Home Network and Internet Access

Over the years I’ve had a few network configurations.

In the mid-80’s I ran a BBS and connected to other BBSs through a transfer scheme. My system would be accessed at all hours and I had the biggest collection of utilities and games in the area at the time.

In 1989 I got a job at Johns Hopkins APL and I got direct internet access. With that, I started poking around on how to get access at home without going through a pay service like AOL or CompuServe or Prodigy. One of my coworkers at jhuapl recommended PSINet and I was able to finally get to get direct access to the Internet.

In the mid-90’s Comcast started offering access with a mixed cable/dial-up configuration and I switched over. Faster download speeds was a big draw and the payment was less than PSINet.

Comcast eventually offered full cable access. At that point I repurposed an older system as an internet gateway. It gave me the ability to play with Red Hat at home plus I’d just become a full time Unix admin at NASA. I had a couple of 3Com ethernet cards in the old computer and was running Red Hat 3 I think. It worked well and I was able to get access to the Internet and Usenet.

One of the problems though was Red Hat or the 3Com cards didn’t support CIDR. I’d gone through a system upgrade again and put the old system to the side. I built a new system and used Linksys cards (I still have one in a package 🙂 ) and Mandrake Linux as a gateway and firewall. I learned about iptables and built a reasonably safe system. I did have my schelin.org website on the server using DynDNS to make sure it was accessible, and hosted pictures there but since it was on Comcast user space, not everyone was able to see the pictures. It was about this time that I started looking in to a hosted system and went to ServerPronto for a server hosted in a data center in Florida. I configured the local system (now using Mandriva after the merge) to access the remote server and configured that server with OpenBSD.

In 2004 I bought an Apple Extreme wireless access point (WAP) for my new MacBook G4. I added a third network interface to the gateway and blocked the laptop from the internal network (only permitted direct internet access). By this time I also had a Linksys 10/100 switch so other systems could directly access the ‘net.

In 2008 it was time to switch systems again. My old XP system, which was reasonably beefy with 300 Gigs of disk space mirrored and 16 gigs of RAM was converted over to be a firewall and the old box wiped and disposed of at the computer recycling place. I installed Ubuntu to muck around with it and configured its firewall. Still running three network cards and a new Apple Extreme as the old one tanked.

In November 2015, I was caught by one of the Microsoft “Upgrade to Windows 10” dialog boxes and upgraded my Windows 7 Pro system with Windows 10. For months there were problems with some of the games I played and other issues with drivers.

Around February 2016, the Virtualization folks at work were in the process of replacing their old VMWare systems. These systems are pretty beefy as they run hundreds of virtual machines. A Virtual Machine is a fully installed Unix or Windows box but only using a slice of the underlying physical system. It severely reduces time and cost in that I can get a VM stood up pretty quickly and don’t have to add in the purchase and racking of a physical system. Very efficient.

Anyway, they were decommissioning the old gear and one of the guys asked me if I was interested in one of the servers. I was a bit puzzled because I didn’t know they were decommissioning old systems and thought it would be on my desk or something. But I said sure and looked at my desk to see where I’d put it. But I received the paperwork and it was actually transferring the system to my ownership. Belongs to me, take it home. Woah! I signed off and picked up the system from the dock a few days later.

The system is a Dell R710 with 192 Gigs of Ram, 2 8 Core Xenon x5550 2.67GHz CPUs, 2 143 Gig 10,000 RPM Drives set up as a RAID 1 (mirror), 4 750 Gig 7,200 RPM Drives, 4 onboard Ethernet Ports, 1 4 Port 1 Gigabit PCI card, 1 10 Gigabit PCI card, and 2 2 port Fiber HBA PCI cards.

Holy crap!

I immediately set it up as a gateway and firewall using CentOS 7. I’d recently received my Red Hat Certified System Admin certification and need to try for my Red Hat Certified Engineer certification. This gave me something to play on. I set up the firewall and got all my files transferred over. The old box (XP then Ubuntu) is sitting under my desk.

In March of 2016, I bought a new system entirely. In part because of the issues I was having with my 2008 system and in part because of a decent tax check refund. Over the years I’d added a couple of 2 TB drives to the 2008 system so they were transferred over to the new system. I also have an external 3TB drive that stopped working for some reason.

I moved the 2008 system away and got the new one up and running. I had to do some troubleshooting as there were video issues but it’s now working very well.

But in mid summer the Virtualization folks asked me again if I wanted a system. They were still decommissioning systems. Initially I declined as the one I have actually does work very well for my needs but one of my coworkers highly suggested snagging it and setting up an ESX host running VMware’s VSphere 6. I’d been mucking about with Red Hat’s KVM without much success so I went back and changed my mind. Sure, I’ll take the second system.

The new system is a Dell R710 again. It had 192 Gigs of RAM but the guy gave me enough to fully populate the system to 288 Gigs of Ram. It also had 2 6 Core Xenon X5660 2.8 GHz CPUs, 2 143 Gig 10,000 RPM Drives, 4 750 Gig 7,200 RPM Drives, 4 onboard Ethernet Ports, 1 4 Port 1 Gigabit PCI card, 1 10 Gigabit PCI card, and 2 2 port Fiber HBA PCI cards just like the first one. One of the drives had failed though. At suggestion, I puchased 5 3 TB SATA drives. This gave me 8 TB of space and a spare SATA drive in case one fails plus the remaining 3 750 Gig drives are available to the first system in case a drive fails.

I configured the new system with VMWare and created a virtual machine firewall. I created a VM to replace the full physical system and copied all the files from the physical server over to VMs on the new system. With all that redundancy, the files should be safe over there. They’re plugged into a UPS as well as is my main system. I’ve been using UPSs for years, since I kept losing hardware due to brownouts and such in Virginia.

Once everything was copied over, I converted the first system into an ESX host. That one has my sandbox environment now. Mirroring the work environment in order to test out scripts, Ansible, and Kubernetes/Docker.

My sandbox consists of VMs which have been set up for three environments, and use a naming scheme that tells me what major OS version is running.

For Ansible testing, at site 1, I have an Ansible server, 2 utility servers, and 2 pairs each of 2 CentOS 5, 6, and 7 servers (2 db and 2 web). 15 servers.

At site 2, I also have an Ansible server, 2 utility servers, 2 pairs each of 2 Red Hat 6 and 7 servers (2 db and 2 web). 11 servers. And Red Hat will let you register Red Hat servers on an ESX host for free which is excellent.

For off the wall Ansible testing, at site 3, I have just a pair of servers for current versions of Fedora, Ubuntu, Slackware, SUSE, FreeBSD, OpenBSD, Solaris 10, and Solaris 11 (1 db and 1 web). 16 servers.

For Kubernetes and Docker testing, I have 3 master servers and 5 minion servers. 8 servers.

So far, 50 servers for the sandbox environment.

For my personal sites, I have a firewall, a development server, 3 host servers for site testing, a staging server, a remote backup server, a local Samba backup server, a movie and music server, a Windows XP server, a Windows 7 server, and 2 Windows 2012 servers for Jeanne’s test environment. In general, these were all on the XP server I had before I got the R710. The ability to set up VMs lets me better manage the various tasks including rebooting a server or even powering it off when I’m not using it.

And 13 servers for 63 total servers.

But wait, there’s more 🙂

In September, the same coworker made available a Sun 2540. This is a drive array he got from work under the same circumstances as the R710’s I have. He’s a big storage guy so had a lot of storage type stuff at home. I picked it up along with instructions, drive trays (no drives though), and fiber to connect to the two ESX systems. Fully populated with 3 TB drives, this would give me 36 TB of raw disk space. As RAID 5 loses a drive, a single RAID 5 would give me 33 TB however the purposes of this is to present space to both systems so I’d need to slice it up. I checked on line and purchased 6 3 TB drives for 18 TB raw, RAIDed to 15 TB and the same guy pointed us to a guy in Colorado Springs selling 18 2 TB drives. I snagged 8 and completely populated the array with 6 2 TB drives for 12 TB raw, RAIDed to 10 TB giving me 25 TB of available space to the two ESX systems. Because of the age of the 2540, I have Solaris 10 installed so I can run the Oracle management software.

As the 3 TB external drive had tanked for some reason, I extracted it from the case and installed it into the Windows 10 system. I wanted to mirror the 2 2 TB drives but couldn’t as long as there was data on it. With a 3 TB drive, I can move everything from the 2 TB one and then mirror the drives for safety.

I’ve come a long way from a single system with maybe 60 Megabytes of disk space up to a Home Environment with 70 Terabytes of raw disk space.

And of course, more will come as tech advances.

Posted in Computers | Leave a comment

Setting up pfSense

Over here I configured a firewall to replace the old single system based firewall. One of the guys at work recommended installing pfSense as a VM to replace the firewall. pfSense from the firewall aspect is wrapped around pf, the BSD Packet Filter software. I’ve used it on my old OpenBSD system so I’m somewhat familiar with it from the ruleset. Plus I already have the firewall running so it wasn’t a big deal to at least give it a shot. I downloaded the FreeBSD based .iso and created a Virtual Machine using a basic configuration of 1 CPU, 1 Gig of Ram, and 20 Gigs of space (mainly logs). As it’s a VM, I can add resources as needed. I also added the three interfaces I configured for the Firewall.

Booting to the ISO comes up with a simple menu for access to other features or by default starts installing the package. Next up is to configure the console. Next I selected the ‘Quick/Easy Install’ as I didn’t have all that much experience with the tool and really don’t have a complicated environment except for the Wireless Access Point for the third interface. “Are you SURE?” is next and basically says it’ll just install pfSense and erase the disk. Again, no problem as it’s a VM. If it tanks, I kill it and build a new one (case in point, I’m writing this after I’ve had pfSense up for a bit and am building a second VM to remind me what I did for this posting 🙂 ).

Okay and it’s on its way (wait, it is asking a question about the Kernel; just continue).

And it’s done. Took about 2 minutes even with swapping between there and here.

Reboot and let it start up. I’ve disabled all three interfaces for this one as I didn’t want it interfering with the current running one. It does come up with a start menu which will let me configure it. WAN is em0, LAN is the internal network, default to In this case, reIPs to This is also the web interface which is where I can configure the system.

Login for a new system is ‘admin’, ‘pfsense’. Change it of course.

Once in, a wizard starts up to help configure the system. First, do you want to upgrade to Gold 🙂 Next is to configure the hostname and gateway. Set the ntp server and zone. Next is configuring the WAN DHCP information. Since it’s DHCP and no special settings, Next. Configure the LAN Interface is next. As it’s already configured, I left it at the initial settings. Next, reset the admin account password. And done, click the Reload button and the firewall is ready to use.

As I have a Wireless connection as well, I needed to add the interface in. Under Interfaces, select (assign) to show the existing three. It shows the first two; WAN and LAN and an Available network port for the third interface. Click Add and it becomes ‘Opt1’. Click on it and it takes you to the configuration page for the interface. Initially it’s not configured. I select Static IPv4 from the IPv4 Configuration Type drop down and entered the new IP address for the IPv4 Address ( for purposes of the instruction). I did not check the Reserved Networks checkboxes. Click the Enable checkbox at the top and click the Save button. It tells you the configuration has changed and that you need to Apply Changes. Note that this stays as a reminder even if you close the browser tab.

Next is the Firewall drop down. As I have no reason to permit inbound traffic to my system, I left the WAN configuration at default of ‘All incoming connections’…’will be dropped’. LAN configuration was also left at default.

The OPT1 (Wireless) interface had two rules added.

As I wanted it to pass traffic to and from the ‘net, I added an Allow to Any rule. Interface: Opt1, Address Family: IPv4, Protocol: any (note the default is tcp; it caught me initially 🙂 ). Finally Source Opt1 Net, Destination any. Description is ‘Default allow OPT1 to any rule’.

Not done though. I don’t want Wireless traffic permitted on the internal network so I added a second rule. This one is Action Reject, Protocol any (don’t forget, default is TCP), Source OPT1 net, Destination LAN net. Description: Drop inbound traffic to Internal.

And as far as the firewall configuration is concerned, I’m done. I did want to use some of the other features so I started poking around the menus a bit. I set up two services: DHCP, DNS, and NTP.

I set up DHCP to be enabled on the LAN interface and added a network range of to I set up the DNS server to be (the pfSense server). Default gateway is the also the pfSense server so that can be blank. I added a Domain search list of ‘internal.pri’ as I use that for all my behind the firewall domains. I also enabled the rrd statistics graphs as I’m used to using rrdtool.

I can also enable DHCP on the Wireless lan but since I have an Apple Extreme WAP, it already handles that for me so I ignored it.

For DNS, I only needed to use the General Settings as it wasn’t all that complicated. I did Enable Forwarding Mode but left everything else alone. As I started adding VMs though, I added the IPs to DNS.

In order for CygWin on my Windows 10 system to use it as DNS, I had to manually enter the ‘internal.pri’ in the DNS suffix for this connection box:

Network and Internet
Change adapter options
Click on Network 2
Change settings of this connection
Click on the Internet Protocol Version 4 item
Click Properties
Click Advanced
Make sure the IP addresses and Default gateways are right (should be)
Click the DNS tab
Make sure the DNS servers are correct (again should be)
Under the DNS suffix for this connection add internal.pri.

For NTP, I added a few more pool servers as it works best with at least 3 and I set up 5. I did enable RRD graphs for NTP.

And that’s it. You can check out stats for the various services by looking under Status and troubleshoot under Diagnostics.

All in all it seems to be working as desired.

Posted in Computers | Leave a comment

Colonoscopy Time!

Per all the recommendations, it’s something that really should be done starting at age 50 and earlier if you have family history. I just had mine done and I’m 6 months away from 60.

One of the problems I’ve had with doing it at 50 was the cost. At around $4,000 and not always covered by whatever plan you’re on at the time, it wasn’t something I was financially prepared for. I’ve been saving over the past 2 years though through an HSA so I can have it done now.

I went in a month or so back due to a different medical problem (first time seeing a doctor in many years) and the doctor said I should schedule myself for the procedure. The big plus, last year Medicaid pays fully for the procedure making it cost me nothing. Even with a high copay right now, my cost and copay is zero bucks.

Sign me up then!

I heard the horror stories about making sure you were always a few feet away from the toilet because the preparation meds really really clean you out (really!) and quickly. I did get the 4 liter container with the preparation chemicals plus a small packet of lemon flavoring. I will say lemon does leave a film on the teeth. I started prep last night at 6pm per instructions after eating nothing after 7am (procedure was scheduled for this morning at 9:30am). It really wasn’t as bad as folks say in my experience. The fluid was a bit thick feeling, like taking the Alka-Seltzer Cold, but a touch on the salty side. Maybe due to it having electrolytes mixed in. While I did have to hit the toilet several times before going to bed and again in the morning, I mostly had a sense of fullness vs the urgency you feel with actual diarrhea when you eat something that disagrees with you.

I had to drink a glass every 15 to 30 minutes and drink until the liquid leaving the body was clear. You also must drink a lot of water because you will be dehydrated by the fluid (I drank about 5 liters of water throughout the day in addition to the 2 liters of laxative starting at 6). The nurse also said to drink half starting at 6 and the remainder before 7am this morning. By 7am I’d finished it off and exiting fluids were mainly clear with a yellow tinge to it.

Another thing folks mention is being very hungry. I have to say I felt almost no hunger throughout the day. I did spend my time hacking code and playing Doom after adjusting the Gamma to 1.0 (much much better).

Getting to the clinic was no big deal and the nurse said they were ready right now (8:45 vs 9:30) so I was brought back, given instructions, and signed the waiver that let them remove any polyps found. She did say at my age, about 30% of patients have polyps and that the most they’d ever removed was 49 in one session! She said smokers typically had more polyps than non-smokers.

I stripped, got dressed in the gown, lay down, and she covered me with a warm blanket. Did the blood pressure cuff, the finger cuff for heart rate, and then tried to locate a vein for the drugs. Being dehydrated even with the water I drank, she had a hard time. After many slaps trying to raise a vein, she finally tried my right hand. Insertion was pretty damned painful and it felt like she hit a tendon (the funny bone feeling along the finger). She pulled it out and observed “no bleeding”. Even with the large amount of water, I was still dehydrated. I pointed out that when I give blood, my left arm is generally the best place. She removed the cuff and was able to (again, painfully) successfully insert the needle.

And we’re ready to go!

I was wheeled down the hall into the room. The room itself was pretty cool itself with a large screen to my left and several screens and dangly bits to my right. I was instructed to lay on my left side and bring my legs up as if I was sitting down. She started the drugs and within 30 seconds I was feeling dizzy. The drug was a Conscious Anesthetic so I was awake but as friends say, I didn’t care. 🙂

Per the nurse, I wasn’t to drive, drink alcohol, or sign important documents for 24 hours and that I would have trouble remembering the procedure.

I do remember watching a part of the procedure on the screen and a few instructions or just a push by the doc or Nurse to shift around a little but that was it. I don’t remember being wheeled out or being taken to the reception area. I do remember farting though and getting a “good job” from someone. 🙂 My girlfriend was there to drive me home and I don’t recall asking her to take any pictures of me in the reception area still on the gurney but she has a few pics 🙂 Apparently I told her about the hand and tendon a few times. I don’t remember getting dressed. I do remember slightly leaving the office but not the elevator and vaguely recall the parking lot but not getting in the car. I just remembered her wandering around in the parking lot looking for a gas station so she could get me a soda (wanted the caffeine before headaches kicked in) and a few “there’s a long runway to get on back on the road” comments.

Later Jeanne mentioned I was in the recovery room and the nurse had removed the cuff and finger clip but I don’t remember the needle being removed. Jeanne did say I got up from the gurney, with just a T-Shirt and socks, and the nurse walking in on me, “oh my” 🙂 I remember the nurse asking if I wanted something to drink or eat; apple juice, orange juice, graham crackers, or animal crackers. I wanted apple juice. I remember that it was warm but I did drink it down. I drank down the apple juice and threw it away but do not, even with Jeanne reminding me, remember getting dressed.

I did take a slight nap in the car and as we getting close to home, I recall feeling cold sweats and nauseous. Probably because I’d been fasting for more than 24 hours. Jeanne was willing to get me something to eat but I only wanted some toast, unbuttered, and drank some of the soda. I tucked in to the couch and slept for about 4 hours (around 1pm). I felt a lot better after that and Jeanne headed out to get lunch.

Oh, and they removed 2 polyps so less than the record but in the 30% of patients. I do remember that

It’ll be about a week before they return the results of the biopsies. The results will dictate how often I’ll need to return for further cleanup. 10 years is the default but it could be less if there are problems with the biopsies.

Posted in About Carl | 1 Comment

Using a VMWare Virtual Machine As An Internet Gateway

I’ve been using my old cast off computers as internet gateways for a couple of decades now. I’d upgrade my current system, build a new one, and stick the old one in a a new Firewall/Gateway. I seem to learn better when I have something to do with it. I started with Red Hat Linux until it stopped using 3Com Ethernet cards (3c503) (issue with CIDR). Then Mandrake for several years. Then OpenBSD for a bit. Then Ubuntu. And most recently CentOS 7. I’ve used iptables a couple of times, the OpenBSD pf firewall set, back to iptables on Ubuntu, and now firewall-cmd.

A few months back, one of the teams at work was in the process of replacing their old gear with new gear. Standard lifecycle type stuff. A few of us were asked if we wanted to keep any of these cast off systems. I was a bit puzzled but sure. I’ll use it as a sandbox type thing at home. These are bigger systems as they were the older ESX servers used by the Virtualization Team. A Dell R710 (this is a rack mount server vs a desktop or laptop system).

Dell R710, 192 Gigs of Ram, 2 8 Core Xenon x5550 2.67GHz CPUs, 2 143 Gig 10,000 RPM Drives, 4 750 Gig 7,200 RPM Drives, 4 onboard Ethernet Ports, 4 PCI Ethernet Ports.

Woah. Big box. The 2 143 Gig drives are mirrored as RAID 1. The 4 750 Gig drives are mirrored as RAID 5. This gives me 143 Gig for boot and 2 TB for data.

I built it up as a replacement for my old system. Part of this was learning how to use CentOS 7 with the new systemd and *ctl commands. I snagged my rules for the old system (iptables) and learned how to set up the new system.

I’ve used 3 network interfaces for quite a few years. One for Comcast or Internet traffic. One for my Wireless traffic. And one for my internal network. My Wireless has always had a hidden access point with security turned on. Plus it isn’t permitted access to the internal network. It uses the firewall as strictly a pass through to the ‘net. I copied all my files from the old system to the new one and have spent the past few months making sure things work as expected.

But there’s more 🙂

A few months later and they’re still decommissioning old gear. This time I was asked if I wanted a second system. Honestly I was fine with the first one. Lots and lots of power. But one of the other guys suggested I use it as a VMWare ESX host. We use VMWare a lot at work with some 400 or so virtual machines that my team manages plus these were ESX hosts so they’re really already built for this sort of thing.

While I initially said no, I went back and agreed to take the second one. I’ve been trying to use KVM to learn Kubernetes, Docker, and Ansible but it’s a bit rough to use and I was having the most trouble with getting the network working correctly without dicking up my firewall. So new system.

Dell R710, 288 Gigs of Ram, 2 6 Core Xenon X56660 2.8 GHz CPUs, 2 143 Gig 10,000 RPM Drives, 4 750 Gig 7,200 RPM Drives, 4 onboard Ethernet Ports, 4 PCI Ethernet Ports.

Well, a _bit_ more Ram. More power to the processors but fewer. One of the 750 Gig drives had failed as well. At the recommendation of the same guy at work 🙂 I popped on line and chased down the maximum size drives these things would take. 3 Terabytes! I picked up 5 of them, 4 as replacements for the existing 750’s and one spare just in case. I pulled the four 750’s, put in the four 3 TB drives and the new system now has 8 Terabytes of disk space in a RAID 5.

I installed vSphere from VMWare and started building virtual systems. First a 8 node system for my Kubernetes and Docker testing. Next three nodes for my development environment. And most recently 3 nodes for my Ansible environment plus 12 nodes for the sandbox for Ansible (4 CentOS 5.4, 4 CentOS 6.5, and 4 CentOS 7.2 system to mirror the basic work environment).

But you know. Since the system is up and running, I should be able to create a virtual system that’s pretty thin with all the power I need for a firewall. Updates to the firewall system can take a good bit of time if I have to reboot, say for a kernel upgrade. I have the configuration from the current system of course to apply to the new system. And I would just need to pull the cable from the current physical gateway to the virtual gateway to test, then back if it’s not working as expected.

But first, let’s move the existing web sites off the firewall to the virtual environment. They don’t need to be up all the time. Just the backup for the forums and blogs.

The photo site takes about 250 gigs; pictures (35 Gigs), site backups (42 Gigs), and system backups (175 Gigs). So a new VM with 500 gigs will at least hold all this while I build up a firewall.


The vSphere client has its own idiosyncrasies such as making sure I use the E1000 interface with CentOS 5 systems or making sure I disconnect before resetting the system or the iso gets locked and I have to close the vSphere client. Also, at recommendation, I enabled ssh access to the system. Even better. Now I can poke around with the esxcfg utilities. I believe everything you can do in vSphere can be done with the CLI which makes me happier.

Next up, I need to create a couple of vSwitches or Virtual Switch. With this, I can isolate the three networks and ultimately set up the second R710 as a second ESX host in a cluster.

In the vSphere client, select the home system and the Configuration tab. Click on Networking and you’ll see your current configuration. If you want to add network adapters to your current switch, you’d click on the Properties and add adapters and then ‘Team’ them. In this case I want to create unique networks so click on ‘Add Networking’, then Next as you’re adding a new network. Select the NIC you want to use for the new vSwitch and click Next. Give it a good label. I used Wireless for one and External – Comcast for the third switch. Then Finish. Do the same for the second switch if that’s what you are adding. I’m adding two switches so I added the second one.

For the VM, add the two additional networks to the base configuration. One for Wireless and one for the External – Comcast network. I of course upgraded the system once it was booted from kickstart. Next up, setting up the firewall.


Make sure you have forwarding enabled as this will be a router. In /etc/sysctl.d, add the following line to ’99-ipforward.conf’.

net.ipv4.ip_forward = 1

Next of course, start firewalld.

# systemctl enable firewalld
Created symlink from /etc/systemd/system/dbus-org.fedoraproject.FirewallD1.service to /usr/lib/systemd/system/firewalld.service.
Created symlink from /etc/systemd/system/basic.target.wants/firewalld.service to /usr/lib/systemd/system/firewalld.service.
# systemctl start firewalld

Now let’s see what’s in place by default.

# firewall-cmd --get-zones
block dmz drop external home internal public trusted work

For firewall-cmd, I need to utilize only three of the available zones. So I don’t have to define new zones, I’ll associated one of the three interfaces with the appropriate zone; dmz for wireless, internal for the home network, and external for comcast.

And let’s see what the default zone is.

# firewall-cmd --get-default-zone

The default zone is ‘public’ so first I want to change it. In general always add –permanent when configuring the system. That adds it to the files in /etc/firewalld. In this case you can’t but for future commands.

# firewall-cmd --set-default-zone=internal

I have three interfaces. Sadly they come up as eno16777984, eno33557248, and eno50336512. I want to rename them to be a bit shorter to make them easier to manage. In /usr/lib/udev/rules.d edit the 60-net.rules file and add the following line for each of your interfaces. You’ll need to get the MAC address from each interface before hand so ifconfig or ip addr first.

ACTION=="add", SUBSYSTEM=="net", DRIVERS=="?*", ATTR{address}=="00:50:56:8e:3f:a7", NAME="ens192"

Replace the ATTR with the interface MAC and NAME with what you want to call it. I called mine ens192, ens193, and ens194 although you could call it internal, external, and wireless I suppose. Don’t forget to rename the ifcfg files in /etc/sysconfig/network-scripts and update the files themselves (the NAME and DEVICE keywords). And of course update the three files with the additional correct information. My wireless network interface is External (ens193) would just use DHCP to connect to Comcast.

With the interfaces more sanely named, I want to bind them to the appropriate zones

# firewall-cmd --permanent --zone=internal --add-interface=ens192
# firewall-cmd --permanent --zone=external --add-interface=ens193
# firewall-cmd --permanent --zone=dmz --add-interface=ens194

Unfortunately this doesn’t make it permanent even with –permanent. I had to add the zone information to each of the ifcfg files as ‘ZONE=’ so when I reboot, they’re still attached to the correct zone.

Next to check the default services as assigned

# firewall-cmd --list-services --zone dmz
# firewall-cmd --list-services --zone external
# firewall-cmd --list-services --zone internal
dhcpv6-client ipp-client mdns samba-client ssh

On my current physical system, I have the following final configuration

# firewall-cmd --list-services --zone=dmz
# firewall-cmd --list-services --zone=external
# firewall-cmd --list-services --zone=internal
dhcpv6-client ipp-client mdns samba-client ssh

I want to make sure the appropriate services are configured. By default, I don’t want wireless or external listening for anything but internal should be listening. firewall-cmd is aware of quite a few services:

# firewall-cmd --get-services
RH-Satellite-6 amanda-client bacula bacula-client dhcp dhcpv6 dhcpv6-client dns freeipa-ldap freeipa-ldaps freeipa-replication ftp high-availability http https imaps ipp ipp-client ipsec iscsi-target kerberos kpasswd ldap ldaps libvirt libvirt-tls mdns mountd ms-wbt mysql nfs ntp openvpn pmcd pmproxy pmwebapi pmwebapis pop3s postgresql proxy-dhcp radius rpc-bind rsyncd samba samba-client smtp ssh telnet tftp tftp-client transmission-client vdsm vnc-server wbem-https

For purposes of this though, I only care about ssh. Since it’s there, I don’t have to create a special rule for it. First off, remove any existing services that may be pre-configured.

# firewall-cmd --zone=dmz --remove-service=ssh --permanent
# firewall-cmd --zone=external --remove-service=ssh --permanent

Next if ssh isn’t part of the zone already (and it is by default) add ssh to your internal zone.

# firewall-cmd --zone=internal --add-service=ssh --permanent

And Masquerading is required in order for networking to work. Add it to the external zone.

# firewall-cmd --zone=external --add-masquerade --permanent

Once done, you’ll need to reload the firewall configuration.

# firewall-cmd reload

Confirm by listing the services available to the zones now.

# firewall-cmd --zone=dmz --list-services
# firewall-cmd --zone=internal --list-services
dhcpv6-client ipp-client mdns samba-client ssh
# firewall-cmd --zone=external --list-services

That should be it. Don’t forget to reip the interface on the public interface on the VM before rebooting. And I had to reconfigure my external server to accept connections from my new DHCP IP I received from Comcast.

Posted in Computers | Tagged | 2 Comments

Weeds and Lawns

The annoying broadleaf weed is Common Mallow. Get ground damp and pull.


Pointy leaves, purple flowers and dense seed puffs is Canadian Thistle. Paint leaves with herbicide.


The succulent in the cracks and edge of the grass is Purslane. Easily pulled when young.


The quick growing vine that climbs fences and plants id Bindweed. Paint with herbicide.


It looks like the clover looking weed with dark leaves too is Black Medic. Easily pulled from damp lawns.


Lawn care fact sheet.


The “paint leaves” is where you want to keep the underlying or surrounding vegetation. For gravel or fence, just spray. The blue Bayer stuff works well.

Posted in Home Improvement | Leave a comment

Building a New Gaming Table

As a tl;dr post, this will be even more of a highlight of the process of building the gaming table 🙂

Several years back, I was testing a new wood working tool and created a quick and dirty gaming table. Bigger than a dining room table and less likely to require a moving stuff for dinner 🙂 As time progressed, I added a felt top to it, fixed the base (from an ‘X’ to a square base), added a rim for more support, and painted it. I used it for RPG gaming and board gaming. It was big enough to hold all the expansions for Arkham Horror 🙂 It was a little off in height though. Just a touch too tall for a dining room chair but a touch too short for bar stools.

As time goes by though, I wanted to make a better table. A bit more sturdy. But a bit more portable, or at least transportable. I’d been looking at tables for years of one sort or another from the extremely expensive ones at $20,000 down to the home built one. At the local gaming shop, they had a board game demo table. About 3′ on a side but two of the sides had a deep tray for things like bags of dice and a center cup holder for a dice cup maybe or a cup of something to drink. Inspiring.

I whipped out my pen and paper and started measuring things to make a table. I liked the deep tray (or trough) and size but I needed a larger table for bigger games. I had other ideas as well and eventually got them written down.

Four 3’x3′ modules with a corner and troughs for each side and section.

The lip on the left shows where I wanted to put the edge of a book or clipboard and after some thought, I added a slot for a support piece.

I decided to go with a hardwood since people will be leaning on the troughs and picked out Poplar in part because of the softer texture of the wood over Oak (and it’s a bit cheaper).

The base

Starting to look like a table

I used a wood dye vs a stain and selected a darker Cherry. After the stain, I covered it with shellac

Finally I coated it all with lacquer

For the table tops, I selected a grey felt and used some wood glue to mount the felt

Once everything was dry, Jeanne and I brought it all into the basement and started assembling it. This should look familiar

We mounted the two opposite sides loosely so they leaned out a little and slid the tops under the slots. When tightened, nothing should move.

Jeanne was an excellent helper 🙂

And the table assembled. I made the dice towers as well.

One of the things I wanted were trays in the troughs. I added a couple of pieces of plywood as a base to the trays (runners).

As you can see, you put a support into the slot, either vertically or horizontally, and it supports a clipboard

Or a book

Ready for Shadowrun in this case.

Behind the screen

And of course, the slots work well for holding cards 😀

I have more bits to add but the core of the table is done.

Posted in Game Table, Woodworking | 1 Comment

3dMark Video Card Testing

At a suggestion from Kevin, I snagged the 3DMark tool to test my systems video.

I ran the program to run tests on the system just to see if it encountered any issues. Nope, everything seems just peachy 🙂

I got a 3,611 Time Spy score which isn’t spectacular (better than 32% of systems).

3DMark Time Spy is a new DirectX 12 benchmark test for Windows 10 gaming PCs. Time Spy is one of the first DirectX 12 apps to be built “the right way” from the ground up to fully realize the performance gains that the new API offers. With its pure DirectX 12 engine, which supports new API features like asynchronous compute, explicit multi-adapter, and multi-threading, Time Spy is the ideal test for benchmarking the latest graphics cards.

But I got a 10,089 Fire Strike score which is real good (better than 72% of systems).

Fire Strike is a showcase DirectX 11 benchmark designed for today’s high-performance gaming PCs. It is our most ambitious and technical benchmark ever, featuring real-time graphics rendered with detail and complexity far beyond what is found in other benchmarks and games today.

I did put the system into SLI mode (connect 2 graphics cards for better performance) but the tests didn’t change and per the site (and for $30) I’d have to run the Fire Strike Extreme to test SLI and Fire Strike Ultra Benchmark test to test the 4K monitor.

3DMark Fire Strike Extreme is an enhanced version of Fire Strike designed for high-end multi-GPU systems (SLI / Crossfire) and future hardware generations.

In addition to raising the rendering resolution, additional visual quality improvements increase the rendering load to ensure accurate performance measurements for truly extreme hardware setups.

Can your PC handle the world’s first 4K gaming benchmark? Fire Strike Ultra’s 4K UHD rendering resolution is four times larger than the 1080p resolution used in Fire Strike.

A 4K monitor is not required, but your graphics card must have at least 3GB of memory to run this monstrously demanding benchmark.

So, sweeeeet 😀

Posted in Computers | Leave a comment

Concert: Free Fallin’

From here

        D/Dsus/Dsus/D/A        D/Dsus/Dsus/D/A
        D    Dsus  Dsus  D   A
she's a good girl, loves her mama
      D D sus    Dsus D   A
loves Je-sus and Amer-ica too
        D    Dsus  Dsus   D    A
she's a good girl, crazy 'bout Elvis 
      D   Dsus        Dsus  D      A
loves hor-ses and her boy - friend too


           D    Dsus Dsus   D  A
and it's a long day  livin' in Reseda
          D    Dsus Dsus    D           A
there's a free-way  runnin' through the yard
          D   Dsus         Dsus  D    A
and I'm a bad boy, cause I don't even miss her
     D   Dsus    Dsus     D   A
im a bad boy for breakin' her heart

        D    Dsus/Dsus/D/A       D    Dsus/Dsus/D/A
and im free,                free fallin'
        D    Dsus/Dsus/D/A       D    Dsus/Dsus/D/A
ya, im free,                free fallin'


        D   Dsus  Dsus    D           A
all the vam-pires walkin' through the valley 
     D    Dsus     Dsus  D     A
move west down Ven-tura  Boule-vard.
            D   Dsus     Dsus     D      A
and all the bad boys are standing in the shadows 
        D    Dsus         Dsus      D      A
and the good girls are at home with broken hearts

       D    Dsus/Dsus/D/A        D    Dsus/Dsus/D/A
and im free,                free fallin'
        D    Dsus/Dsus/D/A        D    Dsus/Dsus/D/A
ya, im free,                free fallin'


        D     Dsus Dsus  D   A
i wanna glide down over  Mul-holland    
        D     Dsus Dsus D      A
i wanna write her  name in the sky
         D    Dsus Dsus D    A
im gonna free fall out  into nothin'
      D     Dsus  Dsus  D     A
gonna leave this  world for a while

       D    Dsus/Dsus/D/A        D    Dsus/Dsus/D/A
and im free,                free fallin'
       D    Dsus/Dsus/D/A        D    Dsus/Dsus/D/A
ya, im free,                free fallin'

       D/Dsus/Dsus/D/A           D/Dsus/Dsus/D/A
       D    Dsus/Dsus/D/A        D    Dsus/Dsus/D/A
ya, im free,                free fallin'
       D    Dsus/Dsus/D/A        D    Dsus/Dsus/D/A
oh!                         free fallin'
       D    Dsus/Dsus/D/A        D    Dsus/Dsus/D/A
ya, im free,            oh! free fallin'
       D    Dsus/Dsus/D/A        D    Dsus/Dsus/D/A
Posted in 2016 Company Picnic, Music | 1 Comment

Concert: Angel Band

From here
C. G. C

    C              F     C
My latest sun is sinking fast
    A        E     A
My race is nearly run
    A               D     A
My strongest trials now are past
    A        E     A
My triumph has begun

E        A
Oh come angel band
E        A
Come and around me stand
D                    A
Bear me away on your snow white wings
   A     E      A
To my immortal home
D                    A    
Bear me away on your snow white wings
   A     E      A
To my immortal home

   A                D       A
Oh bear my longing heart to him
    A        E        A
Who bled and died for me
   A                      D        A
Whose blood now cleanses from all sins
   A          E     A
And brings me victories

E        A
Oh come angel band
E        A
Come and around me stand
D                    A
Bear me away on your snow white wings
   A     E      A
To my immortal home
D                    A    
Bear me away on your snow white wings
   A     E      A
To my immortal home
Posted in 2016 Company Picnic, Music | 1 Comment

Concert: Bartender’s Blues

From here

(intro: D (chord), E (plain), F# (plain)


     G             C
Well I'm just a bartender
      D            A
And I don't like my work
      D                       G    D, E plain, 
But I don't mind the money at all
D7/F#     G           G7
I've seen lots of sad faces
    C           A
And lots of bad cases
   D                             G     D
Of folks with their backs to the wall


          G          G7         C          A
But I got four walls around me, to hold my life
   D            D7/F#    G    D
To keep me from going astray
      G          G7        C       A
And a honky tonk angel, to hold me tight
   D             C        G
To keep me from slipping away

(As first verse)

Well I can light up your smokes
I can laugh at your jokes
I can watch you fall down on your knees
I can close down this bar
Oh and gas up my car
And I can pack up and mail in my keys

But I need four walls around me
To hold my life
To keep me from going astray
And a honky tonk angel, to hold me tight
And keep me from slipping away

Now the smoke fills the air
Of this honky tonk bar
And I'm thinkin' bout where I'd rather be
But I burned all my bridges
And I sunk all my ships
And I'm standing at the edge of the sea

I still need four walls etc.
Posted in 2016 Company Picnic, Music | 1 Comment