ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. dave247
    3. Posts
    • Profile
    • Following 0
    • Followers 0
    • Topics 90
    • Posts 982
    • Groups 0

    Posts

    Recent Best Controversial
    • RE: Moving off VMware Hypervisor to something else - need input

      Another question: when I was researching Proxmox, someone mentioned that it doesn't fully support shared block storage currently. It was basically stated that Proxmox and others haven't come up with an equivalent to VMFS for shared block storage yet, so they are typically leveraging LVM to partition off portions of disk for each VM limit access to those regions to a singular host at a time.

      I had looked at this comparison matrix which shows that Proxmox does fully support shared storage, so I'm unclear on the exact specifics and if it really matters in my situation. We basically have an iSCSI storage controller for VM storage and then our ESXi hosts for compute (mentioned in my original post).

      All I really care about if we move to Proxmox is that we can store VMs in our storage controller and use the hosts for compute, similar to how we're doing it with VMware today.

      posted in IT Discussion
      dave247D
      dave247
    • RE: Moving off VMware Hypervisor to something else - need input

      @scottalanmiller said in Moving off VMware Hypervisor to something else - need input:

      @dave247 said in Moving off VMware Hypervisor to something else - need input:

      @scottalanmiller just out of curiosity, could you provide any arguments against using Hyper-V?

      We are 99.9% Windows PC & Server shop where I work so naturally some might suggest us using Microsoft's Hyper-V. I have used it a handful of times in the past but it didn't seem very user friendly and seemed to have issues at the time, granted it was over 8 years ago.

      Sure...

      1. Microsoft no longer has faith in it, it would border on insane to trust as your core platform something that even its own vendor gave up on. The only production style deployment was removed and now only the dev / hobby style is still available. People argue "they didn't discontinue it" and no, not technically, but they did discontinue it from anything that could be argued to be a production methodology. Using HyperV means defining your virtualization infrastructure as a "hobby" environment where uptime and reliability don't matter.

      2. It doesn't have the knowledge, development or care of a production system. Never did, but now its a tiny fraction of what it once was. So if you thought it was bad back when MS still pushed it, image how bad it is now!

      3. No support. It's an MS product, that means you are left to your own devices and the third party support world is essentially entirely resellers, not skilled engineers. No serious support engineer works with HyperV, so you are depending on the market of somewhat technical salesmen to be your support network.

      4. Licensing. Pure and simple, if your infrastructure product requires a license, it's a joke. Nothing causing outages like a license. That's why no serious business will touch that stuff. Risk for no reason is literally a form of sabotage.

      5. Confusion. While someone, somewhere installed HyperV and knew what it was, you'll never find that person. Everyone who recommends and implements it does so out of thinking it is something that it is not. Many swear it is a Type2 (and then think that that is a good thing.) Almost no one can actually identify what is virtual and what is not when using it. Especially if you have a Windows show, the chances that anyone really will know HyperV is zero. Only very senior UNIX shops ever have the knowledge to really understand it and they avoid it based on that knowledge.

      6. Cost. HyperV isn't free anymore and while someone might argue that you are SO tied to Windows that you'll never be able to make decisions based on what's best for your business, that's a horrific financial mentality to take. Again, risk without benefit, even if small, is very bad. It's what IT pros should be paid to protect against, not recommend. It's a product that only works against your interest, not for them.

      7. Management. Like most Windows products, Hyperv's management is a sh1tshow and a completely joke compared to ProxMox and XCP-ng as examples. Not even in the game. If you thought VMware was bad, HyperV is the only thing that gives it serious competition for being so bad.

      8. Source and Security. HyperV is closed source and from a notoriously unstable, insecure vendor. You might be stuck with Windows servers, but there's no reason to extend those problems into other arenas without benefit. One mistake does not justify another. Saying "we didn't care about price, security, auditability, performance, stability, etc. with our servers, why should we care now" is the antithesis of our jobs. It's worth noting that all those things clearly aren't top priority, so there might be other factors that we can weigh more heavily. But HyperV lacks ANY benefit (not even familiarity or ease of use!) to Windows admins (ProxMox is literally easier and more straightforward out of the box) so even the seemingly obvious factors work against it. So while giving low weight to production factors is okay, lacking other factors to outweight them doesn't change the outcome.

      9. You'd never be able to feel proud of your environment or tell anyone what you run on without feeling embarrassed.

      10. Backups, remote support, remote monitoring, etc. all harder. ProxMox and XCP-ng shine at how easy they are to automate, to manually manage, to manage from anywhere. HyperV falls flat in all those areas.

      11. THis is a cheat benefit (IT should NOT consider this as it is cheating the company) but HyperV is a valueless skill. You don't want to have that on your resume instead of something of value. So every single person in your IT department should be up in arms at the idea because nothing about it makes their lives easier, and nothing about it is good for their personal careers. Everyone loses, no winners. Again... as IT pros, we should be taking the value to the business first and not making decisions based on what is good for us personally. But this is a care where those two things align.

      12. Performance. Haven't checked this recently as HyperV is abandoned in production so it doesn't matter, but historically KVM was the performance leader for Windows workloads.

      Most importantly, I can't think of any reason someone would give for even considering HyperV. The utter lack of upsides, being the sole product that EXISTS that's actually worse than, rather than better than, VMware is really something.

      Thanks Scott. I was more or less assuming similar to most of the points you listed, but I'm not super knowledgeable or up to date in this area, so this helps me quite a bit. I am leaning towards Proxmox but I still need to show on paper that I've done my due diligence to evaluate each option and all that.

      posted in IT Discussion
      dave247D
      dave247
    • RE: Moving off VMware Hypervisor to something else - need input

      @scottalanmiller just out of curiosity, could you provide any arguments against using Hyper-V?

      We are 99.9% Windows PC & Server shop where I work so naturally some might suggest us using Microsoft's Hyper-V. I have used it a handful of times in the past but it didn't seem very user friendly and seemed to have issues at the time, granted it was over 8 years ago.

      posted in IT Discussion
      dave247D
      dave247
    • RE: Moving off VMware Hypervisor to something else - need input

      @DustinB3403 said in Moving off VMware Hypervisor to something else - need input:

      @dave247 Going from expensive VMWare to expensive Nutanix makes little sense.

      Yeah I was just googling other Hypervisors and looking into each. Proxmox sounds like a really good option and I'm going to test it out in my lab next week.

      posted in IT Discussion
      dave247D
      dave247
    • RE: Moving off VMware Hypervisor to something else - need input

      @travisdh1 said in Moving off VMware Hypervisor to something else - need input:

      I'm in agreement with Scott here. There is a very short list of options, and Nutantix is not one of them.

      Proxmox would be the primary choice (the backup server is really easy to work with as well), and XCP-NG if Proxmox can't be used.

      Migrating from a VMWare to Proxmox is also really easy. I did a trial at a former work place.

      Thanks. That's great to hear that migrating from VMware to Proxmox is easy. And I'm currently using Veeam for our backups and that works well with Proxmox from what I'm reading.

      posted in IT Discussion
      dave247D
      dave247
    • RE: Moving off VMware Hypervisor to something else - need input

      @scottalanmiller said in Moving off VMware Hypervisor to something else - need input:

      @dave247 said in Moving off VMware Hypervisor to something else - need input:

      Looking at Nutanix VS Proxmox and surface level perception is that Proxmox could be better

      I would quite literally place one as the worst possible option and one as the best. VMware would be close to Nutanix on the bad side. Nutanix, VMware and Hyper-V these days I don't know any argument for how to use them in production.

      I like ProxMox and XCP-ng for pricing, licensing, experience, etc. There are loads of KVM systems out there, ProxMox is far from the only player. But I think you'd need a pretty incredible argument to use one given that most or all will be closed source (that means "not production ready" to us) and few have the experience, track record, support, industry knowledge and internal support of ProxMox.

      Thanks for the input Scott. All I have really used for the last 10 years is VMware so I just did a surface level search for other Hypervisors, so I'm not really even considering Nutanix, it was just one that came up. Anyway, everything I'm reading suggests that Proxmox is rock solid and that sounds like what I'll probably test out for a while as a VMware replacement. Plus it's free which is a plus, especially since VMware renewal would be insanely costly. I can check out XCP-ng too.

      I really just want something that is stable and easy to work with. We don't have that complex of an environment so the only things I'd be doing is server firmware upgrades and Proxmox updates when needed. Doing that stuff with VMware always made me nervous since something would often break.

      posted in IT Discussion
      dave247D
      dave247
    • Moving off VMware Hypervisor to something else - need input

      Small but profitable financial institution with upside down pyramid of doom VMware environment (3 ESXi hosts and a storage controller (has been rock solid for years))

      Used to have a lot more VMs but now we're down to around 15 (Windows servers and some Linux based appliances)

      Broadcom/VMware renewal isn't looking promising so I'm trying to figure out other possible options.

      Looking at Nutanix VS Proxmox and surface level perception is that Proxmox could be better

      Just looking for input.

      posted in IT Discussion
      dave247D
      dave247
    • RE: RAID 5 vs RAID 6: Which One Is Actually Safe in 2025?

      All my vendors recommend to avoid RAID all together, so we don't use it on the servers where I work.

      posted in Starwind
      dave247D
      dave247
    • RE: Looking for MICR check printing software that doesn't suck

      Turns out I would also need proper MICR font, like this https://www.1001fonts.com/micr-encoding-font.html

      posted in IT Discussion
      dave247D
      dave247
    • RE: Looking for MICR check printing software that doesn't suck

      @dashrender said in Looking for MICR check printing software that doesn't suck:

      @dave247 said in Looking for MICR check printing software that doesn't suck:

      @dashrender said in Looking for MICR check printing software that doesn't suck:

      Isn't the MICR just in the toner? Does that part even matter? Maybe I'm wrong and those printers actually have two types of toner in them...

      That's what I was wondering. And yes, MICR is just magnetic ink. I don't know if I could even just technically use Microsoft Word to print on them using the MICR printer....

      I think you can. Only one way to find out 😉

      you know what, you're right hahaha

      posted in IT Discussion
      dave247D
      dave247
    • RE: Looking for MICR check printing software that doesn't suck

      @dashrender said in Looking for MICR check printing software that doesn't suck:

      Isn't the MICR just in the toner? Does that part even matter? Maybe I'm wrong and those printers actually have two types of toner in them...

      That's what I was wondering. And yes, MICR is just magnetic ink. I don't know if I could even just technically use Microsoft Word to print on them using the MICR printer....

      posted in IT Discussion
      dave247D
      dave247
    • Looking for MICR check printing software that doesn't suck

      I work at a bank and we have been using an application called MMS Forms from Blauser Technologies for like 10 years to print temporary checks and loan coupons. It totally sucks. It looks like something out of 1995 and the annual update process is very confusing and nonsensical. It's not a big complex to-do or anything, just messy and different than a normal, modern application. Updating the check image graphic requires using something like InfraView with a plugin to edit a .pcx file. I could go on. All we use MMS Forms for is to print temporary checks which obviously requires a MICR printer and then loan coupons. I can't imagine the software has to be "special" or something crazy...

      I searched around the internet but keep finding equally questionable looking applications. I'm hoping some of you here have used something in the past that maybe worked well.

      posted in IT Discussion
      dave247D
      dave247
    • Delete me - got it all figured out

      Delete me - got it all figured out

      posted in IT Discussion
      dave247D
      dave247
    • RE: Looking for simplest/secure setup for connecting a domain joined computer to corporate network when remote

      @pete-s said in Looking for simplest/secure setup for connecting a domain joined computer to corporate network when remote:

      @dave247 said in Looking for simplest/secure setup for connecting a domain joined computer to corporate network when remote:

      @voip_n00b said in Looking for simplest/secure setup for connecting a domain joined computer to corporate network when remote:

      @dave247 I use certificates to only allow company owned and managed devices to connect.

      Interesting, can you elaborate more on how you achieve that?

      It's common to have certificates with VPN.

      A OpenVPN client for example without any MFA is usually setup so that it needs a client certificate and a username and a password as well as the connection info. The same goes for Cisco AnyConnect and others.

      The VPN connection uses mutual authentication so the client authenticate that the server is who he is suppose to be and the server authenticate the client is who he says he is.

      If you install the certificate on your company devices you can't connect to the VPN just by downloading and installing the client on another computer and enter the credentials. Because you don't have the certificate.

      So that's how you can control what device is allowed to connect. For more security the certificates can also be stored on smart cards, hardware devices or even the TPM module inside the computer.

      You should have something similar on NetExtender. Look for client certificate or client authentication.

      Another thing with certificates is that you can prevent VPN access by revoking the client's certificate. And also certificates expire so you can give someone a short term access if you like.

      Nice, I will check it out. I have opened a few tickets and asked around other places regarding NetExtender and nobody has said anything about this, so I don't know if its possible with the Sonicwall NSA / NetExtender setup, but I will find out.

      posted in IT Discussion
      dave247D
      dave247
    • RE: New customer - greenfield setup

      @scottalanmiller said in New customer - greenfield setup:

      @dave247 said in New customer - greenfield setup:

      I was able to add many category-based exceptions which included banking and medical services, among others. So at least that concern is somewhat removed there, but still.

      That's good that they try. A problem with that, though, is that categories have to be maintained and trusted. So if you use Bank of America or Wells Fargo, I'm sure you are fine. But what if you use a local savings and loan or credit union or a foreign bank or do your banking through a third party site? Sure, your bank might make their list, but it might not. They make an effort, and probably a good one, but at some point it's just people making a list of sites they feel should be in a category. They don't really know. Anyone can make a fake bank website to get around that, there's no way to have enough staff to check sites. And I'm sure tons of real financial institutions get missed because no one though of checking that name.

      Yes, great points there. Oh hey, I was also going to ask you why you excluded Sophos from your deep packet inspection comment. I assume you will say they do it right, and if that's they case, how do they do it better / correctly?

      posted in IT Discussion
      dave247D
      dave247
    • RE: Looking for simplest/secure setup for connecting a domain joined computer to corporate network when remote

      @voip_n00b said in Looking for simplest/secure setup for connecting a domain joined computer to corporate network when remote:

      @dave247 I use certificates to only allow company owned and managed devices to connect.

      Interesting, can you elaborate more on how you achieve that?

      posted in IT Discussion
      dave247D
      dave247
    • RE: New customer - greenfield setup

      @scottalanmiller said in New customer - greenfield setup:

      @dave247 said in New customer - greenfield setup:

      @scottalanmiller said in New customer - greenfield setup:

      @dashrender said in New customer - greenfield setup:

      Of course it's really only worthwhile where we can do SSL inspection (can this be down without installing certs on the clients to allow MiTM inspection?)

      Nope, that's physically impossible. These types of devices I see as reckless because they are often poorly maintained, often made by questionable vendors (Sophos is fine, but many others are less respectable) and provide a single point of total egress of your data with nearly all assumed protections removed.

      Hey Scott, can you elaborate a bit more on that - I'm talking about the recklessness of SSL inspection. I ask because my company has a Sonicwall NSA appliance and in the past I have attempted using the "DPI-SSL" feature (deep packet inspection) which required installing the Sonicwall cert on all systems and then the traffic would be intercepted and inspected. Despite me following their guide and applying the correct settings and site exceptions, I still had some issues and ended up scrapping the effort for now. I already know your opinion on Sonicwall but I just wanted to get more insight into the whole deep packet inspection effort.

      So my issue with that is that it "breaks" the entire security chain. The idea behind the certificate system is that your traffic is encrypted end to end. By adding a man in the middle there is a time when the traffic is not encrypted, but both the browser and the server believe that it is.

      If everything works as expected, this is fine because we trust the man in the middle, in this case. But that's asking a lot of "another system" to be completely trusted.

      In reality neither of the end points truly trust the man in the middle. The "firewall" isn't a friend here, it's in the path because it already distrusts both end points. So trust is not really appropriately at play here.

      On a technology side, this adds an extremely high profile target that is rarely secured close to as well as the server or the workstations are. Traditionally firewalls were an extra layer of security, rather than an extra layer of risk. A compromised firewall meant that you lost a layer of defense, not that the firewall represented a bypass to existing security measures as well. So this ends up being a lot like a VPN, everyone says it's for security, but as used it is nearly always a huge risk because risk is extended rather than the tool being used to lock it down more.

      So both hard technical by adding a huge point of exposure and for bypassing existing controls; and soft technical by putting the most critical point of exposure where network admins tend to understand it the least and where politics tend to keep it from getting properly maintained.

      Then comes liability. Legally you can use this in most circumstances. But only most. I would never use this without my legal team signing off on it. Because you are hijacking encrypted data mid-stream that is meant to be trusted you risk both political fallout (customers, vendors, etc. being angry or going public that data may have been hijacked - possibly without consent) and legal fallout (if this is discovered and HIPAA data was in flight, for example, it technically violated any end to end encryption laws or requirements.) Knowing decrypting network traffic midway carries a lot of risk and you really need to understand the legal or business risk to all of the traffic. It's not something you can just do and not worry about.

      As a business owner, never ever would I take that risk. Huge risk, no real value to doing so. I'd have to be a seriously emotionally driven control freak to consider doing something like this.

      Which brings the final problem with it... a tool like this would not be made by or deployed by those who value security. So if you have a vendor making these tools, or you have management demanding these tools, you have people who are prioritizing control or the emotional perception of control above business interests and security. Sure, a vendor like SonicWall is just catering to their client base. To them it is a good business decision, but that decision is to allow their customers to undermine their own security. So from a security perspective, this goes against all common sense and otherwise stated practices.

      As an aside, IF something like this was ever warranted, it should never be put on the firewall but run in a VM like any other production workload. That people put it on the firewall instead shows how little security thinking is involved when these products are discussed. There are better ways to do this if someone actually intended to do it in a good way.

      Nice! I'm glad to hear you point all those things out because I've also thought similarly about deep packet inspection / MITM functionality on the firewall. It's basically breaking that secure chain of trust, like you said, and when I first learned about it, I just though it seemed a little risky or wrong or something.

      And as I added more and more exceptions, I began to think, what is the point of this if I'm going to add a bunch of exceptions? Then I would just be leaving all the untrusted sites but that sort of thing should be more filtered out using web content filtering, not DPI.

      Also, I'm not defending it, but when I was attempting to enable DPI-SSL on our Sonicwall, I was able to add many category-based exceptions which included banking and medical services, among others. So at least that concern is somewhat removed there, but still.

      posted in IT Discussion
      dave247D
      dave247
    • RE: Looking for simplest/secure setup for connecting a domain joined computer to corporate network when remote

      I was just thinking, there's not really currently a way I can lock down access to specific computers that can access the VPN. I can give assess to only select employees but what's to stop an employee from downloading NetExtender on a non-company managed device and accessing the network that way?

      posted in IT Discussion
      dave247D
      dave247
    • RE: New customer - greenfield setup

      @scottalanmiller said in New customer - greenfield setup:

      @dashrender said in New customer - greenfield setup:

      Of course it's really only worthwhile where we can do SSL inspection (can this be down without installing certs on the clients to allow MiTM inspection?)

      Nope, that's physically impossible. These types of devices I see as reckless because they are often poorly maintained, often made by questionable vendors (Sophos is fine, but many others are less respectable) and provide a single point of total egress of your data with nearly all assumed protections removed.

      Hey Scott, can you elaborate a bit more on that - I'm talking about the recklessness of SSL inspection. I ask because my company has a Sonicwall NSA appliance and in the past I have attempted using the "DPI-SSL" feature (deep packet inspection) which required installing the Sonicwall cert on all systems and then the traffic would be intercepted and inspected. Despite me following their guide and applying the correct settings and site exceptions, I still had some issues and ended up scrapping the effort for now. I already know your opinion on Sonicwall but I just wanted to get more insight into the whole deep packet inspection effort.

      posted in IT Discussion
      dave247D
      dave247
    • 1
    • 2
    • 3
    • 4
    • 5
    • 49
    • 50
    • 1 / 50