<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Ubiquiti – Yeri Tiete</title>
    <link>https://yeri.be/tag/ubiquiti/</link>
    <description>Yeri Tiete&#39;s blog</description>
    <language>en</language>
    <copyright>© Yeri Tiete</copyright>
    <lastBuildDate>Tue, 14 Oct 2025 18:53:14 +0200</lastBuildDate>
    <atom:link href="https://yeri.be/tag/ubiquiti/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Unifi u6&#43; failing to upgrade</title>
      <link>https://yeri.be/unifi-u6-failing-to-upgrade/</link>
      <pubDate>Tue, 14 Oct 2025 18:53:14 +0200</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/unifi-u6-failing-to-upgrade/</guid><enclosure url="https://static.yeri.be/2025/10/flatturtle-marquis-wifi.png" length="0" type="image/png" />
      <description>&lt;p&gt;I have quite a few sites where some Unifi U6+ Access Points fail to upgrade with a generic update failed message. &lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;Marquis WiFi Vergaderruimte 4 update failed.&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;I&#39;ve tried everything, from &lt;code&gt;ssh&lt;/code&gt;&#39;ing, factory resetting with &lt;code&gt;set-default&lt;/code&gt;, to manually upgrading with &lt;code&gt;upgrade&lt;/code&gt;, etc. &lt;/p&gt;&#xA;&lt;p&gt;Nothing worked. I thought I had a bunch of bad APs (and many had their warranty expire by a few weeks or months). &lt;/p&gt;&#xA;&lt;p&gt;As a last resort, I decide to reach out to Ubiquiti&#39;s support. First line wasn&#39;t very helpful, but as the case was escalated, I&#39;ve managed to recover and properly update the APs. &lt;/p&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://static.yeri.be/2025/10/flatturtle-marquis-wifi.png" alt="Unifi u6+ failing to upgrade"></p><p>I have quite a few sites where some Unifi U6+ Access Points fail to upgrade with a generic update failed message. </p>
<p><code>Marquis WiFi Vergaderruimte 4 update failed.</code></p>
<p>I've tried everything, from <code>ssh</code>'ing, factory resetting with <code>set-default</code>, to manually upgrading with <code>upgrade</code>, etc. </p>
<p>Nothing worked. I thought I had a bunch of bad APs (and many had their warranty expire by a few weeks or months). </p>
<p>As a last resort, I decide to reach out to Ubiquiti's support. First line wasn't very helpful, but as the case was escalated, I've managed to recover and properly update the APs. </p>
<p>The trick is to <code>ssh</code> into the device and run the following code: </p>
<p><code>curl -fs <a href="https://dl.ui.com/firmwares/uap/jw/U6Rescue.sh" target="_blank" rel="noreferrer noopener"><u>https://dl.ui.com/firmwares/uap/jw/U6Rescue.sh</u></a> | sh</code></p>
<p>The device will reboot and pop by up in the dashboard after 2-3 minutes. Then try to update again, and all should work. </p>
<p>Not really sure what's going on here but ... </p>
]]></content:encoded>
      <category>errors</category><category>hardware</category><category>linux</category><category>networking</category>
      <category>ubiquiti</category><category>wifi</category>
    </item>
    
    <item>
      <title>Allow ping from USG</title>
      <link>https://yeri.be/allow-ping-from-usg/</link>
      <pubDate>Mon, 03 Apr 2023 23:06:26 +0200</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/allow-ping-from-usg/</guid><enclosure url="https://static.yeri.be/2023/04/usg-fw.png" length="0" type="image/png" />
      <description>&lt;p&gt;Because I keep forgetting and it takes me far too much time to go through one of my million sites where I set this up and find the right config... &lt;/p&gt;&#xA;&lt;p&gt;To allow a USG (&lt;a rel=&#34;noreferrer noopener&#34; href=&#34;http://web.archive.org/web/20230426183703/https://store.ui.com/products/unifi-security-gateway&#34; target=&#34;_blank&#34;&gt;Unifi Security Gateway&lt;/a&gt;) to reply to external (WAN) ping requests, do the following:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Head to the Unifi dashboard -&gt; Settings -&gt; Firewall &amp;amp; Security&lt;/li&gt;&#xA;&lt;li&gt;Create a new rule&lt;/li&gt;&#xA;&lt;li&gt;Type: Internet Local&lt;/li&gt;&#xA;&lt;li&gt;Description: Allow Ping (Echo Request)&lt;/li&gt;&#xA;&lt;li&gt;Rule Applied: Before Predefined Rules&lt;/li&gt;&#xA;&lt;li&gt;Action: Accept&lt;/li&gt;&#xA;&lt;li&gt;IPv4 Protocol: ICMP&lt;/li&gt;&#xA;&lt;li&gt;IPv4 IMP Type Name: Echo Request&lt;/li&gt;&#xA;&lt;li&gt;Apply Changes -&gt; wait ~2 minutes&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;That&#39;s it... &lt;/p&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://static.yeri.be/2023/04/usg-fw.png" alt="Allow ping from USG"></p><p>Because I keep forgetting and it takes me far too much time to go through one of my million sites where I set this up and find the right config... </p>
<p>To allow a USG (<a rel="noreferrer noopener" href="http://web.archive.org/web/20230426183703/https://store.ui.com/products/unifi-security-gateway" target="_blank">Unifi Security Gateway</a>) to reply to external (WAN) ping requests, do the following:</p>
<ul>
<li>Head to the Unifi dashboard -> Settings -> Firewall &amp; Security</li>
<li>Create a new rule</li>
<li>Type: Internet Local</li>
<li>Description: Allow Ping (Echo Request)</li>
<li>Rule Applied: Before Predefined Rules</li>
<li>Action: Accept</li>
<li>IPv4 Protocol: ICMP</li>
<li>IPv4 IMP Type Name: Echo Request</li>
<li>Apply Changes -> wait ~2 minutes</li>
</ul>
<p>That's it... </p>
<p>All this for <a rel="noreferrer noopener" href="https://smokeping.eu" target="_blank">Smokeping</a>.</p>
]]></content:encoded>
      <category>linux</category><category>networking</category><category>software</category>
      <category>firewall</category><category>smokeping</category><category>ubiquiti</category>
    </item>
    
    <item>
      <title>NextDNS, EdgeOS and device names</title>
      <link>https://yeri.be/nextdns-edgeos-and-device-names/</link>
      <pubDate>Fri, 15 May 2020 13:02:00 +0200</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/nextdns-edgeos-and-device-names/</guid><enclosure url="https://static.yeri.be/2020/05/nextdnslogs.png" length="0" type="image/png" />
      <description>&lt;p&gt;Noticed that NextDNS was reporting old hostnames in the logs. For example old device names (devices that changed hostnames), devices that were definitely no longer on the network, or IPs that were matched to the wrong hostnames.&lt;/p&gt;&#xA;&lt;p&gt;The culprit is how EdgeOS deals with its &lt;a aria-label=&#34;hosts file (opens in a new tab)&#34; href=&#34;https://en.wikipedia.org/wiki/Hosts_%28file%29&#34; target=&#34;_blank&#34; rel=&#34;noreferrer noopener&#34; class=&#34;aioseop-link&#34;&gt;hosts file&lt;/a&gt;. Basically it just keeps all the old hosts added and just adds a new line at the end of the file. &lt;/p&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://static.yeri.be/2020/05/nextdnslogs.png" alt="NextDNS, EdgeOS and device names"></p><p>Noticed that NextDNS was reporting old hostnames in the logs. For example old device names (devices that changed hostnames), devices that were definitely no longer on the network, or IPs that were matched to the wrong hostnames.</p>
<p>The culprit is how EdgeOS deals with its <a aria-label="hosts file (opens in a new tab)" href="https://en.wikipedia.org/wiki/Hosts_%28file%29" target="_blank" rel="noreferrer noopener" class="aioseop-link">hosts file</a>. Basically it just keeps all the old hosts added and just adds a new line at the end of the file. </p>
<p>NextDNS searches for the first valid entry in that file, which is always going to be an older record.</p>
<p>So the simplest solution I found was the turn off <code>hostfile-update</code> every so often. This clears the hosts file. </p>
<p>So <code>ssh</code> into the device, run <code>configure</code>, and then run these commands:</p>
<pre class="wp-block-code"><code>set service dhcp-server hostfile-update disable
commit
set service dhcp-server hostfile-update enable
commit
save</code></pre>
<h2 class="wp-block-heading">Update 22 Jun '23:</h2>
<p>Be sure to restart NextDNS, or it won't actually publish the up-to-date client hostnames.</p>
<pre class="wp-block-code"><code>sudo /config/nextdns/nextdns restart</code></pre>
]]></content:encoded>
      <category>linux</category><category>networking</category><category>software</category>
      <category>dns</category><category>nextdns</category><category>router</category><category>ubiquiti</category>
    </item>
    
    <item>
      <title>NextDNS &#43; EdgeRouter &#43; Redirecting DNS requests</title>
      <link>https://yeri.be/nextdns-edgerouter-redirecting-dns-requests/</link>
      <pubDate>Tue, 21 Apr 2020 18:14:00 +0200</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/nextdns-edgerouter-redirecting-dns-requests/</guid><enclosure url="https://static.yeri.be/2020/04/nextdns.png" length="0" type="image/png" />
      <description>&lt;p&gt;Realised I haven&#39;t updated this in a long while (life happened).&lt;/p&gt;&#xA;&lt;p&gt;Couple of weeks ago I started to play with &lt;a href=&#34;http://nextdns.io&#34; target=&#34;_blank&#34; aria-label=&#34; (opens in a new tab)&#34; rel=&#34;noreferrer noopener&#34; class=&#34;aioseop-link&#34;&gt;NextDNS&lt;/a&gt; -- and I really recommend anyone that&#39;s something privacy minded and cares about the stuff happening on their network. &lt;/p&gt;&#xA;&lt;p&gt;I&#39;ve set up several configs (home, parents, FlatTurtle &lt;a aria-label=&#34; (opens in a new tab)&#34; href=&#34;https://blog.flatturtle.com/image/103073818135&#34; target=&#34;_blank&#34; rel=&#34;noreferrer noopener&#34; class=&#34;aioseop-link&#34;&gt;TurtleBox&lt;/a&gt; (the NUCs controlling the &lt;a aria-label=&#34; (opens in a new tab)&#34; href=&#34;https://flatturtle.com/screens&#34; target=&#34;_blank&#34; rel=&#34;noreferrer noopener&#34; class=&#34;aioseop-link&#34;&gt;screens&lt;/a&gt;)) and Servers. Once it&#39;s out of beta and better supported on Unifi and Ubiquiti hardware I might deploy it to our &lt;a aria-label=&#34; (opens in a new tab)&#34; href=&#34;https://blog.flatturtle.com/image/101035897937&#34; target=&#34;_blank&#34; rel=&#34;noreferrer noopener&#34; class=&#34;aioseop-link&#34;&gt;public WiFi&lt;/a&gt; (well, most access points don&#39;t look like that -- but you get the point) networks too. &lt;/p&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://static.yeri.be/2020/04/nextdns.png" alt="NextDNS + EdgeRouter + Redirecting DNS requests"></p><p>Realised I haven't updated this in a long while (life happened).</p>
<p>Couple of weeks ago I started to play with <a href="http://nextdns.io" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">NextDNS</a> -- and I really recommend anyone that's something privacy minded and cares about the stuff happening on their network. </p>
<p>I've set up several configs (home, parents, FlatTurtle <a aria-label=" (opens in a new tab)" href="https://blog.flatturtle.com/image/103073818135" target="_blank" rel="noreferrer noopener" class="aioseop-link">TurtleBox</a> (the NUCs controlling the <a aria-label=" (opens in a new tab)" href="https://flatturtle.com/screens" target="_blank" rel="noreferrer noopener" class="aioseop-link">screens</a>)) and Servers. Once it's out of beta and better supported on Unifi and Ubiquiti hardware I might deploy it to our <a aria-label=" (opens in a new tab)" href="https://blog.flatturtle.com/image/101035897937" target="_blank" rel="noreferrer noopener" class="aioseop-link">public WiFi</a> (well, most access points don't look like that -- but you get the point) networks too. </p>
<p>Looking at the logs was an eye-opener seeing what goes through your network. You can play around and block (or whitelist) certain domains. </p>
<figure class="wp-block-image size-large"><a href="https://static.yeri.be/2020/04/nextdns_0x04.png" target="_blank" rel="noopener noreferrer"><img src="https://static.yeri.be/2020/04/nextdns_0x04-902x1024.png" alt="" class="wp-image-8310"/></a></figure>
<p>I figured out my <a href="https://www.devialet.com" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">Devialet</a> does an insane amount of requests to <a href="http://cache.radioline.fr" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">cache.radioline.fr</a> for example. This domain has a 30s TTL. It shows that the majority of my DNS requests are actually automated pings and not in any way human traffic. </p>
<p>Anyhow -- I've since installed the <a href="https://github.com/nextdns/nextdns/wiki/EdgeOS" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">NextDNS CLI</a> straight on my <a href="https://yeri.be/edgerouter-fritzbox-ipsec" class="aioseop-link">EdgeRouter</a> Lite acting as a caching DNS server and forwarding using <a href="https://en.wikipedia.org/wiki/DNS_over_HTTPS" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">DoH</a>. </p>
<p>I've turned off dnsmasq (<code>/etc/default/dnsmasq</code> =&gt; <code>DNSMASQ_OPTS="-p0"</code>) and have NextDNS listen to :53 directly. </p>
<p>Note that every EdgeOS update seems to wipe out the NextDNS installation, and requires a fresh install... Pain in the ass and doesn't seem like that's fixable. </p>
<p>This is my ERL NextDNS config (<code>/etc/nextdns.conf</code>)</p>
<pre class="wp-block-preformatted">hardened-privacy false
bogus-priv true
log-queries false
cache-size 10MB
cache-max-age 0s
report-client-info true
timeout 5s
listen :53
use-hosts true
setup-router false
auto-activate true
config 34xyz8
detect-captive-portals false
max-ttl 0s</pre>
<p>The explanation of every flag is explain on their <a href="https://github.com/nextdns/nextdns/" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">Github</a> page and they are very responsive via issues or through their chat on <a href="http://my.nextdns.io" target="_blank" aria-label="my.nextdns.io (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">my.nextdns.io</a>.  </p>
<p>All right -- next thing I've noticed is that my Google Home devices are not sending any DNS requests -- which means the devices use hard coded DNS servers. </p>
<p>I have a separate vlan (<code>eth1.90</code>) for Google Home (includes my Android TV, <a aria-label=" (opens in a new tab)" href="https://osmc.tv/" target="_blank" rel="noreferrer noopener" class="aioseop-link">OSMC</a>, Nest Home Hub and all other GHome and Chromecast devices). For this vlan I set up a deflector to be able to cast and ping/ssh from my "main" network/vlan to GHome vlan. </p>
<p>Using <a href="https://iperf.io/2019/12/27/intercept-and-redirect-dns-requests/" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">this guide</a> I redirected all external DNS traffic to the ERL so I can monitor what's happening. The important part was the following:</p>
<pre class="wp-block-preformatted">yeri@sg-erl# show service nat rule 4053<br />destination {<br />port 53<br />}<br />inbound-interface eth1.90<br />inside-address {<br />address 10.3.34.1<br />port 53<br />}<br />protocol tcp_udp<br />type destination</pre>
<p>This allows to "catch" all UDP and TCP connections to :53 and redirect them the ERL DNS server (10.3.34.1). The GHome devices were acting a bit weird after committing the change, but a reboot of the device fixed it. </p>
<p>Note that you need to set this up per vlan. If you want to catch DNS requests for your Guest or IoT vlan, you'll need to do the same. </p>
]]></content:encoded>
      <category>google</category><category>linux</category><category>networking</category>
      <category>debian</category><category>dns</category><category>nextdns</category><category>router</category><category>ubiquiti</category>
    </item>
    
    <item>
      <title>Edgerouter IPsec tunnel to Fritzbox</title>
      <link>https://yeri.be/edgerouter-fritzbox-ipsec/</link>
      <pubDate>Wed, 08 Feb 2017 21:18:10 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/edgerouter-fritzbox-ipsec/</guid>
      <description>&lt;p&gt;So, I have an EdgeRouter Lite in Singapore (Starhub) and a FritzBox in Belgium (EDPnet).&lt;/p&gt;&#xA;&lt;p&gt;This is mostly stuff that I have found from several articles, mostly from &lt;a href=&#34;https://community.ubnt.com/t5/EdgeMAX/HOW-TO-IPSec-Site-to-Site-VPN-with-both-dynamic-IPs-between/m-p/1548055#U1548055&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;ERL: eth0 is WAN, eth1 (10.60.111.0/24) and eth2 (unused, not VPN&amp;rsquo;ed) are LAN&#xA;FritzBoz: 192.168.1.0/24&lt;/p&gt;&#xA;&lt;p&gt;This is the FritzBox config (go to VPN and them Import a config) &lt;code&gt;fritzvpn.cfg&lt;/code&gt;:&lt;/p&gt;&#xA;&lt;pre&gt;vpncfg {&#xA;        connections {&#xA;                enabled = yes;&#xA;                conn_type = conntype_lan;&#xA;                name = &#34;VPN Yeri&#34;;&#xA;                always_renew = yes;&#xA;                reject_not_encrypted = no;&#xA;                dont_filter_netbios = yes;&#xA;                localip = 0.0.0.0;&#xA;                local_virtualip = 0.0.0.0;&#xA;                remoteip = 0.0.0.0;&#xA;                remote_virtualip = 0.0.0.0;&#xA;                remotehostname = &#34;erl.yeri.be&#34;;&#xA;                localid {&#xA;                        fqdn = &#34;fritz.yeri.be&#34;;&#xA;                }&#xA;                remoteid {&#xA;                        fqdn = &#34;erl.yeri.be&#34;;&#xA;                }&#xA;                mode = phase1_mode_idp;&#xA;                phase1ss = &#34;all/all/all&#34;;&#xA;                keytype = connkeytype_pre_shared;&#xA;                key = &#34;SOMEPASSWORD&#34;;&#xA;                cert_do_server_auth = no;&#xA;                use_nat_t = yes;&#xA;                use_xauth = no;&#xA;                use_cfgmode = no;&#xA;                phase2localid {&#xA;                        ipnet {&#xA;                                ipaddr = 192.168.1.0;&#xA;                                mask = 255.255.255.0;&#xA;                        }&#xA;                }&#xA;                phase2remoteid {&#xA;                        ipnet {&#xA;                                ipaddr = 10.60.111.0;&#xA;                                mask = 255.255.255.0;&#xA;                        }&#xA;                }&#xA;                phase2ss = &#34;esp-all-all/ah-none/comp-all/pfs&#34;;&#xA;                accesslist = &#34;permit ip any 10.60.111.0 255.255.255.0&#34;;&#xA;        }&#xA;        ike_forward_rules = &#34;udp 0.0.0.0:500 0.0.0.0:500&#34;, &#xA;                            &#34;udp 0.0.0.0:4500 0.0.0.0:4500&#34;;&#xA;}&lt;/pre&gt;&#xA;&lt;p&gt;Be sure to modify the password, local (Fritz) and remote (ERL) LAN and edit the local and remote fqdn.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>So, I have an EdgeRouter Lite in Singapore (Starhub) and a FritzBox in Belgium (EDPnet).</p>
<p>This is mostly stuff that I have found from several articles, mostly from <a href="https://community.ubnt.com/t5/EdgeMAX/HOW-TO-IPSec-Site-to-Site-VPN-with-both-dynamic-IPs-between/m-p/1548055#U1548055" target="_blank" rel="noopener">here</a>.</p>
<p>ERL: eth0 is WAN, eth1 (10.60.111.0/24) and eth2 (unused, not VPN&rsquo;ed) are LAN
FritzBoz: 192.168.1.0/24</p>
<p>This is the FritzBox config (go to VPN and them Import a config) <code>fritzvpn.cfg</code>:</p>
<pre>vpncfg {
        connections {
                enabled = yes;
                conn_type = conntype_lan;
                name = "VPN Yeri";
                always_renew = yes;
                reject_not_encrypted = no;
                dont_filter_netbios = yes;
                localip = 0.0.0.0;
                local_virtualip = 0.0.0.0;
                remoteip = 0.0.0.0;
                remote_virtualip = 0.0.0.0;
                remotehostname = "erl.yeri.be";
                localid {
                        fqdn = "fritz.yeri.be";
                }
                remoteid {
                        fqdn = "erl.yeri.be";
                }
                mode = phase1_mode_idp;
                phase1ss = "all/all/all";
                keytype = connkeytype_pre_shared;
                key = "SOMEPASSWORD";
                cert_do_server_auth = no;
                use_nat_t = yes;
                use_xauth = no;
                use_cfgmode = no;
                phase2localid {
                        ipnet {
                                ipaddr = 192.168.1.0;
                                mask = 255.255.255.0;
                        }
                }
                phase2remoteid {
                        ipnet {
                                ipaddr = 10.60.111.0;
                                mask = 255.255.255.0;
                        }
                }
                phase2ss = "esp-all-all/ah-none/comp-all/pfs";
                accesslist = "permit ip any 10.60.111.0 255.255.255.0";
        }
        ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", 
                            "udp 0.0.0.0:4500 0.0.0.0:4500";
}</pre>
<p>Be sure to modify the password, local (Fritz) and remote (ERL) LAN and edit the local and remote fqdn.</p>
<p>This is the ERL config (via ssh, you&rsquo;ll need to <code>set</code> this:</p>
<pre>yeri@sg-erl# show vpn ipsec 
 auto-update 60
 auto-firewall-nat-exclude enable
 esp-group FOO0 {
     proposal 1 {
         encryption aes256
         hash sha1
     }
 }
 ike-group FOO0 {
     dead-peer-detection {
         action restart
         interval 60
         timeout 60
     }
     lifetime 3600
     proposal 1 {
         dh-group 2
         encryption aes256
         hash sha1
     }
 }
 ipsec-interfaces {
     interface eth0
 }
 nat-networks {
     allowed-network 0.0.0.0/0 {
     }
 }
 nat-traversal enable
 site-to-site {
     peer fritz.yeri.be {
         authentication {
             mode pre-shared-secret
             pre-shared-secret SOMEPASSWORD
         }
         connection-type initiate
         description "VPN to fritz.yeri.be"
         ike-group FOO0
         local-address erl.yeri.be
         tunnel 1 {
             esp-group FOO0
             local {
                 prefix 10.60.111.0/24
             }
             remote {
                 prefix 192.168.1.0/24
             }
         }
     }
 }</pre>
<p>Status:</p>
<pre>yeri@sg:~$ show vpn ipsec status
IPSec Process Running PID: 20140

1 Active IPsec Tunnels

IPsec Interfaces :
        eth0    (no IP on interface statically configured as local-address for any VPN peer)
yeri@sg:~$ show vpn ipsec sa
peer-be.yeri.be-tunnel-1: #9, ESTABLISHED, IKEv1, 85a2d010ada73113:ca439c40ac3bca06
  local  'erl.yeri.be' @ 116.87.x.y
  remote 'fritz.yeri.be' @ 109.236.x.y
  AES_CBC-256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  established 1592s ago, reauth in 1333s
  peer-fritz.yeri.be-tunnel-1: #1, INSTALLED, TUNNEL, ESP:AES_CBC-256/HMAC_SHA1_96/MODP_1024
    installed 1592 ago, rekeying in 1200s, expires in 2009s
    in  c0bb652e, 1038032 bytes, 10726 packets,     0s ago
    out 8d5df3f5, 532685 bytes,  6062 packets,     0s ago
    local  10.60.111.0/24
    remote 192.168.1.0/24</pre>
<p>I haven&rsquo;t really figured out what <code>no IP on interface statically configured as local-address for any VPN peer</code> means yet though.</p>
<p>Next up: VLANs</p>
]]></content:encoded>
      <category>hardware</category><category>linux</category><category>networking</category>
      <category>1</category><category>9</category><category>ubiquiti</category><category>vpn</category>
    </item>
    
    <item>
      <title>FlatTurtle in elevators: making of</title>
      <link>https://yeri.be/flatturtle-in-lifts-making-of/</link>
      <pubDate>Tue, 17 Feb 2015 08:43:03 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/flatturtle-in-lifts-making-of/</guid>
      <description>&lt;p&gt;First tests at &lt;a href=&#34;https://maps.flatturtle.com/glaverbel&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Glaverbel&lt;/a&gt; (circle or &amp;ldquo;O&amp;rdquo; shaped building) in Watermael-Boisfort with 12 lifts (&lt;a href=&#34;https://yeri.be/flatturtle-in-lifts&#34;&gt;about a year ago&lt;/a&gt;). Internet wiring makes a whole circle from the internet connection at the technical room (near entrance hall). In this design from the 1960s the lift machine rooms had one shared/common room where we installed switches (to avoid having to pull too much cable and to overcome cable length issues). High quality shielded cable was used to avoid signal loss over the distances we did.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>First tests at <a href="https://maps.flatturtle.com/glaverbel" target="_blank" rel="noopener noreferrer">Glaverbel</a> (circle or &ldquo;O&rdquo; shaped building) in Watermael-Boisfort with 12 lifts (<a href="https://yeri.be/flatturtle-in-lifts">about a year ago</a>). Internet wiring makes a whole circle from the internet connection at the technical room (near entrance hall). In this design from the 1960s the lift machine rooms had one shared/common room where we installed switches (to avoid having to pull too much cable and to overcome cable length issues). High quality shielded cable was used to avoid signal loss over the distances we did.</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140820_093857.jpg"><img class="alignnone size-large wp-image-6741" src="https://static.yeri.be/2015/02/IMG_20140820_093857-758x1024.jpg" alt="IMG_20140820_093857" width="758" height="1024" /></a></p>
<p>We first opted for wired internet to the cabin (TurtleBox being on top of the cabin, with HDMI to the display in the cabin &ndash; the idea was to cover the TurtleBox inside the roof/under some protection in case something would fall, and for moist and dust &ndash; this was quickly abandoned due to space &amp; time constraints).</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140821_095253.jpg"><img class="alignnone size-large wp-image-6738" src="https://static.yeri.be/2015/02/IMG_20140821_095253-758x1024.jpg" alt="IMG_20140821_095253" width="758" height="1024" /></a></p>
<p>The TurtleBox in this case was again an Intel NUC (Celeron for the first two &ldquo;tests&rdquo;, Atom afterwards due to fanless design).</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140820_150726.jpg"><img class="alignnone size-large wp-image-6743" src="https://static.yeri.be/2015/02/IMG_20140820_150726-758x1024.jpg" alt="IMG_20140820_150726" width="758" height="1024" /></a></p>
<p>After the first initial test, wired internet was not feasible after our first two cabins:</p>
<ul>
    <li>pricing of cable (~€450)</li>
    <li>Kone provided wrong cable (some weird color codes, not the regular STP/UTP, coating was too big for STP plugs)</li>
    <li>Test lift one tore the cable (probably got stuck somewhere between the cabin and the wall)</li>
    <li>In test lift two, during a controlled shut down of the lift (due to other repairs by Kone Refurbishments), Kone Emergencies got called by the customer to start up the shut downed lift (customer not being aware of the shutdown reason). Kone Services didn't recognise the new wiring as native or normal, and decided to cut down the cable.</li>
</ul>
<p>=&gt; So wiring is more (expensive) hassle than anything else.</p>
<p>We realized we didn&rsquo;t want to go through this mess 10 more times.</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140820_150747.jpg"><img class="alignnone size-large wp-image-6739" src="https://static.yeri.be/2015/02/IMG_20140820_150747-758x1024.jpg" alt="IMG_20140820_150747" width="758" height="1024" /></a> <a href="https://static.yeri.be/2015/02/IMG_20140820_150755.jpg"><img class="alignnone size-large wp-image-6740" src="https://static.yeri.be/2015/02/IMG_20140820_150755-758x1024.jpg" alt="IMG_20140820_150755" width="758" height="1024" /></a><a href="https://static.yeri.be/2015/02/IMG_20140605_083820-nopm-.jpg"><img class="alignnone size-large wp-image-6757" src="https://static.yeri.be/2015/02/IMG_20140605_083820-nopm--768x1024.jpg" alt="IMG_20140605_083820-nopm-" width="768" height="1024" /></a></p>
<p>I can also tell you lifts are way less &lsquo;clean&rsquo; than I would have expected.</p>
<p>The idea <a href="http://www.lampebvba.be/" target="_blank" rel="noopener noreferrer">my technician</a> (can greatly recommend him for doing an amazing, detailed &amp; clean job) had was to try with WiFi. I was skeptic (10ish floors, lots of metal and other crap inside the shaft)&hellip; But it would definitely be cheaper and easier to maintain.</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140820_150734.jpg"><img class="alignnone size-large wp-image-6742" src="https://static.yeri.be/2015/02/IMG_20140820_150734-758x1024.jpg" alt="IMG_20140820_150734" width="758" height="1024" /></a></p>
<p>NUCs are mounted on top of the cabin for a clear line of sight. However, after testing this was deemed unnecessary and they got lowered/mounted to the side to provide additional protection.</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140605_120631.jpg"><img class="alignnone size-large wp-image-6792" src="https://static.yeri.be/2015/02/IMG_20140605_120631-758x1024.jpg" alt="IMG_20140605_120631" width="758" height="1024" /></a></p>
<p>In the end, I have to say due to all the metal and concrete, signal went WAY further than I&rsquo;d imagine (we could do two entirely separated shafts with one AP, just the -1 and -2 floors had troubles to have a stable signal). Signal is strong enough to have working WiFi in the (metal) lift cabin, and people working not too far from the (metal) lift doors on the floors can still use WiFi as well (albeit not with the best signal).</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140821_095235.jpg"><img class="alignnone size-large wp-image-6744" src="https://static.yeri.be/2015/02/IMG_20140821_095235-758x1024.jpg" alt="IMG_20140821_095235" width="758" height="1024" /></a></p>
<p>WiFi (Ubiquiti unifi, again) uses Power-over-Ethernet and remotely managed using <a href="https://web.archive.org/web/20220706202838/https://auki.io/" target="_blank" rel="noopener noreferrer">Auki</a> making it very easy to manage and install.</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140820_151318.jpg"><img class="alignnone size-large wp-image-6745" src="https://static.yeri.be/2015/02/IMG_20140820_151318-758x1024.jpg" alt="IMG_20140820_151318" width="758" height="1024" /></a></p>
<p>The 12 lifts now have <a href="https://FlatTurtle.com/" target="_blank" rel="noopener noreferrer">FlatTurtle</a> displays in them, using WiFi as internet connection&hellip; And it&rsquo;s working like a charm!</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140605_090517.jpg"><img class="alignnone size-large wp-image-6758" src="https://static.yeri.be/2015/02/IMG_20140605_090517-758x1024.jpg" alt="IMG_20140605_090517" width="758" height="1024" /></a> <a href="https://static.yeri.be/2015/02/IMG_20140605_092417.jpg"><img class="alignnone size-large wp-image-6759" src="https://static.yeri.be/2015/02/IMG_20140605_092417-758x1024.jpg" alt="IMG_20140605_092417" width="758" height="1024" /></a></p>
<p>Oh, and on a plus side, Kone technicians (all of them) were a charm to work with, doing a great job!!</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140605_083833-nopm-.jpg"><img class="alignnone size-large wp-image-6760" src="https://static.yeri.be/2015/02/IMG_20140605_083833-nopm--768x1024.jpg" alt="IMG_20140605_083833-nopm-" width="768" height="1024" /></a> <a href="https://static.yeri.be/2015/02/IMG_20140605_084411.jpg"><img class="alignnone size-large wp-image-6761" src="https://static.yeri.be/2015/02/IMG_20140605_084411-1024x758.jpg" alt="IMG_20140605_084411" width="780" height="577" /></a> <a href="https://static.yeri.be/2015/02/IMG_20140605_092429.jpg"><img class="alignnone size-large wp-image-6762" src="https://static.yeri.be/2015/02/IMG_20140605_092429-758x1024.jpg" alt="IMG_20140605_092429" width="758" height="1024" /></a><a href="https://static.yeri.be/2015/02/IMG_20140605_105201.jpg"><img class="alignnone size-large wp-image-6791" src="https://static.yeri.be/2015/02/IMG_20140605_105201-758x1024.jpg" alt="IMG_20140605_105201" width="758" height="1024" /></a></p>
<p>More at <a href="http://blog.flatturtle.com/" target="_blank" rel="noopener noreferrer">FlatTurtle&rsquo;s blog</a>.</p>
]]></content:encoded>
      <category>hardware</category>
      <category>flatturtle</category><category>ubiquiti</category><category>wifi</category>
    </item>
    
    <item>
      <title>Turtle shaped WiFi</title>
      <link>https://yeri.be/turtle-shaped-wifi/</link>
      <pubDate>Tue, 10 Feb 2015 16:03:09 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/turtle-shaped-wifi/</guid>
      <description>&lt;p&gt;demolished a &lt;a href=&#34;http://www.ubnt.com/unifi/unifi-ap/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;unifi&lt;/a&gt; from &lt;a href=&#34;https://web.archive.org/web/20220706202838/https://auki.io/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Auki&lt;/a&gt; and build a 3D printed Turtle around it.&lt;/p&gt;&#xA;&lt;p&gt;Came out very nicely, and it&amp;rsquo;s quite solid.&lt;/p&gt;&#xA;&lt;p&gt;3D renders:&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/01/WT-blk1.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6647&#34; src=&#34;https://static.yeri.be/2015/01/WT-blk1-1024x530.jpg&#34; alt=&#34;WT-blk1&#34; width=&#34;780&#34; height=&#34;404&#34; /&gt;&lt;/a&gt; &lt;a href=&#34;https://static.yeri.be/2015/01/WT-blk2.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6648&#34; src=&#34;https://static.yeri.be/2015/01/WT-blk2-1024x530.jpg&#34; alt=&#34;WT-blk2&#34; width=&#34;780&#34; height=&#34;404&#34; /&gt;&lt;/a&gt; &lt;a href=&#34;https://static.yeri.be/2015/01/WT-blk3.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6649&#34; src=&#34;https://static.yeri.be/2015/01/WT-blk3-1024x530.jpg&#34; alt=&#34;WT-blk3&#34; width=&#34;780&#34; height=&#34;404&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Actual printed design:&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/sfeer-1.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6652&#34; src=&#34;https://static.yeri.be/2015/02/sfeer-1-928x1024.jpg&#34; alt=&#34;sfeer 1&#34; width=&#34;780&#34; height=&#34;861&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/schaduw-3.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6653&#34; src=&#34;https://static.yeri.be/2015/02/schaduw-3-1024x682.jpg&#34; alt=&#34;schaduw 3&#34; width=&#34;780&#34; height=&#34;519&#34; /&gt;&lt;/a&gt; &lt;a href=&#34;https://static.yeri.be/2015/02/schaduw-4.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6654&#34; src=&#34;https://static.yeri.be/2015/02/schaduw-4-1024x682.jpg&#34; alt=&#34;schaduw 4&#34; width=&#34;780&#34; height=&#34;519&#34; /&gt;&lt;/a&gt; &lt;a href=&#34;https://static.yeri.be/2015/02/schaduw-5.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6655&#34; src=&#34;https://static.yeri.be/2015/02/schaduw-5-1024x681.jpg&#34; alt=&#34;schaduw 5&#34; width=&#34;780&#34; height=&#34;519&#34; /&gt;&lt;/a&gt; &lt;a href=&#34;https://static.yeri.be/2015/02/closeup.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6656&#34; src=&#34;https://static.yeri.be/2015/02/closeup-1024x681.jpg&#34; alt=&#34;closeup&#34; width=&#34;780&#34; height=&#34;519&#34; /&gt;&lt;/a&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/IMG_20141014_124319.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6679&#34; src=&#34;https://static.yeri.be/2015/02/IMG_20141014_124319-1024x758.jpg&#34; alt=&#34;IMG_20141014_124319&#34; width=&#34;780&#34; height=&#34;577&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Opened up unifi:&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/02/IMG_20140923_224646.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6685&#34; src=&#34;https://static.yeri.be/2015/02/IMG_20140923_224646-758x1024.jpg&#34; alt=&#34;IMG_20140923_224646&#34; width=&#34;758&#34; height=&#34;1024&#34; /&gt;&lt;/a&gt; &lt;a href=&#34;https://static.yeri.be/2015/02/IMG_20140923_224706.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6686&#34; src=&#34;https://static.yeri.be/2015/02/IMG_20140923_224706-758x1024.jpg&#34; alt=&#34;IMG_20140923_224706&#34; width=&#34;758&#34; height=&#34;1024&#34; /&gt;&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>demolished a <a href="http://www.ubnt.com/unifi/unifi-ap/" target="_blank" rel="noopener noreferrer">unifi</a> from <a href="https://web.archive.org/web/20220706202838/https://auki.io/" target="_blank" rel="noopener noreferrer">Auki</a> and build a 3D printed Turtle around it.</p>
<p>Came out very nicely, and it&rsquo;s quite solid.</p>
<p>3D renders:</p>
<p><a href="https://static.yeri.be/2015/01/WT-blk1.jpg"><img class="alignnone size-large wp-image-6647" src="https://static.yeri.be/2015/01/WT-blk1-1024x530.jpg" alt="WT-blk1" width="780" height="404" /></a> <a href="https://static.yeri.be/2015/01/WT-blk2.jpg"><img class="alignnone size-large wp-image-6648" src="https://static.yeri.be/2015/01/WT-blk2-1024x530.jpg" alt="WT-blk2" width="780" height="404" /></a> <a href="https://static.yeri.be/2015/01/WT-blk3.jpg"><img class="alignnone size-large wp-image-6649" src="https://static.yeri.be/2015/01/WT-blk3-1024x530.jpg" alt="WT-blk3" width="780" height="404" /></a></p>
<p>Actual printed design:</p>
<p><a href="https://static.yeri.be/2015/02/sfeer-1.jpg"><img class="alignnone size-large wp-image-6652" src="https://static.yeri.be/2015/02/sfeer-1-928x1024.jpg" alt="sfeer 1" width="780" height="861" /></a></p>
<p><a href="https://static.yeri.be/2015/02/schaduw-3.jpg"><img class="alignnone size-large wp-image-6653" src="https://static.yeri.be/2015/02/schaduw-3-1024x682.jpg" alt="schaduw 3" width="780" height="519" /></a> <a href="https://static.yeri.be/2015/02/schaduw-4.jpg"><img class="alignnone size-large wp-image-6654" src="https://static.yeri.be/2015/02/schaduw-4-1024x682.jpg" alt="schaduw 4" width="780" height="519" /></a> <a href="https://static.yeri.be/2015/02/schaduw-5.jpg"><img class="alignnone size-large wp-image-6655" src="https://static.yeri.be/2015/02/schaduw-5-1024x681.jpg" alt="schaduw 5" width="780" height="519" /></a> <a href="https://static.yeri.be/2015/02/closeup.jpg"><img class="alignnone size-large wp-image-6656" src="https://static.yeri.be/2015/02/closeup-1024x681.jpg" alt="closeup" width="780" height="519" /></a><a href="https://static.yeri.be/2015/02/IMG_20141014_124319.jpg"><img class="alignnone size-large wp-image-6679" src="https://static.yeri.be/2015/02/IMG_20141014_124319-1024x758.jpg" alt="IMG_20141014_124319" width="780" height="577" /></a></p>
<p>Opened up unifi:</p>
<p><a href="https://static.yeri.be/2015/02/IMG_20140923_224646.jpg"><img class="alignnone size-large wp-image-6685" src="https://static.yeri.be/2015/02/IMG_20140923_224646-758x1024.jpg" alt="IMG_20140923_224646" width="758" height="1024" /></a> <a href="https://static.yeri.be/2015/02/IMG_20140923_224706.jpg"><img class="alignnone size-large wp-image-6686" src="https://static.yeri.be/2015/02/IMG_20140923_224706-758x1024.jpg" alt="IMG_20140923_224706" width="758" height="1024" /></a></p>
<p>Design by <a href="http://www.seendesign.be/" target="_blank" rel="noopener noreferrer">Seendesign</a>.</p>
<p>More at <a href="http://blog.flatturtle.com/" target="_blank" rel="noopener noreferrer">FlatTurtle&rsquo;s blog</a>.</p>
]]></content:encoded>
      <category>hardware</category><category>networking</category>
      <category>flatturtle</category><category>ubiquiti</category><category>wifi</category>
    </item>
    
    <item>
      <title>Outdoor WiFi (120onCortenbergh)</title>
      <link>https://yeri.be/outdoor-wifi-120oncortenbergh/</link>
      <pubDate>Fri, 06 Feb 2015 16:17:26 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/outdoor-wifi-120oncortenbergh/</guid>
      <description>&lt;p&gt;About a year later&amp;hellip; Except not being white anymore, it still looks good. &lt;a href=&#34;http://www.ubnt.com/unifi/unifi-ap-outdoor/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Outdoor unifi&lt;/a&gt; (previous model) connected to &lt;a href=&#34;https://web.archive.org/web/20211216112944/http://auki.be/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Auki&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/01/2015-01-21.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6668&#34; src=&#34;https://static.yeri.be/2015/01/2015-01-21-768x1024.jpg&#34; alt=&#34;2015-01-21&#34; width=&#34;768&#34; height=&#34;1024&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Picture enhanced by Google Plus to add dramatic effect. ;)&lt;/p&gt;&#xA;&lt;p&gt;Original picture &lt;a href=&#34;https://static.yeri.be/2015/01/2015-01-21_original.jpg&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>About a year later&hellip; Except not being white anymore, it still looks good. <a href="http://www.ubnt.com/unifi/unifi-ap-outdoor/" target="_blank" rel="noopener noreferrer">Outdoor unifi</a> (previous model) connected to <a href="https://web.archive.org/web/20211216112944/http://auki.be/" target="_blank" rel="noopener noreferrer">Auki</a>.</p>
<p><a href="https://static.yeri.be/2015/01/2015-01-21.jpg"><img class="alignnone size-large wp-image-6668" src="https://static.yeri.be/2015/01/2015-01-21-768x1024.jpg" alt="2015-01-21" width="768" height="1024" /></a></p>
<p>Picture enhanced by Google Plus to add dramatic effect. ;)</p>
<p>Original picture <a href="https://static.yeri.be/2015/01/2015-01-21_original.jpg">here</a>.</p>
]]></content:encoded>
      <category>hardware</category><category>networking</category>
      <category>flatturtle</category><category>ubiquiti</category><category>wifi</category>
    </item>
    
    <item>
      <title>Outdoor WiFi (Pegasus Park)</title>
      <link>https://yeri.be/outdoor-wifi-pegasus-park/</link>
      <pubDate>Sat, 24 Jan 2015 00:11:45 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/outdoor-wifi-pegasus-park/</guid>
      <description>&lt;p&gt;Point to Point transmitters (&lt;a href=&#34;http://www.ubnt.com/airmax/nanostationm/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Loco M2&lt;/a&gt;)&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/01/IMG_20150116_114629.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6621&#34; src=&#34;https://static.yeri.be/2015/01/IMG_20150116_114629-1024x758.jpg&#34; alt=&#34;Point to Point WiFi&#34; width=&#34;780&#34; height=&#34;577&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Point to Point receiver (Loco M2)&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/01/2015-01-15.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6623&#34; src=&#34;https://static.yeri.be/2015/01/2015-01-15-758x1024.jpg&#34; alt=&#34;Point to Point receiver&#34; width=&#34;758&#34; height=&#34;1024&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Boxes with power, PoE and switches&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/01/2015-01-16.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6624&#34; src=&#34;https://static.yeri.be/2015/01/2015-01-16-1024x758.jpg&#34; alt=&#34;Tidy boxes&#34; width=&#34;780&#34; height=&#34;577&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Outdoor Access Point (&lt;a href=&#34;http://www.ubnt.com/unifi/unifi-ap-outdoor/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;UAP Outdoor+&lt;/a&gt;)&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/01/2015-01-19.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6625&#34; src=&#34;https://static.yeri.be/2015/01/2015-01-19-758x1024.jpg&#34; alt=&#34;Outdoor access point&#34; width=&#34;758&#34; height=&#34;1024&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://static.yeri.be/2015/01/IMG_20150128_085038.jpg&#34;&gt;&lt;img class=&#34;alignnone size-large wp-image-6809&#34; src=&#34;https://static.yeri.be/2015/01/IMG_20150128_085038-758x1024.jpg&#34; alt=&#34;IMG_20150128_085038&#34; width=&#34;758&#34; height=&#34;1024&#34; /&gt;&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>Point to Point transmitters (<a href="http://www.ubnt.com/airmax/nanostationm/" target="_blank" rel="noopener noreferrer">Loco M2</a>)</p>
<p><a href="https://static.yeri.be/2015/01/IMG_20150116_114629.jpg"><img class="alignnone size-large wp-image-6621" src="https://static.yeri.be/2015/01/IMG_20150116_114629-1024x758.jpg" alt="Point to Point WiFi" width="780" height="577" /></a></p>
<p>Point to Point receiver (Loco M2)</p>
<p><a href="https://static.yeri.be/2015/01/2015-01-15.jpg"><img class="alignnone size-large wp-image-6623" src="https://static.yeri.be/2015/01/2015-01-15-758x1024.jpg" alt="Point to Point receiver" width="758" height="1024" /></a></p>
<p>Boxes with power, PoE and switches</p>
<p><a href="https://static.yeri.be/2015/01/2015-01-16.jpg"><img class="alignnone size-large wp-image-6624" src="https://static.yeri.be/2015/01/2015-01-16-1024x758.jpg" alt="Tidy boxes" width="780" height="577" /></a></p>
<p>Outdoor Access Point (<a href="http://www.ubnt.com/unifi/unifi-ap-outdoor/" target="_blank" rel="noopener noreferrer">UAP Outdoor+</a>)</p>
<p><a href="https://static.yeri.be/2015/01/2015-01-19.jpg"><img class="alignnone size-large wp-image-6625" src="https://static.yeri.be/2015/01/2015-01-19-758x1024.jpg" alt="Outdoor access point" width="758" height="1024" /></a></p>
<p><a href="https://static.yeri.be/2015/01/IMG_20150128_085038.jpg"><img class="alignnone size-large wp-image-6809" src="https://static.yeri.be/2015/01/IMG_20150128_085038-758x1024.jpg" alt="IMG_20150128_085038" width="758" height="1024" /></a></p>
]]></content:encoded>
      <category>hardware</category><category>networking</category>
      <category>flatturtle</category><category>ubiquiti</category><category>wifi</category>
    </item>
    
  </channel>
</rss>
