Roslyn-avatar
Roslyn 2 hours ago
Roslyn has registered
Focus: Data Analysis and Business Intelligence - User group: Marketing.
freakorio-avatar
freakorio 6 hours ago
freakorio has registered
Focus: Server in general - User group: Administrator.
aqui-avatar
aqui 1 day ago
5 comments
Comment in: Check of ZFW Firewall
1.)
OK, in this case you can of course just ignore the overload command!
And if that is active, a ping from the router itself to 8.8.8.8 for example is not successfull.
Yes, that is expectable cause, you did not define a source address with the ping command! face-sad
If you do NOT do this, the router takes his local LAN IP as source and this IP is due to your static NAT statement NOT translated cause it only translates traffic from host 192.168.1.2 but not the local LAN IP.
If you issue a ping 8.8.8.8 source <wan_ip>or<wan_interface> it will work fine even with the NAT statement! face-wink
Always keep in mind what NAT is doing!! The Cisco does exactly what you tell him to do!! face-wink
gleixnerd-avatar
gleixnerd 1 day ago
5 comments
Comment in: Check of ZFW Firewall
1. Yes but I dont use the overload command, I use static NAT that translates one internal IP to the public WAN IP.

ip nat inside source static 192.168.1.2 <WANIP>

And if that is active, a ping from the router itself to 8.8.8.8 for example is not successfull. If I disable the static NAT, it is successful. Thats what I dont understand.


5. Here the same, as I wrote on 1. I use a static NAT like that:

ip nat inside source static 192.168.1.2 <WANIP>

and with that configuration, I get like 10-20 entries in the ip nat translations list. And under those entries are some whith ports that I didnt allow on the ZFW.

6. Okay perfect thank you


Thank you for your note, didnt know about that. I thought I have to put every interface which is on the internet side ot the internet zone. But good to know. Fixed that already.
DK4000-avatar
DK4000 3 days ago
DK4000 has registered
Focus: Networks - User group: End-user.
aqui-avatar
aqui 4 days ago
5 comments
Comment in: Check of ZFW Firewall
1.)
So you say it is a normal behaviour that the echo reply will then be translated via nat?
No, of course not. Everything which is translated by NAT is explicitly defined in the ACL which is mapped to the overload command. I guess in your case its all 120?! (Not shown in config excerpt!)

ip nat inside source list 120 interface Dialer0 overload
!
access-list 120 permit ip 192.168.101.0 0.0.0.255 any
(only source IPs with 192.168.101.x are NATed!)
!
dialer-list 1 protocol ip list 120


Due to the fact that outside Internet IPs are not matching the NAT ACL they were never tranlated. Other than that they come in on the ip nat outside interface, so the NAT acl will never get a match anyway, cause its related ONLY on the inside interface! The echo reply will therefore send with the WAN IP address (self) as source.

5.)
Static NAT from an outbound or an inbound interface? So, a port forwarding (from outbound) or a static NAT from an inbound interface to a static IP on the outbound? Overload is PAT. Thats unfortunately unclear? 🤔 (Port forwarding setup for a ZFW can be seen here)

6.)
Yes, that could be seen as well but with the ACL counters. show access-lists shows you all blocked packets. If you need more detailed info on this add the "log" parameter to the acl statements. But be carefull here. ACL logs are process switched (done in CPU) and hence logs should not be written from acls who block a wide range of packets which can overwhelm the CPU.

Important:
You've made another severe configuration error in the above config!! face-sad
The interface GigabitEthernet0/0/0 together with its corresponding 0.7 subinterface is only the physical interface to where the Dialer Interface is mapped.
This interface carries NO IP address and is therefore only a physical L2 mapping with no IP traffic.
Firewalls are of course explicitly used on Interfaces WITH IP addresses, cause a firewall is based on IP.
So never ever set a ZFW zone on non IP Interfaces. This is obviously wrong and should be instantly removed!!
The dialer is here the interface which participates in IP forwarding and holds the (WAN) zone!
gleixnerd-avatar
gleixnerd 4 days ago
5 comments
Comment in: Check of ZFW Firewall
1. I have tried that a few day ago, thats why you dont see icmp allowed in the lists. But with one difference, I entered permit icmp any any on internet to router and router to internet policy. I thought that should work as well, but it didnt. So you say it is a normal behaviour that the echo reply will then be translated via nat?

2. I thought I already tried that but I will try it again.

4. Got it. But what is the consequence of inspect? Will it see packets which are dangerous but are sent with a matched protocol?

5. I think you missunderstood my question. Yes that is clear, that source ports are always random. But I have a static NAT running and when I take a look at show ip nat translatios, I get entries which have a destination port, that I have not allowed in the firewall. Thats why I am asking if the nat translation is happening before the firewall is inspecting the traffic. Because then I dont have to worry about those entries. But if they should be dropped before the nat translation is happening, then something doesnt work with the FW, cause why would those entries be there then?
You know what I mean?

6. I thought I tried everything in there but maybe I missed something. I thought there should be a possibility to see that for example the access-list ALLOWv4 dropped 100 packets and show me details about the packets like source and destination ip/port.

Thank you very much and best regards
gleixnerd
aqui-avatar
aqui 4 days ago
3 comments
Comment in: Wireguard VPN on UDM Pro behind Fritzbox - Handshake did not complete
Udm pro: 192.168.1.1, Firewall subnet 192.168.120.0/24
This statement is totally confusing. face-sad
The Fritzbox-firewall coupling port is the UDM WAN interface which is, regarding to your description, 192.168.2.10.
So does this mean you have 2 local LAN networks on your UDM or is one just the internal Wireguard adressing?
Helpful for a focused troubleshooting here would be both, the WG server and client config file!

All further details and ToDos you'll find in the local Wireguard Tutorial!
aqui-avatar
aqui 4 days ago
5 comments
Comment in: Check of ZFW Firewall
1.)
That is normal behaviour.
You have mapped the ACL "ALLOWv4" to the policy-map "INTERNET_ROUTER_POLICY" which is responsable for the protocols which are allowed to pass the firewall from outside. (FROM internet TO the router)
Your acl "ALLOWv4" only allows IPsec traffic from outside but missed having permit icmp any any echo configured to let ICMP echo requests pass as well.
Btw. if you get a fix IP addresse you can make the "ALLOWv4" ACL a bit more stricter and define your static IPv4 as the target IP like:
ip access-list extended ALLOWv4
20 permit udp any <wan_ip_address> eq isakmp
30 permit udp any <wan_ip_address> eq non500-isakmp
40 permit esp any <wan_ip_address>
50 permit icmp any <wan_ip_address> echo


2.)
Try sh policy-map type inspect zone-pair sessions which shows all inspected endstations by ip and protocol and show policy-map type inspect zone-pair <zone_pair_name> for detailed protocol statistics.

3.)
That is correct!

4.)
Access lists define which IPs, ports etc. are allowed and match protocol defines the protocols in general which are allowed and will be deeper inspected. With match protocol you have to watch the sequence, cause deeper inspected protocols have to be placed before the shotgun commands match protocol tcp and match protocol udp at the end!
These commands will inspect ALL not explicitly defined above UDP and TCP protocols. So it is mandatory to put them at the end of the list.
If you like to inspect and pass only dedicated TCP protocols defined above you need to omit these shotgun commands in the match protocol sequence.
Protocol and ACL class maps can of course be combined here.

5.)
No, thats not true! The NAT overload function (in case you mean this?!) translates only IP addresses and not ports.
As a professional networking specialist you know and should keep in mind that source ports are always random in TCP and UDP session by design. Only destination Ports are dedicated and dependent on the application. face-wink

6.)
Always check the ZFW section in the Cisco tutorial for a proper setup!
Unfortunately in German but a translator my help here otherwise just ask.
If you need to do port forwarding with the ZFW firewall you'll find a dedicated English tutorial HERE.
gleixnerd-avatar
gleixnerd 4 days ago
Question5 comments
Check of ZFW Firewall
Hi together,

I will post my running cisco config below.
I have an external modem on my cisco router, which gets an fixed IP-Adress from the provider. I implemented a ZFW firewall and now I have a few questions.

1. When I allowed ICMP from Internet to self and self to internet, I can not ping the router from outside overall. And I can not ping from the router to 8.8.8.8 for example. If I disable NAT the router can ping 8.8.8.8. That is confusing for me, cause that means, that the router will send a ping to 8.8.8.8 and the response will then be translated from nat? Or why does it not work with nat?

2. I could not figure out how to check that the fw is working properly. There are a few show commands but they only show me how many packets are dropped or passed. I tried some log commands on the policy settings but cant access them. I search for a way to exactly see which packets are dropped, passed, inspected and so on.

3. In the section policy-map ... and class type inspect... I can set the parameter drop, inspect or pass. As I understand, the difference between inspect and pass is, that pass will only pass the packets from one zone to the other, while inspect will allow the retraffic as well without a policy on the other zone pair. Is that correct? So if I inspect for example port 1701 and PC A send a test packet with a dynamic source port 34500 for example, then the packet will be forwarded and the retraffic to the port 34500 is then also allowed?

4. What is the difference on class-map if i use it with a access-list or with the match protocol commands?

5. When I use the show ip nat translation command, I see many translations on random ports, is this normal? That would mean that NAT is translating incoming traffic first and then the firewall drops the traffic. Is that true?

6. Maybe you can give me an assessment to my configuration, that would be very helpful. Are there any other security settings I can do to secure my network?


version 17.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
service call-home
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
!
hostname XXX
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-intf
 !
 address-family ipv4
 exit-address-family
 !
 address-family ipv6
 exit-address-family
!
security authentication failure rate 3 log
security passwords min-length 7
enable secret 9 XXX
!
aaa new-model
aaa local authentication attempts max-fail 3
!
!
aaa authentication login default local
aaa authorization network default local 
!
!
!
!
!
!
aaa session-id common
clock timezone CET 1 0
clock summer-time CEST recurring last Sun Mar 2:00 last Sun Oct 3:00
!
ip domain name XXX
!
!
!
login on-success log
!
!
!
!
!
!
!
subscriber templating
! 
! 
! 
! 
!

parameter-map type inspect global
 log dropped-packets
multilink bundle-name authenticated
!
!
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
redundancy
 mode none
!
!
!
!
!
no cdp run
!
!
class-map type inspect match-any ALLOW_IN
 match access-group name ALLOWv4
class-map type inspect match-any ROUTER_PROTOCOLS
 match protocol tcp
 match protocol udp
 match protocol icmp
class-map type inspect match-any INTERNET_ALLOW
 match access-group name ALLOWINTERNET
class-map type inspect match-any LOCAL_ALLOW
 match access-group name ALLOWLOCAL
!
policy-map type inspect ROUTER_INTERNET_POLICY
 description Traffic Router to Internet
 class type inspect ROUTER_PROTOCOLS
  inspect
 class class-default
  drop
policy-map type inspect INTERNET_ROUTER_POLICY
 description Traffic Internet to Router
 class type inspect ALLOW_IN
  pass
 class class-default
  drop log
policy-map type inspect LOCAL_INTERNET_POLICY
 description Traffic LOCAL to Internet
 class type inspect LOCAL_ALLOW
  pass
 class class-default
  drop
policy-map type inspect INTERNET_LOCAL_POLICY
 class type inspect INTERNET_ALLOW
  pass
 class class-default
  drop log
!
zone security LOCAL
zone security INTERNET
zone-pair security INTERNET_LOCAL source INTERNET destination LOCAL
 service-policy type inspect INTERNET_LOCAL_POLICY
zone-pair security INTERNET_ROUTER source INTERNET destination self
 service-policy type inspect INTERNET_ROUTER_POLICY
zone-pair security LOCAL_INTERNET source LOCAL destination INTERNET
 service-policy type inspect LOCAL_INTERNET_POLICY
zone-pair security ROUTER_INTERNET source self destination INTERNET
 service-policy type inspect ROUTER_INTERNET_POLICY
! 
! 
! 
interface GigabitEthernet0/0/0
 description Internet static IP
 no ip address
 zone-member security INTERNET
 speed 1000
 no negotiation auto
 no cdp enable
!
interface GigabitEthernet0/0/0.7
 description VLAN 7 tag for DSL
 encapsulation dot1Q 7
 zone-member security INTERNET
 pppoe enable group global
 pppoe-client dial-pool-number 1
!
interface GigabitEthernet0/0/1
 description local LAN
 ip address 192.168.1.1 255.255.255.0
 ip nat inside
 zone-member security LOCAL
 ip tcp adjust-mss 1452
 negotiation auto
!
interface GigabitEthernet0
 vrf forwarding Mgmt-intf
 no ip address
 shutdown
 negotiation auto
!
interface Dialer1
 ip address negotiated
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip nat outside
 ip verify unicast reverse-path
 zone-member security INTERNET
 encapsulation ppp
 dialer pool 1
 dialer-group 1
 ppp authentication pap callin
 ppp pap sent-username XXX@t-online.de password 7 XXX
 ppp ipcp dns request
 ppp ipcp mask request
 ppp ipcp route default
!
ip forward-protocol nd
no ip http server
no ip http secure-server
ip nat inside source static 192.168.1.2 XXX
!
!
ip access-list extended ALLOWINTERNET
 10 permit udp any any eq 1701
 20 permit udp any any eq isakmp
 30 permit udp any any eq non500-isakmp
 40 permit esp any any
 50 permit ahp any any
ip access-list extended ALLOWLOCAL
 10 permit udp any any eq 1701
 20 permit udp any any eq isakmp
 30 permit udp any any eq non500-isakmp
 40 permit esp any any
 50 permit ahp any any
 60 permit tcp any any
 70 permit udp any any
ip access-list extended ALLOWv4
 20 permit udp any any eq isakmp
 30 permit udp any any eq non500-isakmp
 40 permit esp any any
ip access-list extended CLI_ACCESS
 10 permit tcp 192.168.1.0 0.0.0.255 any eq 22
 20 deny   ip any any log-input
 3 remark Config Access Router ACL
!
dialer-list 1 protocol ip list 120
!
!
!
!
!
!
control-plane
!
banner exec ^CSie sind verbunden mit VTY $(line) auf dem Router $(hostname)^C
!
line con 0
 stopbits 1
line aux 0
 stopbits 1
line vty 0 4
 access-class CLI_ACCESS in
 exec-timeout 120 0
 transport input ssh
!


Thank you very much and best regards
gleixnerd
jstricker-avatar
jstricker 4 days ago
3 comments
Comment in: Wireguard VPN on UDM Pro behind Fritzbox - Handshake did not complete
Thats my configs:
screenshot_20240419_072825_wireguard
screenshot_20240419_072706_chrome
screenshot_20240419_072719_chrome
radiogugu-avatar
radiogugu 4 days ago
3 comments
Comment in: Wireguard VPN on UDM Pro behind Fritzbox - Handshake did not complete
Evening.

This does not add up:

On the fritzbox wireguard port forwarding to udm pro (192.168.2.10)

Udm pro: 192.168.1.1

Which IP is configured on the UDM Pro interface responsible of Wireguard?

Please make a drawing of your network.

Please post the Wireguard config with relevant bits anonymized.

Regards
Marc
jstricker-avatar
jstricker 4 days ago
Question3 comments
Wireguard VPN on UDM Pro behind Fritzbox - Handshake did not complete
Hello everyone

I have the following problem:

I have set up the Wireguard server on my UDM Pro, on the client conf i changed the endpoint to the ddns name who is configured on the fritzboxbut I get on the client "handshake did not complete".

My Setup:

ISP -> FritzBox 7590 -> UDM Pro (double nat)

Fritzbox: 192.168.2.1

On the fritzbox wireguard port forwarding to udm pro (192.168.2.10)

Udm pro: 192.168.1.1

Firewall subnet 192.168.120.0/24

Firewall rules on udm pro Internet in/out/local on any:any

Did anyone have an Idee what else is to do that i got an Connection with my VPN client?
aqui-avatar
aqui 5 days ago
3 comments
Comment in: How to set up and configure a Linux GRE tunnel
You should also move the uploaded image under "Article image" (3rd button after the "edit"). That places the nice image as the articel image and not uselessly at the end. face-wink
AlexWisha-avatar
AlexWisha 5 days ago
3 comments
Comment in: How to set up and configure a Linux GRE tunnel
Thanks , codes added
aqui-avatar
aqui 5 days ago
3 comments
Comment in: How to set up and configure a Linux GRE tunnel
Nice tutorial but it would be much easier for all readers if you highlight the Linux commands either in boldface or use the code tags.
The other bad thing is the useless and unnecessary masquerading inside the tunnel. This is an also unnecessary waste of performance if you tunnel internal ip networks over the GRE tunnel. Other than that in modern Debian based Linux distros the firewall default is nftables and not anymore the old depricated iptables.
One other important thing readers should be aware of and which this tutorial correctly mentions is the fact that GRE is not encrypted. So in case the GRE tunnel is send over public networks its highly recommended to use a Stongswan setup with transport encryption. See for example other GRE tutorials HERE and HERE for transportation encryption with IPsec.
Away from that...well done!
AlexWisha-avatar
AlexWisha 5 days ago
Tutorial3 comments
How to set up and configure a Linux GRE tunnel
gre_tunnel

This guide will walk through the setup and configuration of a GRE tunnel between two Linux hosts. The two Linux hosts are running Ubuntu 22.04 LTS.

What is a GRE tunnel in networking?
GRE (Generic Routing Encapsulation) tunnels encapsulate network packets inside new network packets. A virtual link is established between two hosts, allowing the hosts to communicate as if they were directly connected. The Cisco-developed tunneling protocol can encapsulate most protocol packet types.

Is a GRE tunnel encrypted?

Though a GRE tunnel functions similarly to a VPN, packets traveling inside a GRE tunnel are not encrypted but are instead encapsulated inside a GRE header. You must configure IPSec separately if you want to maintain data confidentiality.

How to set up and configure a GRE tunnel
Setting up a GRE tunnel naturally requires work on both hosts. You will need to create a tunnel interface on each, set up firewall rules, and create routing tables. For clarity, we'll name one host "Host A" and the other "Host B".

GRE tunnel setup on Host A
Enabling IP forwarding

The first step is to enable IP port forwarding on our host. Without this the GRE tunnel will not work. This is possible with a single command:

sysctl -w net.ipv4.ip_forward=1

Creating the GRE tunnel interface

Now we can create the GRE tunnel interface from Host A to Host B:

ip tunnel add gre1 mode gre remote <HOST_B_IP> local <HOST_A_IP> ttl 25

Naturally, you should replace <Host_B_IP> with the IP address of your target server and <Host_A_IP> with the IP address of the machine you are currently connected to.

Next, we need to assign an IP address to the GRE interface on our host:

ip addr add <HOST_A_PRIV_IP_GRE>/30 dev gre1

You should replace <HOST_A_PRIV_IP_GRE> with an unused private IP, for example:

ip addr add 10.0.0.1/30 dev gre1

Now it's a simple matter of activating the GRE interface with the following command:

ip link set dev gre1 up

Setting up a firewall rule for source NAT
We'll now add a firewall rule to perform source NAT. This will translate the source IP address of packets leaving our GRE interface into public routable addresses:

iptables -t nat -A POSTROUTING -s <HOST_B_PRIV_IP_GRE> ! -o gre+ -j SNAT --to-source <HOST_A_IP>
EXAMPLE:
iptables -t nat -A POSTROUTING -s 10.0.0.2 ! -o gre+ -j SNAT --to-source 1.1.1.1

Creating routing table rules for the GRE tunnel interface
Finally, we can add a custom routing table for the GRE tunnel that will route traffic from the GRE tunnel's source IP through the GRE table:

echo '100 GRE' >> /etc/iproute2/rt_tables  
ip rule add from <HOST_A_PRIV_IP_GRE>/32 table GRE
ip route add default via <HOST_B_PRIV_IP_GRE> table GRE
EXAMPLE:
echo '100 GRE' >> /etc/iproute2/rt_tables  
ip rule add from 10.0.0.1/32 table GRE
ip route add default via 10.0.0.2 table GRE

GRE tunnel setup on Host B
For host B, the setup is the same, except of course that we must use flip the IP addresses and use a different private IP.

Enabling IP forwarding

We can set up IP forwarding on Host B with the same command as Host A.

sysctl -w net.ipv4.ip_forward=1

Creating the GRE tunnel interface
Now we can create the GRE tunnel interface from Host B to Host A:

ip tunnel add gre1 mode gre remote <HOST_A_IP> local <HOST_B_IP> ttl 225
You should replace <Host_A_IP> with the IP address of your first server and <Host_B_IP> with the IP address of the machine you are currently connected to.

Next, we need to assign an IP address to the GRE interface on our host:

ip addr add <HOST_B_PRIV_IP_GRE>/30 dev gre1
You should replace <HOST_B_PRIV_IP_GRE> with an unused private IP, for example:

ip addr add 10.0.0.2/30 dev gre1
Now it's a simple matter of activating the GRE interface with the following command:

ip link set dev gre1 up
Setting up a firewall rule for source NAT
We'll now add a firewall rule to perform source NAT. This will translate the source IP address of packets leaving our GRE interface into public routable addresses:

iptables -t nat -A POSTROUTING -s <HOST_B_PRIV_IP_GRE> ! -o gre+ -j SNAT --to-source <HOST_B_IP>
EXAMPLE:
iptables -t nat -A POSTROUTING -s 10.0.0.1 ! -o gre+ -j SNAT --to-source 2.2.2.2

Creating routing table rules for the GRE tunnel interface
Finally, we can add a custom routing table for the GRE tunnel that will route traffic from the GRE tunnel's source IP through the GRE table:

echo '100 GRE' >> /etc/iproute2/rt_tables  
ip rule add from <HOST_B_PRIV_IP_GRE>/32 table GRE
ip route add default via <HOST_A_PRIV_IP_GRE> table GRE
EXAMPLE:
echo '100 GRE' >> /etc/iproute2/rt_tables  
ip rule add from 10.0.0.2/32 table GRE
ip route add default via 10.0.0.1 table GRE

That's it! Your GRE tunnel should now be working. Remember, do not send any sensitive data via the tunnel without first setting up IPSec.
AlexWisha-avatar
AlexWisha 5 days ago
AlexWisha has registered
Focus: Android/ChromeOS - User group: Security Expert.
bfally-avatar
bfally 5 days ago
bfally has registered
Focus: Windows server - User group: Administrator.
Lochkartenstanzer-avatar
Lochkartenstanzer 6 days ago
1 comment
Comment in: End of Support dates for Office 2016, 2019 Apps und Productivity Servers
Moin,

It's time to say goodbye to MS Office. face-smile

lks
Dani-avatar
Dani 6 days ago
Information1 comment
End of Support dates for Office 2016, 2019 Apps und Productivity Servers
This post applies to:
  • Office 2016, Office 2019 Applications: Access 2016, Access 2019, Excel 2016, Excel 2019, OneNote 2016, Outlook 2016, Outlook 2019, PowerPoint 2016, PowerPoint 2019, Project 2016, Project 2019, Publisher 2016, Publisher 2019, Skype for Business 2016, Skype for Business 2019, Visio 2016, Visio 2019, Word 2016, Word 2019
  • Productivity Servers: Exchange Server 2016, Exchange Server 2019, Skype for Business Server 2015, Skype for Business Server 2019

What does end of support mean?
All of the above applications and servers (including Office 2016, Office 2019) will reach the end of support (EOS) on October 14, 2025. After this end date, Microsoft will no longer provide security fixes, bug fixes, or technical support. Using products after end of support leaves your organization vulnerable to potential security threats, productivity losses, and compliance issues.

What we recommend
We recommend migrating devices running end of support products to the cloud with Microsoft 365 E3 to stay continuously supported. Microsoft 365 E3 includes familiar Microsoft 365 apps—such as Word, Excel, PowerPoint, Outlook, Teams, and more—along with online services like SharePoint and Exchange.

Microsoft 365 E3 is a comprehensive solution that not only includes the familiar Microsoft 365 apps but also offers a range of additional capabilities:
  • Foundational Zero-Trust: Helps secure identities, devices, and applications against threats.
  • Streamlined Endpoint Management: Provides IT administrators with management tools and enhanced user experience for employees.
  • Productivity and collaboration: Promotes collaboration across your organization, fostering new ways of working.


Other options for disconnected environments
We know there is not a “one-size-fits-all" approach to how to manage EOS. This is why we also offer other solutions to help with your unique needs:
  • For devices that need to remain disconnected or are not yet ready to move the cloud, we launched Office Long-Term Servicing Channel (LTSC). This version of Office was designed for devices that can’t accept feature updates or connect to the Internet. Note that Office LTSC 2021 will reach the end of support on October 13, 2026.
  • To continue running Exchange Server on-premises, the next version of Exchange Server will ship in H2 of 2025. We recommend customers move to Exchange Server 2019 now. The next version of Exchange Server will be released before Exchange Server 2019 (and Exchange Server 2016) reach end of life, and customers can do an in-place upgrade from Exchange Server 2019 to the next version.


Additional resources
Below are some other steps you can take to begin preparing your organization for Office 2016 and Office 2019 end of support:
  • Read the upgrade guidance for an overview of how to move from Office 2016 or Office 2019 to Microsoft 365 Apps.
  • Consider engaging Microsoft FastTrack, a Microsoft support service for moving to Microsoft 365 E3.
  • Use the new Total Economic Impact™ of Microsoft 365 E3 study to build your case for reducing cost and complexity with Microsoft 365.
  • Use the Microsoft 365 ROI Calculator to estimate your ROI for moving to Microsoft 365 or ask your Microsoft representative to help you tailor your custom potential ROI of adopting Microsoft 365.

Please visit our Office End of Support Tech Community for more information and resources about the end of support for Office. Or fill out this form to get in touch with sales and have a specialist demonstrate how Microsoft 365 can benefit your organization.


Gruß,
Dani

Quelle: https://techcommunity.microsoft.com/t5/office-end-of-support-blog/key-en ...
AlexKirpichny-avatar
AlexKirpichny 7 days ago
AlexKirpichny has registered
Focus: Digital Transformation and Innovation - User group: Developer.
uhrw3rk-avatar
uhrw3rk 7 days ago
uhrw3rk has registered
Focus: Enterprise Applications and ERP Systems - User group: Developer.
colordvrlk-avatar
colordvrlk 7 days ago
colordvrlk has registered
Focus: Networks - User group: Administrator.
D3L7DT-avatar
D3L7DT 8 days ago
D3L7DT has registered
Focus: Networks - User group: Administrator.
derolf-avatar
derolf 11 days ago
derolf has registered
Focus: Development - User group: Developer.
austinjoy51-avatar
austinjoy51 15 days ago
austinjoy51 has registered
Focus: Other systems - User group: Consultant.
TannerRose-avatar
TannerRose 15 days ago
TannerRose has registered
Focus: Android/ChromeOS - User group: Data Analyst.
greensquirrel-avatar
greensquirrel 18 days ago
greensquirrel has registered
Focus: IT Infrastructure Planning and Optimization - User group: Administrator.
astaguru-avatar
astaguru 18 days ago
astaguru has registered
Focus: Internet in general - User group: Sales.
josy-cig-avatar
josy-cig 18 days ago
josy-cig has registered
Focus: Server in general - User group: Consultant.
gleixnerd-avatar
gleixnerd 18 days ago
9 comments
Comment in: PPPoE configuration on cisco router
Perfect, I already read through your cisco tutorial and it helped me a lot for a kind of basic knowledge.
Thank you

Best regards
gleixnerd
TopcisLP-avatar
TopcisLP 18 days ago
TopcisLP has registered
Focus: Server in general - User group: Administrator.
aqui-avatar
aqui 18 days ago
9 comments
Comment in: PPPoE configuration on cisco router
Do I need NAT when I just want to make a vpn ipsec tunnel to a remote station?
No, in this case NAT is not needed of course.
and it is working.
Congrats! 👏👍
Now I will install a zone based FW and then I should be ready for the VPN implementation.
All steps for both functions you'll find in the above Cisco Tutorial including a client VPN with all onboard VPN clients (L2TP).
If your VPN is a site2site VPN you'll find additional tutorials here and here.
gleixnerd-avatar
gleixnerd 18 days ago
9 comments
Comment in: PPPoE configuration on cisco router
UPDATE:

I changed the configuration regarding your example configuration and it is working. Now I will install a zone based FW and then I should be ready for the VPN implementation.

Again thank you very much for your help

Best regards
gleixnerd
gleixnerd-avatar
gleixnerd 19 days ago
9 comments
Comment in: PPPoE configuration on cisco router
Okay good to know thanks.

Do I need NAT when I just want to make a vpn ipsec tunnel to a remote station?

Best regards
gleixnerd
aqui-avatar
aqui 19 days ago
9 comments
Comment in: PPPoE configuration on cisco router
But it is an ADSL link with 16Mbit/s donwload speed, not a VDSL link in case that makes a difference?
Nope, that does'nt matter. All modems are hybrid modems and work with both ADSL and VDSL.
The Cisco only "sees" the PPPoE traffic which is plain Ethernet on his site.

For further investigations you can also activate the debugger with debug pppoe packets and debug pppoe events to watch the PPPoE control traffic with the provider DSLAM. That also shows you and verifies if the modem is working properly and passes PPPoE traffic from the router.
Keep in mind that you need to issue a term mon command in case you are connected via Telnet or SSH and not directly on the serial console. Otherwise debug or console messages will not be forwarded to Telnet or SSH connections!
piatho-avatar
piatho 19 days ago
piatho has registered
Focus: Cloud Computing and Platforms - User group: Administrator.
gleixnerd-avatar
gleixnerd 19 days ago
9 comments
Comment in: PPPoE configuration on cisco router
Hi everyone,

at first thank you all for your help.

It is true, that I have a german Telekom link. I just wrote in english for more answers. But it is an ADSL link with 16Mbit/s donwload speed, not a VDSL link in case that makes a difference?

I saw on the zyxel webinterface, that I can tag the traffic so I will try that.

I will try out your recommended configuration changes and give a report.

Best regards
gleixnerd
mit-suedde-avatar
mit-suedde 19 days ago
4 comments
Comment in: Error Could not initialize plugin libnvidiavgxso for vGPU nvidiartxa6000
Hello again,
We contacted Nvidia again and found out that display mode is activated.
To deactivate this we have to use a tool, unfortunately we also get an error “NO NVIDIA Display adapters found”.

Furthermore, we did not find our server as a certified server https://www.nvidia.com/en-us/data-center/resources/vgpu-certified-server ...

However, it should still work, maybe it's the BIOS settings, does anyone here know?

We have the mainboard Intel server barebone M50CYP2UR208

Thx for your reply

Marcel
aqui-avatar
aqui 19 days ago
9 comments
Comment in: PPPoE configuration on cisco router
That is not correct! face-sad Please take a look into the modems manual. Like all other modems on the market the Zyxel VMG3006 can do the mandatory VDSL tagging too!
Under Network setting-> Broadband -> Add/Edit new WAN Interface" it can be set without an problems if you want the modem to do the VDSL VLAN tagging:
zyxvlan
shadynet-avatar
shadynet 19 days ago
9 comments
Comment in: PPPoE configuration on cisco router
You have to configure your dialer-group on Gi0/0/0.7

Edit: @aqui was a bit faster, the Zyxel VMG3006 usually does not provide tagging, so the router has to be configured correctly.
aqui-avatar
aqui 19 days ago
9 comments
Comment in: PPPoE configuration on cisco router
From the dialer port ppp user credentials it looks like its a European VDSL connection. You hopefully have on the radar that nearly every EU provider used a VLAN tagged VDSL connection?! In terms of the German T-Com its VLAN ID 7 which your port config is missing in case your external modem did NO tagging.
With an external modem you have to first clarify if your modem is providing the VLAN 7 tag or if the router must do this in case the modem cannot provide the tag.

The other 2 important issues are the missing NAT (address translation to the Internet) and the correspondent dialer list and overload command as well as the missing MTU setting on the PPPoE port.
The German T-Com (in case its a T-Com connection?!) did not support CHAP in the PPP authorisation so you can omit that. On top of thatl the PPP DNS and default route requests are missing so that the PPP link will fail.
Also you can omit the IP related settings on the physiacl port. They all belong to the mapped Dialer interface only.
So a bunch or configuration issues which prevents the PPPoE connection from working correctly. 🤔

Assuming this is a German T-Com connection and your modem is providing the mandatory VLAN 7 tag, a correct configured Dialer interface should look like this:
!
interface GigabitEthernet0/0/0
 description Internet static IP
 no ip address
 negotiation auto
 no cdp enable
 pppoe enable group global
 pppoe-client dial-pool-number 1
!
interface Dialer0
 description VDSL PPPoE Internet Interface
 ip address negotiated
 mtu 1492
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip verify unicast reverse-path
 ip nat outside
 encapsulation ppp
 dialer pool 1
 ppp authentication pap callin
 ppp pap sent-username 001234567890123456780001@t-online.de password 1234567
 ppp ipcp dns request
 ppp ipcp mask request
 ppp ipcp route default 
!
interface GigabitEthernet0/0/1
 description Local LAN 
 ip address 192.168.1.254 255.255.255.0
 ip nat inside 
 ip tcp adjust-mss 1452 
!
ip nat inside source list 120 interface Dialer0 overload
!
dialer-list 1 protocol ip list 120
!
access-list 120 permit ip 192.168.1.0 0.0.0.255 any 

In case your external modem does no VLAN tagging for the PPPoE connection itself you need the router to do this. This requires some change at the physical interface to work with an 802.1q tagged VLAN subnet.
interface GigabitEthernet0/0/0
 description Internet static IP
 no ip address
 no cdp enable
!
interface GigabitEthernet0/0/0.7
 description VDSL Internet Verbindung - VLAN 7 tagged
 encapsulation dot1Q 7
 pppoe enable group global
 pppoe-client dial-pool-number 1
! 

Additional important points which should be corrected in your config!:
  • With ppp ipcp route default the default route is automatically requested from the provider and the static route ip route 0.0.0.0 0.0.0.0 Dialer1 is not necessary anymore and should be deleted form the config. For PPP that is a much better option to propagate the default route. ppp ipcp dns request sets the PPPoE provided DNS server.
  • The "20 deny ip any any" statement in the ACL 120 is default and can be omitted
  • It is higly insecure to let the HTTP server active on the router which is exposed to the internet. Due to the recent security breach CVE-2023-20198 which makes unpatched Cisco routers vulnerable by HTTP the HTTP and HTTPS servers should always be disabled with no!!
  • You should activate service password-encryption and should never use unencrypted passwords. Always use scrypt style passwords. See HERE for further details!

Take a look at the local Cisco router tutorial which describes all the steps in detail. Unfortunately in German, but a translator may help here. face-wink
gleixnerd-avatar
gleixnerd 19 days ago
Question9 commentsSolved
PPPoE configuration on cisco router
Hi,

I have a cisco ISR4321 router with OS 17.02.01r and a zyxel VMG3006-D70A modem.

I want to use the modem on a ADSL 16Mbit link with a fixed IPv4 address from ISP. The modem is in modem mode by default. That means, that all packets that come to the DSL port will be forwarded to port 2-4. The modem is connected to the dsl port and the status on the webinterface of the modem is "connected", I can also see the up-/download speed. Then I connected the cisco router to the modem port 4. The port on the router is port GigabitEthernet 0/0/0.
With the show pppoe commands and so on I see that it is not up and running. Even the IP-Address is not assigned automatically. (Should I see that?)

Attached you can find my router configuration, but I cant figure out what I made wrong. I had a template configuration from an old colleague who is not in our company anymore, from which I tried to configure this setup.

It would be very helpfull if someone can help or assist here. If I shall provide some logs etc. pls tell me.

Thank you very much and best regards

gleixnerd


version 17.2
service timestamps debug datetime msec
service timestamps log datetime msec
service call-home
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
!
hostname static3tsg-rt01
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-intf
 !
 address-family ipv4
 exit-address-family
 !
 address-family ipv6
 exit-address-family
!
enable secret 9 XXX
!
aaa new-model
!
!
!
!
!
!
!
!
aaa session-id common
!
ip domain name XXX
!
!
!
login on-success log
!
!
!
!
!
!
!
subscriber templating
! 
! 
! 
!
multilink bundle-name authenticated
!
!
!
crypto pki trustpoint TP-self-signed-2440242732
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-2440242732
 revocation-check none
 rsakeypair TP-self-signed-2440242732
!
crypto pki trustpoint SLA-TrustPoint
 enrollment pkcs12
 revocation-check crl
!
!
!
no license feature hseck9
license udi pid ISR4321/K9 sn FDO261629VN
license boot level securityk9
memory free low-watermark processor 69596
!
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
username admin privilege 15 password 0 XXX
!
redundancy
 mode none
!
!
!
!
!
!
interface GigabitEthernet0/0/0
 description Internet static IP
 no ip address
 no ip proxy-arp
 negotiation auto
 no cdp enable
 pppoe enable group global
 pppoe-client dial-pool-number 1
 ip virtual-reassembly
!
interface GigabitEthernet0/0/1
 ip address 192.168.1.1 255.255.255.0
 negotiation auto
!
interface GigabitEthernet0
 vrf forwarding Mgmt-intf
 no ip address
 shutdown
 negotiation auto
!
interface Dialer1
 ip address negotiated
 no ip proxy-arp
 encapsulation ppp
 dialer pool 1
 dialer-group 1
 ppp authentication chap pap callin
 ppp chap hostname XXX@t-online.de
 ppp chap password 0 XXX
 ppp pap sent-username XXX@t-online.de password 0 XXX
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip tftp source-interface GigabitEthernet0
ip route 0.0.0.0 0.0.0.0 Dialer1
!
!
!
ip access-list extended 120
 10 permit ip 192.168.1.0 0.0.0.255 any
 20 deny   ip any any
dialer-list 1 protocol ip permit
!
!
!
!
!
control-plane
!
!
line con 0
 stopbits 1
line aux 0
 stopbits 1
line vty 0 4
 access-class 120 in
 exec-timeout 120 0
 transport input telnet ssh
!
gleixnerd-avatar
gleixnerd 19 days ago
gleixnerd has registered
Focus: Networks - User group: Administrator.
JustinWagner1997-avatar
JustinWagner1997 20 days ago
JustinWagner1997 has registered
Focus: Networks - User group: End-user.
hannahwalters748-avatar
hannahwalters748 22 days ago
hannahwalters748 has registered
Focus: Digital Transformation and Innovation - User group: Consultant.
tanu14-avatar
tanu14 22 days ago
tanu14 has registered
Focus: Design/Media - User group: Designer.
annashipman-avatar
annashipman 22 days ago
annashipman has registered
Focus: Security - User group: Consultant.
Spiesserfreak-avatar
Spiesserfreak 23 days ago
Spiesserfreak has registered
Focus: Cloud Computing and Platforms - User group: Administrator.