Yeah, such a nightmare, lol. If I ever feel like hosting a honeypot I’ll probably DMZ it or use a VPS or something, but I’m going to change gears on projects for now.
Rank choice, and more party options to use it on
Updated with the forum posts
Gotcha. I’m using a ATX 1800 with full tunnel. I figured there would be a default deny all (haven’t touched anything in the way of the firewall on that device yet), but wasn’t sure if ARP would be able to get past it from the public AP side. I guess I can always do a few experiments at home in the lab too. Thanks again!
Ty!
Thank you, I might give this a try tomorrow. I thought I read something similar, but that it would require you to take care of log rotation as well otherwise they would just grow. Not sure how true that is.
Awesome, this will be my weekend project. Thanks so much!
Thank you, checking this now. I made a change I found on a video and made a new post here.
How did you relevel your gantry? From what I see, you can loosen the two things I pointed to in my new post.
It does seem like one of the screws it touching the side of the stabilizer at the top, and the other is perfectly straight and isn’t, so I might need to look into that. Thanks for pointing me in the right direction.
Ahahahah. That’s hilarious 😂. Well that makes the choice easy, thanks.
I’m the same way. All my smart devices are on their own VLAN with no WAN access (egress or ingress). Does Bambu require that?
I actively avoid and move away from HA type devices that do not work without WAN. There’s no reason that me pushing a GUI button to turn off a light needs to do anything more than travel to my AP, to HA and then to the light. Let’s not bring the cloud into this.
Thank you!
Perfect, thank you
Thank you for the reply.
Good points; I didn’t realize that some boards are powder coated (more color options) and some are anodized (more durable) until I noticed a small scratch on my Zoom TKL. I’m gonna grab a Glare or F1-8X V2 next time they’re available
Dang, I just applied to a couple positions there. I’ll go ahead and retract those :D
Is keeping everything inside of a local “walled garden”, then exposing the minimum amount of services needed to a WireGuard VPN not sufficient?
There would be be no attack surface from WAN other than the port opened to WireGuard