Posts

Showing posts from July, 2023

Geneve

Image
  GENEVE (Generic Network Virtualization Encapsulation) GENEVE encapsulated packets are designed to be transmitted via standard networking equipment. Packets are sent from one tunnel endpoint to one or more tunnel endpoints using either unicast or multicast addressing. Applications generate identical IP packets as if they were communicating via hardware switches and routers. The destination IP address included in the packet is significant only within the cloud tenant's virtual network. The tunnel endpoint then encapsulates the end-user IP packet in the GENEVE header, adding the tunnel identifier specifying the tenant's virtual network followed by any options. The header consists of fields specifying that it is a GENEVE packet, the overall length of the options if any, the tunnel identifier and the series of options. The completed packet is then transmitted to the destination endpoint in a standard UDP packet which is supported via IPv4 and IPv6. The receiving tunnel endpoint st

Windows GPO for 802.1x

Image
  Display All Applied GPOs applied to  (User and Computer) Run the command prompt as administrator or you may run into issues with the command returning computer settings. gpresult /r See Applied Group Policies in Windows 10 using RSOP rsop.msc ================= It seems that the "Security" option is available in Wifi properties of Windows 10 enterprise only when you setup the wireless network connection manually. Control Panel -> Network and Internet -> Network and Sharing Center -> Setup a new connection or network -> Manually connect to a wireless network. Choose the Wifi adapter -> Enter the info of wireless network -> Change connection settings -> Now you will have the security tab available. Click on the PEAP settings -> Uncheck "Verify the server's identity by validating the certificate" Click on Advanced Settings -> Specify authentication mode -> Select "user authentication"  -> Click save credentials and enter

Change Window NIC MTU

 1.Show current MTU size netsh interface ipv4 show subinterfaces 2. Run commands netsh interface ipv4 set subinterface “Ethernet0” mtu=1400 store=persistent =============== MTU 1500 is IP packet size, doens't include Ethernet Header (14 bytes) Wireshark capture Lenth column is MTU + Ethernet Header (14 bytes) ping -f 192.168.2.1 -l 1472 1472 + 8 byes ICMP Header + 20 bytes IP Header = 1500, in Wireshark capture, Length is 1514. C:\Users\jliu> ping -f 192.168.2.1 -l 1473 Pinging 192.168.2.1 with 1473 bytes of data: Packet needs to be fragmented but DF set. Packet needs to be fragmented but DF set. Packet needs to be fragmented but DF set. Packet needs to be fragmented but DF set. Ping statistics for 192.168.2.1:     Packets: Sent = 4, Received = 0, Lost = 4 (100% loss), C:\Users\jliu> ping -f 192.168.2.1 -l 1472 Pinging 192.168.2.1 with 1472 bytes of data: Reply from 192.168.2.1: bytes=1472 time=4ms TTL=64 Reply from 192.168.2.1: bytes=1472 time=4ms TTL=64 Reply from 192.168