![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
Is the NIC built into the motherboard or an add on pcie card?
You could check the journal to see if the logs tell you anything.
Is the NIC built into the motherboard or an add on pcie card?
You could check the journal to see if the logs tell you anything.
You could try taking some packet captures from opnsense and your server while accessing your externally available web server. Reviewing the pcaps might give you some hints on how fix it based on what behaviour you see in the captures.
This is how I would do it also, assuming you aernt passing the NICs through to VMs
Once you change your DNS server in your router, make sure to renew your clients DHCP lease. It may still be using the stale DNS server. On windows verify its using the new DNS server with: ipconfig /all
No issues jumping straight from 37 server edition to 40.
This website has a bunch of great practice “wargames”. You’ll learn a bunch about common linux commands and the different options for them. It also provides you with some great tips on what to google if you get stuck. I reccomend starting with bandit.
+1 for openscad. I switched over from Fusion 360 back when autodesk changed the personal use license in 2020.
It takes a bit to get used to it, but once you’ve made a few parts you begin to see how powerful it can really be.
Its also super lightweight, so you can run it on most systems without any issues. I’ve ran in on a chromebook before.
The only thing I miss about fusion 360 is an easy way to add fillets to parts, that can be tricky in openscad. I use chamfers for the most part though, so I don’t miss it much.
The blue chat bubble is signal
If you use Firefox, the reader view works great when you want to look at just the article and nothing else.
I do this same thing. I have Ubuntu on an external ssd with its own EFI partition. I followed this guide to get it setup and it works great.
I do something similar with opnsense and policy based routing. opnsense is acting as both a VPN client and server. The client interface connects out to a commercial VPN, and the server interface listens for incoming connections. Based on what I I want to accomplish I setup firewall rules that use policy based routing to route incoming VPN traffic where it needs to go.
Regarding split tunnel on the client, the Android wireguard app has the option to specify what traffic uses the tunnel based on the application