Least_Hospital_2428

joined 1 year ago
[–] Least_Hospital_2428@alien.top 1 points 11 months ago

I tried that. Nothing plugged in except the PSU and front headers, mobo sitting on a stack of paper, no response at all when I hit the switch. I’m working on returning now 😞

 

I had a cool little bare-bones server that had an x8 series mobo and I wanted to turn it into a NAS. I ended ordering a X11SSM-F board so that I could use some better hardware. From what I could tell it should be a simple swap, but I put everything together today and cant get the dumb thing to POST.

Ive tried unplugging everything but the PSU and send the power-on command from IPMI. I've tried with 4 sticks of ram, 1 stick and no ram. I never get a beep or fans or anything.

I bought this board off ebay and it came with a processor installed and was "pulled from a working system". If I can Verify that its DOA then I'm sure I can get a refund, but I want to make sure I test everything I can before going that route.

[–] Least_Hospital_2428@alien.top 0 points 1 year ago (1 children)

I probably am making it more complicated than necessary. I’m pretty green to the network side of this and admittedly over concerned about IoT devices tunneling out and becoming spyware.

That being said, I like this approach. I have WAN & LAN, I’ll probably just add DMZ and IoT. I may add another physical layer between the pfSense IoT NIC and the IoT switch. It probably doesn’t add any security, but it should relieve some if the routing load from my current pfSense box. And it gives me a warm fuzzy feeling.

 

So I fall pretty heavy on the paranoid side when it comes to all the Chinesium home automation and IoT devices. However, my wife wants me to put up some security cameras and if I’m going to do that then I might as well add all the other life conveniences that I want. I would love to keep everything 100% air gapped, but I know that would defeat the purpose of most stuff.

Here is a rough linear diagram of what I think I can do: Internet > pfSense > home network > IoT hub > IoT network

The important thing to note is that I want no traffic to make it from the ‘IoT network’ to the Internet. And the only traffic I want going from the ‘IoT hub’ to the ‘home network’ is a browser interface for the software I’m planning on using.

If I understand correctly, this is pretty easy to do with a firewall on the ‘IoT hub’. I should be able use separate NICs, completely lock down the ‘home network’ NIC, and just allow one application access to one port so that I can open my browser interface.

Is this about as secure as it gets? Or is there a better way?