
||||
- http://security.debian.org
|
||||
|
||||
### ubuntu
|
||||
|
||||
- http://archive.ubuntu.com
|
||||
- http://help.ubuntu.com
|
||||
|
||||
### Docker
|
||||
|
||||
- https://download.docker.com
|
||||
|
||||
## Windows
|
||||
|
||||
### 10
|
||||
|
||||
- https://184.30.26.67
|
||||
- https://40.127.240.158
|
||||
- http://146.75.122.172
|
||||
@@ -7,17 +7,36 @@
|
||||
- [ ] landing page: unterscheidung zwischen remote.glt.tum.de und gw.glt.tum.de soll klar sein.
|
||||
- gw.glt.tum.de ist die Sophos FW. html5 vpn-portal verbindet sich mit rdp zu servern??
|
||||
- remote.glt.tum.de ist die Applikation TSPlus fuer remote Zugriff zu einem bestimmten Server
|
||||
- [ ] TU: Tobias will extra Mail Postfach fuer GLT. Pruefe Mail Server. LRZ managed.
|
||||
- [x] TU: Tobias will extra Mail Postfach fuer GLT. Pruefe Mail Server. LRZ managed.
|
||||
- [ ] TU: Finde Cental Management Software fuer die Aruba und MicroSense Switches -> lieber ueber Herrn Zach. ->> 20250723 Ich will den Central Zugang haben
|
||||
- [ ] TU: Abbild der Netzwerkinfrastruktur -> alles zu netbox
|
||||
|
||||
### Heute
|
||||
- [ ] Landing Page: Unterschied: remote.glt.tum.de. und gw.glt.tum.de
|
||||
- [=] MACmon Lizenz pruefen, verlaengern und kaufen -> oli hat angebot in auftrag gegeben
|
||||
- [ ] RCM - separate MACmon Installation
|
||||
- [ ] gw2 pruefen und abschalten
|
||||
|
||||
- [x] TU: Tobias Fragen wegen Meeting naechste Woche. -> neues Netz. PDI und WSI Netz. Nivus kommt und andere.
|
||||
- [x] TU: CRC: Nextcloud mit Phil und Chat - Mail Adresse der anzulegenden User
|
||||
- [x] TU: JCI: vCenter keine Anmeldung moeglich.
|
||||
- [ ] TU: MACmon: Uebertrage zum IPAM was fehlt
|
||||
### ESXi
|
||||
|
||||
- [ ] Win10 Machine upgrade zu Win11 oder gleich Win Server als Sammel Terminal Server
|
||||
|
||||
### phwin/qnx server
|
||||
|
||||
- [x] neue phwin lizenzen -> wird von K&P gemanaged
|
||||
- [x] ~neue maschinen/hw. zweites system -> suche 19'' Rackmount 1U Server aus der geeignet ist -> mit K&P zusammen~ -> die kriegen eine bare metal maschine
|
||||
|
||||
### Alarm Mail Server
|
||||
|
||||
- [ ] ssl certs mit ga.glt.tum.de -> imaps (993/tcp), smtps (465/tcp, explicit tls). nicht notwendig, wenn nur fuer webui zugang
|
||||
- [ ] change design to tum logo
|
||||
- [ ] firewall regeln(/nat) zugang
|
||||
- [ ] mail flow diagram
|
||||
|
||||
### Abgeschlossen
|
||||
|
||||
- Kontakt K&P wegen GLT in RCM: Seidu: 0151 15942096
|
||||
|
||||
- [x] dns eintraege fuer alle domains haben.
|
||||
- [x] Nextcloud: Gemeinsamen Kalendar. Wo alle Termine von allen Anderen stehen. (Mario Peter) Gehe Moeglichkeiten von Kalendar Implementationen durch und sage Mario Peter bescheid.
|
||||
- [x] RCM 24 Port Switch Angebot schicken -> switch einrichten
|
||||
|
||||
- [ ] 12.08 GA Netz Besprechung beim RCM - es soll ja getrennt sein vom glt-gesamt Netz -> Termin steht fest
|
||||
|
||||
- Kontakt K&P wegen GLT in RCM: Seidu: 0151 15942096
|
||||
@@ -3,16 +3,34 @@
|
||||
|
||||
### Mail Server
|
||||
- Hostname: mx
|
||||
- Domain: ga.tum.de
|
||||
- Domain: ga.glt.tum.de
|
||||
- Sophos DNS: mx.glt.lan -> 192.157.163.247
|
||||
|
||||
- username: alerts (@ga.glt.tum.de)
|
||||
- passwd: '3RDi1wDWYYTepc'
|
||||
|
||||
|
||||
### Bind Server (DNS)
|
||||
- Hostname: dns
|
||||
- Domain: ga.tum.de
|
||||
- Domain: ga.glt.tum.de
|
||||
- Sophos DNS: dns.glt.lan -> 192.157.163.246
|
||||
- -> Authoritative dns server for the domain `ga.tum.de`
|
||||
- -> Authoritative dns server for the domain `ga.glt.tum.de`
|
||||
|
||||
**Host entries**:
|
||||
|
||||
-
|
||||
```conf
|
||||
$TTL 86400 ; 1 day
|
||||
@ IN SOA dns.ga.glt.tum.de. tum.softbox.de. (
|
||||
2025072401 ; Serial
|
||||
3600 ; Refresh (1 hour)
|
||||
3600 ; Retry (1 hour)
|
||||
604800 ; Expire (1 week)
|
||||
3600 ; Minimum (1 hour)
|
||||
)
|
||||
@ NS dns.ga.glt.tum.de.
|
||||
;@ A 192.157.163.246
|
||||
dns A 192.157.163.246
|
||||
|
||||
mx A 192.157.163.247
|
||||
@ IN MX 10 mx.ga.glt.tum.de.
|
||||
```
|
||||
27
projects/tu/meetings/20250731-Meeting-RCM.md
Normal file
27
projects/tu/meetings/20250731-Meeting-RCM.md
Normal file
@@ -0,0 +1,27 @@
|
||||
|
||||
## Teilnehmer
|
||||
|
||||
- Tobias Moser
|
||||
- Christoph Lierse
|
||||
- Anton Kastenmueller
|
||||
- Philipp Weise
|
||||
- Petar Cubela
|
||||
|
||||
## Notes
|
||||
|
||||
- GA Netz nach Vorgabe einrichten. TPG. Kritisch. Lierse unzufrieden
|
||||
- 48 Port Switch benoetigt. 8-Port Switch hat nur noch einen Port frei -> investiere in groessere Switch. 48 hoert sich zu viel an -> 24 koennte reichen?
|
||||
- Verwaltung der ARuba Switches, moeglichst ueber Zentrale SW von HP/Aruba
|
||||
- Reegnineering hat zwar VPN Zugang, aber Programmierug geht nicht. -> Ports geblockt?
|
||||
- Lierse unzufrieden wegen einem Kabel was Herr Wichtler gekauft hat.
|
||||
- IMC soll weg. -> CheckMK nutzen. -> Zentrale mgmt software. Standartisierung
|
||||
- Proxmox ? Im Zusammenhang mit Server von K&P. Vorschlag von K&P. Tobias Aigner soll sich damit auskennen. IMC, neutrino, checkmk auf PVE
|
||||
- qnx server ?? (K&P)
|
||||
|
||||
- Zugang fuer Reegeineering zu Programmierung wichtig -> dann kann neue Switch in den September geschoben werden
|
||||
|
||||
- phwin auf 07.08 schieben
|
||||
|
||||
## Zusammenfassung
|
||||
|
||||
- eine 24 Switch gebraucht. Wer bestellt sie?
|
||||
66
projects/tu/meetings/20250814-rcm-neutrino.md
Normal file
66
projects/tu/meetings/20250814-rcm-neutrino.md
Normal file
@@ -0,0 +1,66 @@
|
||||
|
||||
## Teilnehmer
|
||||
|
||||
- Tobias Moser
|
||||
- Anton Kastenmueller
|
||||
- Andreas
|
||||
- Christoph Lierse
|
||||
- Petar Cubela
|
||||
|
||||
## Themen
|
||||
|
||||
- Switch
|
||||
- Neutrino Server
|
||||
- Dienstleister
|
||||
|
||||
|
||||
## TODO
|
||||
|
||||
- [ ] 2. switch - abwasser haus
|
||||
- [ ] vpn routing fuer brosche checken
|
||||
- [ ] proxmox angebot info - warum so teuer?
|
||||
- [ ] vpn mit otp einrichten fuer tobias
|
||||
- [ ] macmon pruefen
|
||||
|
||||
## Dienstleister (Andreas)
|
||||
|
||||
- Vorstellung
|
||||
- seine Taetigkeiten und Expertisse
|
||||
|
||||
## RCM
|
||||
|
||||
- Switch und Kabel - fehlender Port
|
||||
- Macmon fuer RCM
|
||||
- Proxmox Server mit ICM - Toni Aigner soll den installieren - ersetze icm durch checkmk
|
||||
- K&P - einmal im Jahr backup - verwaltung ueber phwin mit neutrino. sehr alt - uhr alter dell server - ausfallsicherheit?? - aktuell dell mit esxi 6
|
||||
- interessante software auf test VMs
|
||||
- netzwerkdiagnose software in vm auf eigenem interface - remote monitoring port auf switches (mirroring)
|
||||
- abwasser gebaeude - 8 port switch - auch eine neue switch?
|
||||
|
||||
### Proxmox
|
||||
|
||||
- 12000 Server
|
||||
|
||||
**Software**
|
||||
|
||||
- IMC
|
||||
- CheckMK
|
||||
- MACmon
|
||||
- Netzwerkdiagnose mit Monitoring
|
||||
- Test VM
|
||||
|
||||
### PHWin - Neutrino
|
||||
|
||||
- OPNsense laesst nur BACnet durch.
|
||||
- Neutrino Server ist in GA (10.52.12.0/24) und Bestandsnetz (192.157.165.50?) (VLAN 165)
|
||||
- Tobias Moser: moechte Zugagng. OPNsense blockt.
|
||||
- RCM wollen eben nicht, dass jemand Zugang hat.
|
||||
- Tobias braucht ihn.
|
||||
- Read-only User moeglich.
|
||||
- BACnet nicht save. BACnet-secure geht hier nicht. -> alles dicht
|
||||
- VPN Zugang fuer Tobias fuer Zugang zu phwin
|
||||
|
||||
### Meine Themen
|
||||
|
||||
- Neutrino - OPNsense - Ports
|
||||
- proxmox kann ich unterstuetzen - Verantwortung
|
||||
32
projects/tu/meetings/20250821-meeting.md
Normal file
32
projects/tu/meetings/20250821-meeting.md
Normal file
@@ -0,0 +1,32 @@
|
||||
# Oli Meeting
|
||||
|
||||
## proxmox
|
||||
|
||||
- proxmox macht anton aigner
|
||||
- k&p macht den umzug
|
||||
|
||||
## glt server
|
||||
|
||||
- win10 maschinen upgrade zu win11 oder am besten windows terminal server
|
||||
- lrz - treffen nachfragen. - 1.10 15-17 lrz - 23.09 10-12 - tobias fragen wer da hingeht
|
||||
|
||||
## macmon
|
||||
|
||||
- lizenz laeuft bald ab - wenn unter 5k direkt bestellen sonst angebot
|
||||
- unterlizensiert - pruefen
|
||||
- rcm? in bestehende einbinden oder eigenes - separat von unserem netz
|
||||
|
||||
# Tobias Meeting
|
||||
|
||||
## phwin
|
||||
|
||||
- neue phwin lizenzen
|
||||
- neue maschinen/hw. zweites system
|
||||
|
||||
- rcm - ploetz - hw austausch fuer neuen qnx
|
||||
- 19 zoll einschub qnx server - k&p fragen - computer fuer irgendwas - wasserschaden??
|
||||
|
||||
## rcm ga netz
|
||||
|
||||
- gateway problem geloest
|
||||
- vpn tobias - schicke ihm alles
|
||||
32
projects/tu/meetings/20250904-meeting.md
Normal file
32
projects/tu/meetings/20250904-meeting.md
Normal file
@@ -0,0 +1,32 @@
|
||||
|
||||
## RCM GA Netz
|
||||
|
||||
**Teilnehmer:**
|
||||
|
||||
- Tobias Moser
|
||||
- Oliver Kaspar
|
||||
- Christoph Lierse
|
||||
- Anton Kastenmueller
|
||||
- Grosslhuber
|
||||
|
||||
## Themen
|
||||
|
||||
- otp-vpn geht jetzt
|
||||
- regeneering hat gateway eingetragen -> NAT Regel kann wieder weg
|
||||
- Switch wurde getauscht
|
||||
|
||||
- Tobias will keine virtualisierung -> desktop computer der innerhalb von 24h liefern und ersetzen -> Virtualisierung sollen sie unter eigener verantwortung macht
|
||||
|
||||
- aktueller imc server wird pve host -> qnx backup, checkmk, network monitoring, imc
|
||||
- cisco ap's sollen ausgetauscht werden. Ruckus mit on-premisses controller. Cloud nicht gewuenscht
|
||||
- neuer leiter am 01.01.2026
|
||||
|
||||
- paul nothaft soll firewall migration machen
|
||||
|
||||
## TODO
|
||||
|
||||
- [x] nat regel aus opnsense wieder entfernen
|
||||
- [ ] softbox soll nicht mehr fuer die betreuung des rcm ga netz verantwortlich sein
|
||||
- [ ] ga netz in funktionierenden standard ueberfuehren
|
||||
- [ ] macmon fehlt noch -> installlieren. Als VM oder bare metal?
|
||||
- [ ] qnx server plattform -> k&p installiert heute einen im crc fuer `_____`? -> Backup durch NAS
|
||||
8
projects/tu/messschacht-ubnt/kindkerhaus.md
Normal file
8
projects/tu/messschacht-ubnt/kindkerhaus.md
Normal file
@@ -0,0 +1,8 @@
|
||||
|
||||
## stromverbrauch
|
||||
|
||||
- pv 47 V 10 A.
|
||||
- solar charge controller: 0.5 W. (25 V. 12,5 mA)
|
||||
- Batterie 10 A. 12/24V
|
||||
- nivus: 20 W
|
||||
- ap: 12 W
|
||||
Reference in New Issue
Block a user