<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.thomas-krenn.com/en/wikiEN/index.php?title=Special:NewPages&amp;feed=atom&amp;xortex=yes</id>
	<title>Thomas-Krenn-Wiki - New pages [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.thomas-krenn.com/en/wikiEN/index.php?title=Special:NewPages&amp;feed=atom&amp;xortex=yes"/>
	<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Special:NewPages"/>
	<updated>2026-05-22T19:16:19Z</updated>
	<subtitle>From Thomas-Krenn-Wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/PCIe_link_lost</id>
		<title>PCIe link lost</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/PCIe_link_lost"/>
		<updated>2026-05-21T11:16:45Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;On Linux systems, when using Intel I350 network chips, messages such as &amp;#039;&amp;#039;&amp;#039;PCIe link lost&amp;#039;&amp;#039;&amp;#039; may appear, followed by &amp;#039;&amp;#039;&amp;#039;igb 0000:82:00.0 enp130s0f0: malformed Tx packet detected and dropped, LVMMC:0xffffffff&amp;#039;&amp;#039;&amp;#039;. Therefore, the affected network interface does not work. As a solution, the Linux kernel parameter &amp;#039;&amp;#039;&amp;#039;pcie_aspm.policy=performance&amp;#039;&amp;#039;&amp;#039; or an updated BIOS with deactivated ASPM can be used.   == Affected hardware and software == We have encountered this issue i...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;On [[Linux]] systems, when using Intel I350 network chips, messages such as &amp;#039;&amp;#039;&amp;#039;PCIe link lost&amp;#039;&amp;#039;&amp;#039; may appear, followed by &amp;#039;&amp;#039;&amp;#039;igb 0000:82:00.0 enp130s0f0: malformed Tx packet detected and dropped, LVMMC:0xffffffff&amp;#039;&amp;#039;&amp;#039;. Therefore, the affected network interface does not work. As a solution, the Linux kernel parameter &amp;#039;&amp;#039;&amp;#039;pcie_aspm.policy=performance&amp;#039;&amp;#039;&amp;#039; or an updated BIOS with deactivated ASPM can be used. &lt;br /&gt;
&lt;br /&gt;
== Affected hardware and software ==&lt;br /&gt;
We have encountered this issue in isolated cases after several weeks of testing with the following components:&lt;br /&gt;
* ASUS RS500A-E11-RS12U with [[AMD EPYC 7003 Milan]] CPU (AMD EPYC 7543P) with Intel I350-AM2&lt;br /&gt;
** BIOS 0901&lt;br /&gt;
* [[Proxmox VE]] with kernel 5.15.35-1-pve&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Example 21.6.2022:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.890225] igb 0000:82:00.0 enp130s0f0: PCIe link lost&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.890714] ------------[ cut here ]------------&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.891150] igb: Failed to read reg 0x40e8!&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.891611] WARNING: CPU: 15 PID: 1607760 at drivers/net/ethernet/intel/igb/igb_main.c:747 igb_rd32.cold+0x3a/0x46 [igb]&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.892059] Modules linked in: sch_ingress ebtable_filter ebtables ip_set ip6table_raw iptable_raw ip6table_filter ip6_tables iptable_filter bpfilter sctp ip6_udp_tunnel &lt;br /&gt;
udp_tunnel nf_tables bonding tls openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 softdog nfnetlink_log nfnetlink ipmi_ssif intel_rapl_msr intel_rapl_common amd64_edac edac_&lt;br /&gt;
mce_amd kvm_amd ast drm_vram_helper drm_ttm_helper kvm ttm drm_kms_helper cec irqbypass crct10dif_pclmul rc_core ghash_clmulni_intel aesni_intel fb_sys_fops crypto_simd cryptd rapl wmi_bmof efi_pstore pc&lt;br /&gt;
spkr acpi_ipmi syscopyarea cdc_ether sysfillrect usbnet sysimgblt joydev input_leds mii ipmi_si ccp ptdma k10temp ipmi_devintf ipmi_msghandler mac_hid vhost_net vhost vhost_iotlb tap ib_iser rdma_cm iw_c&lt;br /&gt;
&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.892098]  zstd_compress hid_generic usbmouse usbkbd usbhid hid raid6_pq libcrc32c simplefb crc32_pclmul nvme nvme_core igb xhci_pci i2c_algo_bit ahci xhci_pci_renesas &lt;br /&gt;
dca libahci xhci_hcd i2c_piix4 bnxt_en wmi&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.896894] CPU: 15 PID: 1607760 Comm: nload Tainted: P           O      5.15.35-1-pve #1&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.897392] Hardware name: ASUSTeK COMPUTER INC. RS500A-E11-RS12U/KMPA-U16 Series, BIOS 0901 12/03/2021&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.897890] RIP: 0010:igb_rd32.cold+0x3a/0x46 [igb]&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.898391] Code: c7 c6 94 23 3e c0 e8 ea e4 33 ed 48 8b bb 30 ff ff ff e8 5a 2c cc ec 84 c0 74 16 44 89 ee 48 c7 c7 60 30 3e c0 e8 b9 f2 2a ed &amp;lt;0f&amp;gt; 0b e9 b8 03 fe ff e9 &lt;br /&gt;
cf 03 fe ff 0f b6 d0 be 00 00 04 00 48 c7&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.899403] RSP: 0018:ffffbc9e812d3a98 EFLAGS: 00010282&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.899906] RAX: 0000000000000000 RBX: ffff947b663fced0 RCX: ffff949a0e1e0588&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.900414] RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff949a0e1e0580&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.900915] RBP: ffffbc9e812d3ab0 R08: 0000000000000003 R09: 0000000000000001&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.901411] R10: ffff947b7610c7c0 R11: ffffffffc0d410c0 R12: 00000000ffffffff&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.901902] R13: 00000000000040e8 R14: 00000000000198e8 R15: 0000000003f1d080&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.902389] FS:  00007f4cb056d740(0000) GS:ffff949a0e1c0000(0000) knlGS:0000000000000000&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.902879] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.903364] CR2: 00007f4f7bbf2670 CR3: 00000006414e8004 CR4: 0000000000770ee0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.903850] PKRU: 55555554&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.904336] Call Trace:&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.904808]  &amp;lt;TASK&amp;gt;&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.905275]  igb_update_stats+0x4c0/0x880 [igb]&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.905743]  igb_get_stats64+0x30/0x80 [igb]&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.906205]  dev_get_stats+0x60/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.906663]  netstat_show.constprop.0+0x57/0xb0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.907117]  tx_dropped_show+0x16/0x20&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.907564]  dev_attr_show+0x1d/0x40&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.908014]  sysfs_kf_seq_show+0xa1/0x100&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.908451]  kernfs_seq_show+0x27/0x30&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.908882]  seq_read_iter+0x122/0x4b0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.909309]  ? aa_file_perm+0x11e/0x570&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.909732]  kernfs_fop_read_iter+0x150/0x1b0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.910150]  new_sync_read+0x110/0x1a0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.910564]  vfs_read+0x100/0x1a0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.910970]  ksys_read+0x67/0xe0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.911368]  __x64_sys_read+0x1a/0x20&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.911766]  do_syscall_64+0x5c/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.912170]  ? do_syscall_64+0x69/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.912560]  ? do_syscall_64+0x69/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.912944]  ? syscall_exit_to_user_mode+0x27/0x50&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.913330]  ? __x64_sys_read+0x1a/0x20&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.913706]  ? do_syscall_64+0x69/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.914073]  ? syscall_exit_to_user_mode+0x27/0x50&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.914431]  ? do_syscall_64+0x69/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.914777]  ? __x64_sys_close+0x12/0x40&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.915112]  ? do_syscall_64+0x69/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.915436]  ? do_syscall_64+0x69/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.915745]  ? do_syscall_64+0x69/0xc0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.916052]  ? asm_sysvec_apic_timer_interrupt+0xa/0x20&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.916342]  entry_SYSCALL_64_after_hwframe+0x44/0xae&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.916623] RIP: 0033:0x7f4cb0666e8e&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.916890] Code: c0 e9 b6 fe ff ff 50 48 8d 3d 6e 18 0a 00 e8 89 e8 01 00 66 0f 1f 84 00 00 00 00 00 64 8b 04 25 18 00 00 00 85 c0 75 14 0f 05 &amp;lt;48&amp;gt; 3d 00 f0 ff ff 77 5a &lt;br /&gt;
c3 66 0f 1f 84 00 00 00 00 00 48 83 ec 28&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.917444] RSP: 002b:00007ffe81260f78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.917719] RAX: ffffffffffffffda RBX: 0000000000001fff RCX: 00007f4cb0666e8e&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.917988] RDX: 0000000000001fff RSI: 000055e09cb3adf0 RDI: 0000000000000003&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.918250] RBP: 000055e09cb3adf0 R08: 0000000000000000 R09: 00007f4cb0736be0&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.918508] R10: 0000000001000000 R11: 0000000000000246 R12: 0000000000001fff&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.918764] R13: 00007ffe81261118 R14: 000055e09bc21398 R15: 000055e09bc21370&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.919020]  &amp;lt;/TASK&amp;gt;&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.919272] ---[ end trace e754faf722c4d59f ]---&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.919529] igb 0000:82:00.0 enp130s0f0: malformed Tx packet detected and dropped, LVMMC:0xffffffff&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.919586] igb 0000:82:00.1 enp130s0f1: PCIe link lost&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.920381] ------------[ cut here ]------------&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.920832] igb: Failed to read reg 0xc030!&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.921292] WARNING: CPU: 47 PID: 1607760 at drivers/net/ethernet/intel/igb/igb_main.c:747 igb_rd32.cold+0x3a/0x46 [igb]&lt;br /&gt;
Jun 21 00:53:43 PMX2 kernel: [568234.921782] Modules linked in: sch_ingress ebtable_filter ebtables ip_set ip6table_raw iptable_raw ip6table_filter ip6_tables iptable_filter bpfilter sctp ip6_udp_tunnel &lt;br /&gt;
udp_tunnel nf_tables bonding tls openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 softdog nfnetlink_log nfnetlink ipmi_ssif intel_rapl_msr intel_rapl_common amd64_edac edac_&lt;br /&gt;
mce_amd kvm_amd ast drm_vram_helper drm_ttm_helper kvm ttm drm_kms_helper cec irqbypass crct10dif_pclmul rc_core ghash_clmulni_intel aesni_intel fb_sys_fops crypto_simd cryptd rapl wmi_bmof efi_pstore pc&lt;br /&gt;
spkr acpi_ipmi syscopyarea cdc_ether sysfillrect usbnet sysimgblt joydev input_leds mii ipmi_si ccp ptdma k10temp ipmi_devintf ipmi_msghandler mac_hid vhost_net vhost vhost_iotlb tap ib_iser rdma_cm iw_c&lt;br /&gt;
m ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi drm sunrpc ip_tables x_tables autofs4 zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) btrfs blak&lt;br /&gt;
e2b_generic xor&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Beispiel 26.6.2022:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[...]&lt;br /&gt;
Jun 26 18:46:36 PMX2 kernel: [1064607.600707] igb 0000:82:00.0 enp130s0f0: malformed Tx packet detected and dropped, LVMMC:0xffffffff&lt;br /&gt;
Jun 26 18:46:37 PMX2 kernel: [1064608.624690] igb 0000:82:00.1 enp130s0f1: malformed Tx packet detected and dropped, LVMMC:0xffffffff&lt;br /&gt;
[...]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Possible solutions ==&lt;br /&gt;
&lt;br /&gt;
=== Updated BIOS ===&lt;br /&gt;
The new BIOS version 1301 (Milan, 2023/03/15) deactivates ASPM on all PCIe ports (&amp;lt;cite&amp;gt;Disable ASPM on all PCIe ports.&amp;lt;/cite&amp;gt;) and resolves the problem.&lt;br /&gt;
&lt;br /&gt;
=== Kernel parameter === &lt;br /&gt;
Alternatively, as a workaround, the PCIe ASPM policy can be set to performance using the following kernel boot parameter:&amp;lt;pre&amp;gt;sed -i &amp;#039;$ s/$/ pcie_aspm.policy=performance/&amp;#039; /etc/kernel/cmdline&amp;lt;/pre&amp;gt;&lt;br /&gt;
On systemd-boot-systems, this command adds the parameter to the /etc/kernel/cmdline file. On Proxmox systems, a refresh of the Proxmox boot tool must be performed after changing the file:&lt;br /&gt;
&amp;lt;pre&amp;gt;proxmox-boot-tool refresh&amp;lt;/pre&amp;gt;After a reboot, it can be verified if the parameters are active using &amp;lt;pre&amp;gt;cat /proc/cmdline&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://access.redhat.com/solutions/2190691 igb &amp;quot;malformed Tx packet detected and dropped, LVMMC&amp;quot; message] (access.redhat.com, 05.03.2016)&lt;br /&gt;
* [https://access.redhat.com/solutions/6753701 Intel I350 NIC with igb logs &amp;quot;Refused to change power state&amp;quot; and &amp;quot;PCIe link lost&amp;quot;] (access.redhat.com, Updated February 23 2022)&lt;br /&gt;
* [https://patchwork.ozlabs.org/project/netdev/patch/1406207604-31653-6-git-send-email-jeffrey.t.kirsher@intel.com/ igb: Add message when malformed packets detected by hw] (patchwork.ozlabs.org, 24.07.2014)&lt;br /&gt;
* [https://community.zyxel.com/en/discussion/2574/degraded-gigabit-problem-with-gs1200-8 Degraded Gigabit problem with GS1200-8] (community.zyxel.com, April 2019)&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Wfischer}}&lt;br /&gt;
{{Jsterr}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Linux]]&lt;br /&gt;
[[Category:Proxmox Troubleshooting]]&lt;br /&gt;
[[de:PCIe link lost]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/MegaRAID_9341-4i_Debian_11_DMAR_DRHD_handling_fault_status_reg_3</id>
		<title>MegaRAID 9341-4i Debian 11 DMAR DRHD handling fault status reg 3</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/MegaRAID_9341-4i_Debian_11_DMAR_DRHD_handling_fault_status_reg_3"/>
		<updated>2026-05-21T07:09:47Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;After installing Debian 11 on a system with MegaRAID 9341-4i RAID controller, messages such as &amp;#039;&amp;#039;&amp;#039;AVAGO EFI SAS Driver is Unhealthy&amp;#039;&amp;#039;&amp;#039; may appear during the boot process and &amp;#039;&amp;#039;&amp;#039;DMAR: DRHD: handling fault status reg 3&amp;#039;&amp;#039;&amp;#039; in the system log. In this article, we explain how to solve this problem by using the kernel parameter &amp;#039;&amp;#039;&amp;#039;intel_iommu=on iommu=pt&amp;#039;&amp;#039;&amp;#039;.  == Description of problem ==  After installing Debian 11, the following problems appear on a system with MegaRAI...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;After installing [[Debian]] 11 on a system with [[MegaRAID 9341-4i RAID controller]], messages such as &amp;#039;&amp;#039;&amp;#039;AVAGO EFI SAS Driver is Unhealthy&amp;#039;&amp;#039;&amp;#039; may appear during the boot process and &amp;#039;&amp;#039;&amp;#039;DMAR: DRHD: handling fault status reg 3&amp;#039;&amp;#039;&amp;#039; in the system log. In this article, we explain how to solve this problem by using the kernel parameter &amp;#039;&amp;#039;&amp;#039;intel_iommu=on iommu=pt&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
== Description of problem == &lt;br /&gt;
After installing Debian 11, the following problems appear on a system with MegaRAID 9341-4i RAID controller:&lt;br /&gt;
* Message during boot process:&lt;br /&gt;
*: [[Avago EFI SAS Driver is Unhealthy]]&lt;br /&gt;
* Message in the BIOS:&lt;br /&gt;
*: &amp;#039;&amp;#039;&amp;#039;L2/L3 Cache error was detected on the RAID controller. Please contact technical support to resolve this issue. Press &amp;#039;X&amp;#039; to continue or else power off the system, replace the controller and reboot.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* Error message in Syslog:&lt;br /&gt;
*: &amp;#039;&amp;#039;&amp;#039;DMAR: DRHD: handling fault status reg 3&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Error message in Syslog explained in detail:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[ 44.978734] megasas: 07.714.04.00-rc1&lt;br /&gt;
[ 44.979059] megaraid_sas 0000:02:00.0: BAR:0x1 BAR&amp;#039;s base_addr(phys):0x0000000091300000 mapped virt_addr:0x00000000e2c49ffb&lt;br /&gt;
[ 44.979061] megaraid_sas 0000:02:00.0: FW now in Ready state&lt;br /&gt;
[ 44.979061] megaraid_sas 0000:02:00.0: 63 bit DMA mask and 32 bit consistent mask&lt;br /&gt;
[ 44.979181] megaraid_sas 0000:02:00.0: firmware supports msix : (96)&lt;br /&gt;
[ 44.979388] megaraid_sas 0000:02:00.0: requested/available msix 13/13&lt;br /&gt;
[ 44.979389] megaraid_sas 0000:02:00.0: current msix/online cpus : (13/12)&lt;br /&gt;
[ 44.979390] megaraid_sas 0000:02:00.0: RDPQ mode : (disabled)&lt;br /&gt;
[ 44.979391] megaraid_sas 0000:02:00.0: Current firmware supports maximum commands: 272 LDIO threshold: 237&lt;br /&gt;
[ 44.979425] megaraid_sas 0000:02:00.0: Configured max firmware commands: 271&lt;br /&gt;
[ 44.979686] megaraid_sas 0000:02:00.0: Performance mode :Latency&lt;br /&gt;
[ 44.979687] megaraid_sas 0000:02:00.0: FW supports sync cache : Yes&lt;br /&gt;
[ 44.979688] megaraid_sas 0000:02:00.0: megasas_disable_intr_fusion is called outbound_intr_mask:0x40000009&lt;br /&gt;
[ 45.235288] DMAR: DRHD: handling fault status reg 3&lt;br /&gt;
[ 45.235366] DMAR: [DMA Write] Request device [02:00.0] PASID ffffffff fault addr 3ffb0000 [fault reason 05] PTE Write access is not set&lt;br /&gt;
[ 45.236414] DMAR: DRHD: handling fault status reg 3&lt;br /&gt;
[ 45.236492] DMAR: [DMA Read] Request device [02:00.0] PASID ffffffff fault addr 3ffb0000 [fault reason 06] PTE Read access is not set&lt;br /&gt;
[ 46.289908] DMAR: DRHD: handling fault status reg 3&lt;br /&gt;
[ 46.289986] DMAR: [DMA Read] Request device [02:00.0] PASID ffffffff fault addr 3ffb0000 [fault reason 06] PTE Read access is not set&lt;br /&gt;
[ 47.353019] DMAR: DRHD: handling fault status reg 3&lt;br /&gt;
[ 50.542825] dmar_fault: 8 callbacks suppressed ...&lt;br /&gt;
[ 291.968323] dmar_fault: 5 callbacks suppressed&lt;br /&gt;
[ 291.968327] DMAR: DRHD: handling fault status reg 3&lt;br /&gt;
[ 291.973328] DMAR: [DMA Read] Request device [02:00.0] PASID ffffffff fault addr 3ffb0000 [fault reason 06] PTE Read access is not set&lt;br /&gt;
[ 293.031635] DMAR: DRHD: handling fault status reg 3&lt;br /&gt;
[ 293.034716] DMAR: [DMA Read] Request device [02:00.0] PASID ffffffff fault addr 3ffb0000 [fault reason 06] PTE Read access is not set&lt;br /&gt;
[ 294.094631] DMAR: DRHD: handling fault status reg 3&lt;br /&gt;
[ 294.098574] DMAR: [DMA Read] Request device [02:00.0] PASID ffffffff fault addr 3ffb0000 [fault reason 06] PTE Read access is not set&lt;br /&gt;
[ 295.157716] DMAR: DRHD: handling fault status reg 3&lt;br /&gt;
[ 296.988718] megaraid_sas 0000:02:00.0: Init cmd return status FAILED for SCSI host 9&lt;br /&gt;
[ 296.994525] megaraid_sas 0000:02:00.0: Failed from megasas_init_fw 6460&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Affected systems ==&lt;br /&gt;
The problem appeared with the following hardware/software.&lt;br /&gt;
&lt;br /&gt;
Hardware:&lt;br /&gt;
* Supermicro mainboard X11SCH-LN4F&lt;br /&gt;
* MegaRAID 9341-4i RAID controller&lt;br /&gt;
&lt;br /&gt;
Software:&lt;br /&gt;
* Debian 11 with Linux kernel 5.10.0-11, megaraid_sas module version (via Debian) 07.714.04.00-r, even the latest Broadcom module (07.719.04.00) does not resolve the problem.&lt;br /&gt;
&lt;br /&gt;
When using Debian 10 with Linux kernel 4.19.0-18, megaraid_sas module version 07.706.03.00-rc1, the poblem does not appear. &lt;br /&gt;
&lt;br /&gt;
== Cause ==&lt;br /&gt;
The error message &amp;#039;&amp;#039;DMAR: DRHD: handling fault status reg 3&amp;#039;&amp;#039; indicates a problem in combination with the IOMMU. The terms have the following meanings:&amp;lt;ref&amp;gt;[https://www.intel.com/content/dam/develop/external/us/en/documents/intel-whitepaper-using-iommu-for-dma-protection-in-uefi-820238.pdf A Tour Beyond BIOS: Using IOMMU for DMA Protection in UEFI Firmware] (www.intel.com)&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;[https://www.kernel.org/doc/Documentation/Intel-IOMMU.txt Linux IOMMU Support] (www.kernel.org/doc)&amp;lt;/ref&amp;gt;&lt;br /&gt;
* DMAR = DMA Remapping Reporting&lt;br /&gt;
* DRHD = DMA Remapping Hardware Unit Definition&lt;br /&gt;
&lt;br /&gt;
== Solution == &lt;br /&gt;
To solve the issue, the Intel IOMMU functions must be activated in the Linux kernel and the IOMMU must be set to pass-through mode.&lt;br /&gt;
&lt;br /&gt;
For this, the following parameter (via /etc/default/grub) must be set:&lt;br /&gt;
* intel_iommu=on iommu=pt&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://bbs.archlinux.org/viewtopic.php?pid=1738979#p1738979 (SOLVED) &amp;quot;kernel: DMAR: DRHD: handling fault status reg 3&amp;quot;] (bbs.archlinux.org, 29.09.2017)&lt;br /&gt;
* [https://forum.proxmox.com/threads/raid-controller-9341-8i.88667/ raid controller 9341-8i] (forum.proxmox.com, 04.05.2021)&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Wfischer}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Debian]][[Category:LSI]]&lt;br /&gt;
[[de:MegaRAID 9341-4i Debian 11 DMAR DRHD handling fault status reg 3]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Debian_11_installation_with_DMAR_DRHD_handling_fault_status_reg_3_error_message</id>
		<title>Debian 11 installation with DMAR DRHD handling fault status reg 3 error message</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Debian_11_installation_with_DMAR_DRHD_handling_fault_status_reg_3_error_message"/>
		<updated>2026-05-21T05:56:09Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;When installing Debian 11 on systems with a MegaRAID 9341-4i RAID controller, it may come to error messages such as &amp;#039;&amp;#039;&amp;#039;AVAGO EFI SAS Driver is Unhealthy&amp;#039;&amp;#039;&amp;#039; during the starting process and &amp;#039;&amp;#039;&amp;#039;DMAR: DRHD: handling fault status reg 3 &amp;#039;&amp;#039; when starting the operating system. In this article, we show how to install Debian 11 by using the kernel parameters &amp;#039;&amp;#039;&amp;#039;intel_iommu=on&amp;#039;&amp;#039;&amp;#039; and  &amp;#039;&amp;#039;&amp;#039;iommu=pt&amp;#039;&amp;#039;&amp;#039;.   == Error message in the BIOS, during boot process and installation == In this ca...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When installing Debian 11 on systems with a MegaRAID 9341-4i RAID controller, it may come to error messages such as &amp;#039;&amp;#039;&amp;#039;AVAGO EFI SAS Driver is Unhealthy&amp;#039;&amp;#039;&amp;#039; during the starting process and &amp;#039;&amp;#039;&amp;#039;DMAR: DRHD: handling fault status reg 3 &amp;#039;&amp;#039; when starting the operating system. In this article, we show how to install Debian 11 by using the kernel parameters &amp;#039;&amp;#039;&amp;#039;intel_iommu=on&amp;#039;&amp;#039;&amp;#039; and  &amp;#039;&amp;#039;&amp;#039;iommu=pt&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
== Error message in the BIOS, during boot process and installation ==&lt;br /&gt;
In this case, the installation was performed on a Supermicro mainboard X11SCH-LN4F and on a MegaRAID 9341-4i RAID controller, as both of these components lead to this error message in combination.&lt;br /&gt;
This case is described in detail in the following article: [[MegaRAID 9341-4i Debian 11 DMAR DRHD handling fault status reg 3]]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Three types of errors that occur&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:BootPostUnhealty.png|Error message of the controller in the postscreen - &amp;#039;&amp;#039;&amp;#039;AVAGO EFI SAS Driver is unhealthy&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
file:Fehler1.png|Error message encountered when booting from the boot medium &amp;#039;&amp;#039;&amp;#039;DMAR: DRHD: handling fault status reg 3&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
file:Fehler2.png|Error in the Debian installer during hard drive selection: the RAID is not displayed&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To solve the problem, the Intel IOMMU functions must be set to pass-through in the Linux kernel.&lt;br /&gt;
&lt;br /&gt;
The following kernel parameters must be set for this:intel_iommu=on iommu=pt&lt;br /&gt;
&lt;br /&gt;
These parameters must be set three times&lt;br /&gt;
# in the Debian installer&lt;br /&gt;
# after booting in the GRUB&lt;br /&gt;
# in the OS under /etc/default/grub&lt;br /&gt;
&lt;br /&gt;
=== 1) Changes made during installation using the Debian installer === &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;For a UEFi installation&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:Install1.png| With &amp;quot;E&amp;quot; for Edit Selection, the boot entry can be changed&lt;br /&gt;
file:Install2.png| Here, the third line must be edited  &amp;#039;&amp;#039;&amp;#039;&amp;quot;linux /install.amd/vmlinuz vga=788 --- quiet&amp;quot;&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
file:Install3.png| &amp;#039;&amp;#039;&amp;#039;&amp;quot;--- quiet&amp;quot;&amp;#039;&amp;#039;&amp;#039;  must be replaced by &amp;#039;&amp;#039;&amp;#039;&amp;quot;intel_iommu=on iommu=pt&amp;quot;&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;For a LEGACY installation&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:Legacy1.png| In legacy mode,  the boot entry can be edited via &amp;#039;&amp;#039;&amp;#039;tab-key&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
file:Legacy2-tabdruecken.png|edit &amp;#039;&amp;#039;&amp;#039;&amp;quot;linux /install.amd/vmlinuz vga=788 --- quiet&amp;quot;&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
file:Legacy3-dannenter.png| &amp;#039;&amp;#039;&amp;#039;&amp;quot;--- quiet&amp;quot;&amp;#039;&amp;#039;&amp;#039;  must be replaced by &amp;#039;&amp;#039;&amp;#039;&amp;quot;intel_iommu=on iommu=pt&amp;quot;&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The Raid is now displayed&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:Install4.png| The Raid is now displayed and can be selected for the installation &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== 2) Changes after installation in the GRUB ===&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:Nachinstall1.png| After installation, edit the boot entry via &amp;quot;E&amp;quot; &lt;br /&gt;
file:Nachinstall2.png| The third-to-last line  &amp;#039;&amp;#039;&amp;#039;linux /boot/vmlinuz-5-10.0-17...... ro quiet&amp;#039;&amp;#039;&amp;#039;  must be edited. &lt;br /&gt;
file:Nachinstall3.png|&amp;#039;&amp;#039;&amp;#039;&amp;quot;quiet&amp;quot;&amp;#039;&amp;#039;&amp;#039;  must be replaced by &amp;#039;&amp;#039;&amp;#039;&amp;quot;intel_iommu=on iommu=pt&amp;quot;&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== 3) Changes in OS ===&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:Grub0.png| Navigate to the &amp;#039;&amp;#039;&amp;#039;/etc/default&amp;#039;&amp;#039;&amp;#039; directory&lt;br /&gt;
file:Grub1.png| Edit &amp;#039;&amp;#039;&amp;#039;grub&amp;#039;&amp;#039;&amp;#039; with, for example, nano &lt;br /&gt;
file:Grub2.png|&amp;#039;&amp;#039;&amp;#039;GRUB_CMBLINE_LINUX_DEFAULT=&amp;quot;intel_iommu=on iommu=pt&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
file:Grubupdate2.png|Update GRUB using&amp;#039;&amp;#039;&amp;#039;&amp;quot;su -&amp;quot;&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;&amp;quot;update-grub&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After the parameters have been set and the update-grub command has been performed, they will now be executed every time the system starts up, ensuring that the RAID controller and the RAID array are detected correctly.&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://bbs.archlinux.org/viewtopic.php?pid=1738979#p1738979 (SOLVED) &amp;quot;kernel: DMAR: DRHD: handling fault status reg 3&amp;quot;] (bbs.archlinux.org, 29.09.2017)&lt;br /&gt;
* [https://forum.proxmox.com/threads/raid-controller-9341-8i.88667/ raid controller 9341-8i] (forum.proxmox.com, 04.05.2021)&lt;br /&gt;
* [https://www.linux-kvm.org/page/How_to_assign_devices_with_VT-d_in_KVM How to assign devices with VT-d in KVM] (www.linux-kvm.org 25.6.2016)&lt;br /&gt;
* [https://gist.github.com/davesilva/445276f9157e7cb3a4f6ed2fe852b340 Setting up KVM with GPU passthrough in Debian Buster ] (gist.github.com 13.08.2020)&lt;br /&gt;
&lt;br /&gt;
== References == &lt;br /&gt;
# [https://www.intel.com/content/dam/develop/external/us/en/documents/intel-whitepaper-using-iommu-for-dma-protection-in-uefi-820238.pdf  A Tour Beyond BIOS: Using IOMMU for DMA Protection in UEFI Firmware ] (www.intel.com)&lt;br /&gt;
# [https://www.kernel.org/doc/Documentation/Intel-IOMMU.txt  Linux IOMMU Support ] (www.kernel.org/doc)&lt;br /&gt;
&lt;br /&gt;
{{Ldirr}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
&lt;br /&gt;
{{Consultinglink|campaign=Thomas-Krenn Windows Admin Center (WAC) Extension}}&lt;br /&gt;
[[Category:Debian]][[Category:LSI]]&lt;br /&gt;
[[de:Debian 11 Installation bei Fehlermeldung DMAR DRHD handling fault status reg 3]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Security_advisories_on_Intel_products_2026.2_IPU</id>
		<title>Security advisories on Intel products 2026.2 IPU</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Security_advisories_on_Intel_products_2026.2_IPU"/>
		<updated>2026-05-20T07:39:55Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In &amp;#039;&amp;#039;&amp;#039;2026&amp;#039;&amp;#039;&amp;#039;, Intel published new security advisories as part of the IPU 2026.2 on different Intel products. Some of these security advisories require &amp;#039;&amp;#039;&amp;#039;firmware updates&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
In this article, you will find an excerpt and hints on these security advisories as well as information on where to find updates for Thomas-Krenn products.&lt;br /&gt;
&lt;br /&gt;
== Affected systems == &lt;br /&gt;
&lt;br /&gt;
* Intel Xeon processors&lt;br /&gt;
* Intel Core processors&lt;br /&gt;
* Intel Atom processors&lt;br /&gt;
* Intel Pentium processors&lt;br /&gt;
* Intel Celeron processors&lt;br /&gt;
&lt;br /&gt;
== Security advisories ==&lt;br /&gt;
In the following, you will find security advisories on the firmware that has been published by Intel.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background-color: #EFEFEF; font-weight: bold;&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |Intel security advisory&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |Title&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |Affected systems&lt;br /&gt;
|-&lt;br /&gt;
|align=center | [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01393.html INTEL-SA-01393]&lt;br /&gt;
|align=center | 2026.1 IPU, UEFI Reference Firmware Advisory&lt;br /&gt;
| rowspan=&amp;quot;35&amp;quot; align=&amp;quot;left&amp;quot; | (see Intel-SA)&lt;br /&gt;
|-&lt;br /&gt;
|align=center | [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01420.html INTEL-SA-01420]&lt;br /&gt;
|align=center | 2026.2 IPU - Intel® Processor Firmware Advisory&lt;br /&gt;
|-&lt;br /&gt;
|align=center | [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01413.html INTEL-SA-01413]&lt;br /&gt;
|align=center | UEFI Reference Firmware Advisory&lt;br /&gt;
|-&lt;br /&gt;
|align=center | [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01425.html INTEL-SA-01425]&lt;br /&gt;
|align=center | Intel® Slim Bootloader Advisory&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Updates for Thomas-Krenn products == &lt;br /&gt;
Updates on the corresponding system can be found in the &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;440&amp;quot;&amp;gt;download area of Thomas-Krenn&amp;lt;/tklink&amp;gt;. The updates in the download area have been tested by us to guarantee the stability and compatibility of our systems.&lt;br /&gt;
&lt;br /&gt;
If you require the latest version for your system and it is not yet available in our download area, you can get it at [https://www.asus.com/de/support/download-center/ Asus] , [https://www.supermicro.com/en/support/resources/downloadcenter/swdownload Supermicro] or [https://www.gigabyte.com/de/Support/Consumer/Download Gigabyte]&lt;br /&gt;
&lt;br /&gt;
== More information == &lt;br /&gt;
* [https://www.intel.com/content/www/us/en/security-center/default.html Security Center] (www.intel.com)&lt;br /&gt;
* [https://www.supermicro.com/en/support/security_Intel_IPU2026.2 Intel Platform Update (IPU) Update 2026.2 May 2026] (www.supermicro.com)&lt;br /&gt;
* [https://www.supermicro.com/en/support/security_Intel_IPU2026.1_part2 Intel Platform Update (IPU) Update 2026.1 Part 2, May 2026] (www.supermicro.com)&lt;br /&gt;
{{Thomas-Krenn.AG}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Intel]]&lt;br /&gt;
[[de:Sicherheitshinweise zu Intel Produkten 2026.2 IPU]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/AMD_Security_Vulnerabilities_-_May_2026</id>
		<title>AMD Security Vulnerabilities - May 2026</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/AMD_Security_Vulnerabilities_-_May_2026"/>
		<updated>2026-05-20T05:53:03Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;On &amp;#039;&amp;#039;&amp;#039;May 12th, 2026&amp;#039;&amp;#039;&amp;#039;, AMD published the security bulletins &amp;#039;&amp;#039;&amp;#039;AMD-SB-3030&amp;#039;&amp;#039;&amp;#039; &amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3030.html AMD EPYC and AMD EPYC Embedded Series Processor Vulnerabilities – May 2026] (www.amd.com/en/resources/product-security)&amp;lt;/ref&amp;gt;, &amp;#039;&amp;#039;&amp;#039;AMD-SB-4017&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4017.html AMD Athlon, AMD Ryzen, and AMD Ryzen Embedded Series Processor Vulnerabilities – Ma...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;On &amp;#039;&amp;#039;&amp;#039;May 12th, 2026&amp;#039;&amp;#039;&amp;#039;, AMD published the security bulletins &amp;#039;&amp;#039;&amp;#039;AMD-SB-3030&amp;#039;&amp;#039;&amp;#039; &amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3030.html AMD EPYC and AMD EPYC Embedded Series Processor Vulnerabilities – May 2026] (www.amd.com/en/resources/product-security)&amp;lt;/ref&amp;gt;, &amp;#039;&amp;#039;&amp;#039;AMD-SB-4017&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4017.html AMD Athlon, AMD Ryzen, and AMD Ryzen Embedded Series Processor Vulnerabilities – May 2026] (www.amd.com/en/resources/product-security)&amp;lt;/ref&amp;gt; and &amp;#039;&amp;#039;&amp;#039;AMD-SB-7052&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7052.html CPU OP Cache Corruption - May 2026] (www.amd.com/en/resources/product-security)&amp;lt;/ref&amp;gt; with one security vulnerability each. This article includes tables listing measures to address the security vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
== Affected systems ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD Threadripper systems:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* systems with AMD Ryzen Threadripper PRO 3000WX processors&lt;br /&gt;
* systems with AMD Ryzen Threadripper 7000 / PRO 7000WX processors&lt;br /&gt;
* systems with AMD Ryzen Threadripper 9000 / PRO 9000WX processors&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC systems:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* systems with &amp;quot;Zen 4&amp;quot; [[AMD EPYC 4004 Raphael]] processors&lt;br /&gt;
* systems with &amp;quot;Zen 2&amp;quot; [[AMD EPYC 7002 Rome]] processors&lt;br /&gt;
* systems with &amp;quot;Zen 3&amp;quot; [[AMD EPYC 7003 Milan]] processors&lt;br /&gt;
* systems with &amp;quot;Zen 4&amp;quot; [[AMD EPYC 9004 Genoa and Bergamo]] &amp;amp; 8004 Siena processors&lt;br /&gt;
* systems with &amp;quot;Zen 5&amp;quot; [[AMD EPYC 9005 Turin]] processors&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
Here is a table listing the relevant CVEs and corrective measures for the respective EPYC generation, if available. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 4004 Raphael&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2024-36315 CVE-2024-36315]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.7 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ComboAM5PI_1.0.0.a (2024-09-11)&lt;br /&gt;
ComboAM5PI_1.1.0.3c (2024-09-11)&lt;br /&gt;
&lt;br /&gt;
ComboAM5PI_1.2.0.3 (2024-09-11)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 7002 Rome&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;Correction&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54518 CVE-2025-54518]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.3 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |OS update&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 7003 Milan:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
!TCB‑value for SNP-certification &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-61971 CVE-2025-61971]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |MilanPI 1.0.0.J (2025-12-15)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[SNP]&amp;gt;=0x1D&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 8004 Siena:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
!Microcode&lt;br /&gt;
!TCB‑value for SNP-certification&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2024-36315 CVE-2024-36315]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.7 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |GenoaPI 1.0.0.E (2024-12-18) &lt;br /&gt;
| align=&amp;quot;center&amp;quot; |A2: 0AA00216&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-61971 CVE-2025-61971]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Genoa++_1.0.0.H (2025-12-15)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[BL]&amp;gt;=0xC&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-61972 CVE-2025-61972]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |8.5 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Genoa++_1.0.0.H (2025-12-15) &lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[BL]&amp;gt;=0xC&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 9004 Genoa:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
!Microcode&lt;br /&gt;
!TCB‑value for SNP-certification &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2024-36315 CVE-2024-36315]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.7 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |GenoaPI 1.0.0.E (2024-12-18) &lt;br /&gt;
| align=&amp;quot;center&amp;quot; |A2: 0x0AA00219&lt;br /&gt;
B1: 0x0A101154&lt;br /&gt;
&lt;br /&gt;
B2: 0x0A10124F&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-61971 CVE-2025-61971]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Genoa++_1.0.0.H (2025-12-15)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[BL]&amp;gt;=0xC&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-61972 CVE-2025-61972]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |8.5 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Genoa++_1.0.0.H (2025-12-15) &lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[BL]&amp;gt;=0xC&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 9005 Turin / Turin Dense&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
!TCB‑value for SNP-certification&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-61971 CVE-2025-61971]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TurinPI_1.0.0.8 (2025-11-26)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[TEE]&amp;gt;=0x2&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-61972 CVE-2025-61972]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |8.5 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TurinPI_1.0.0.8 (2025-11-26) &lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[TEE]&amp;gt;=0x2&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD Ryzen Threadripper PRO 3000WX&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2021-46747 CVE-2021-46747]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.1 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |CastlePeakWSPI-sWRX8 1.0.0.9 (2022-01-20)&lt;br /&gt;
ChagallWSPI-sWRX8 1.0.0.2 (2022-01-20)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-48516 CVE-2025-48516]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |6.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |no specific plans &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2021-26380 CVE-2021-26380]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |1.8 (low)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ChagallWSPI-sWRX8 1.0.0.2 (2022-01-20)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54518 CVE-2025-54518]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.3 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ChagallWSPI-sWRX8-1.0.0.D (11-04-2025)&lt;br /&gt;
CastlePeakWSPI-sWRX8 1.0.0.I (10-17-2025)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD Ryzen Threadripper 7000 / PRO 7000WX&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2026-0438 CVE-2026-0438]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.4 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)&lt;br /&gt;
StormPeakPI-SP6 1.0.0.1m (2025-12-01)&lt;br /&gt;
&lt;br /&gt;
StormPeakPI-SP6_1.1.0.0k (2025-12-01)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-48516 CVE-2025-48516]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |6.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ShimadaPeakPI-SP6 1.0.0.1b (2025-08-04)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2024-36345 CVE-2024-36345]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |4.6 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |StormPeakPI-SP6 1.1.0.0k (2025-12-01)&lt;br /&gt;
StormPeakPI-SP6 1.0.0.1m (2025-12-01)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2024-36343 CVE-2024-36343]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |4.6 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |StormPeakPI-SP6 1.1.0.0k (2025-12-01)&lt;br /&gt;
StormPeakPI-SP6 1.0.0.1m (2025-12-01)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD Ryzen Threadripper 9000 / PRO 9000WX&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2026-0438 CVE-2026-0438]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.4 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-48516 CVE-2025-48516]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |6.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ShimadaPeakPI-SP6 1.0.0.1b (2025-08-04)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Supermicro security bulletins were published for security vulnerabilities. A list with BIOS-versions for the respective mainboards, to close the gaps, is also included. In the following, there is an excerpt from this table, in which all mainboards are listed that are offered by Thomas Krenn: &amp;lt;ref&amp;gt;[https://www.supermicro.com/en/support/security_center#!advisories Supermicro Security Center] (www.supermicro.com)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!AMD motherboard &lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;BIOS version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H12SSW-iN/NT&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.6&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H12SSL-i/C/CT/NT&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.6&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H12DSi-N6/NT6&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.6&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H13SSW&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.8&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H13SSL-N/NC&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.8&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Updates for Thomas-Krenn products ===&lt;br /&gt;
Updates on the corresponding system can be found in the &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;440&amp;quot;&amp;gt;download area of Thomas-Krenn&amp;lt;/tklink&amp;gt;. The versions in the download area have been tested to guarantee the stability and compatibility of our systems.&lt;br /&gt;
&lt;br /&gt;
If you require the latest version for your system and it is not yet available in our download area, you can get it at [https://www.asus.com/de/support/download-center/ Asus] or [https://www.supermicro.com/en/support/resources/downloadcenter/swdownload Supermicro].&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Thomas-Krenn.AG}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:AMD Safety Information]]&lt;br /&gt;
[[de:AMD Sicherheitslücken - Mai 2026]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/NIC_bonding_on_Debian</id>
		<title>NIC bonding on Debian</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/NIC_bonding_on_Debian"/>
		<updated>2026-05-15T08:25:59Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;==Different kinds of bonding==  * mode=0 (balance-rr) * mode=1 (active-backup)  * mode=2 (balance-xor)  * mode=3 (broadcast)  * mode=4 (802.3ad) (see also Link Aggregation and LACP basics) * mode=5 (balance-tlb)  * mode=6 (balance-alb)  == Install packages ==   apt-get install ifenslave-2.6  == Configuration Debian 5.0 Lenny and newer == In this example, we explain a configuration with mode 4 (802.3ad).  For the link aggregation, we use: * eth0 and * eth1  &amp;lt;code&amp;gt;/etc...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Different kinds of bonding==&lt;br /&gt;
&lt;br /&gt;
* mode=0 (balance-rr)&lt;br /&gt;
* mode=1 (active-backup) &lt;br /&gt;
* mode=2 (balance-xor) &lt;br /&gt;
* mode=3 (broadcast) &lt;br /&gt;
* mode=4 (802.3ad) (see also [[Link Aggregation and LACP basics]])&lt;br /&gt;
* mode=5 (balance-tlb) &lt;br /&gt;
* mode=6 (balance-alb)&lt;br /&gt;
&lt;br /&gt;
== Install packages ==&lt;br /&gt;
  apt-get install ifenslave-2.6&lt;br /&gt;
&lt;br /&gt;
== Configuration Debian 5.0 Lenny and newer ==&lt;br /&gt;
In this example, we explain a configuration with mode 4 (802.3ad).&lt;br /&gt;
&lt;br /&gt;
For the link aggregation, we use:&lt;br /&gt;
* eth0 and&lt;br /&gt;
* eth1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/etc/network/interfaces&amp;lt;/code&amp;gt; contains the following configuration:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
auto lo bond0&lt;br /&gt;
&lt;br /&gt;
iface bond0 inet static&lt;br /&gt;
  address 10.10.10.174&lt;br /&gt;
  netmask 255.255.255.0&lt;br /&gt;
  network 10.10.10.0&lt;br /&gt;
  gateway 10.10.10.1&lt;br /&gt;
  slaves eth0 eth1&lt;br /&gt;
  bond_mode 802.3ad&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As remote station, we use the switch of an Intel modular server. Eth0 and eth1 of the server are connected to the LAN-ports 1 and 2 on the modular server switch. Both LAN-ports are configured for the link aggregation. Details on this can be found in the articles [[Link Aggregation for the Modular Server]] and [[Link Aggregation Load Balancing Test Modular Server Switch]].&lt;br /&gt;
&lt;br /&gt;
== Configuration Debian 4.0 Etch ==&lt;br /&gt;
&lt;br /&gt;
=== Adjustment of /etc/network/interfaces ===&lt;br /&gt;
 iface bond0 inet static&lt;br /&gt;
    address 192.168.0.9&lt;br /&gt;
    netmask 255.255.255.0&lt;br /&gt;
    network 192.168.0.0&lt;br /&gt;
    gateway 192.168.0.1&lt;br /&gt;
    up /sbin/ifenslave bond0 eth0 eth1&lt;br /&gt;
    down /sbin/ifenslave -d bond0 eth0 eth1&lt;br /&gt;
&lt;br /&gt;
=== Editing of /etc/modprobe.d/arch/i386 file ===&lt;br /&gt;
Add the following line there:&lt;br /&gt;
&lt;br /&gt;
 alias bond0 bonding&lt;br /&gt;
  options bonding mode=5 miimon=100 downdelay=200 updelay=200&lt;br /&gt;
&lt;br /&gt;
=== Restart networking === &lt;br /&gt;
  /etc/init.d/networking restart&lt;br /&gt;
&lt;br /&gt;
=== How does bonding work with mode=5 ===&lt;br /&gt;
The incoming traffic is received only from the active slave. Outgoing traffic is distributed across both slaves based on their respective loads.&lt;br /&gt;
&lt;br /&gt;
== Further links == &lt;br /&gt;
* http://wiki.debian.org/Bonding&lt;br /&gt;
* [http://www.dodgenet.de/Software/bonding.html Bonding Modi auf www.dodgenet.de]&lt;br /&gt;
* [http://www.linuxfoundation.org/en/Net:Bonding Ausführliche Anleitung zum Bonding auf www.linuxfoundation.org]&lt;br /&gt;
&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Debian]]&lt;br /&gt;
[[pl:NIC Bonding w Debianie]]&lt;br /&gt;
[[de:NIC Bonding unter Debian]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Reset_IPMI_password</id>
		<title>Reset IPMI password</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Reset_IPMI_password"/>
		<updated>2026-05-15T05:42:40Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;This article describes how to reset the &amp;#039;&amp;#039;&amp;#039;password&amp;#039;&amp;#039;&amp;#039; of an &amp;#039;&amp;#039;&amp;#039;IPMI module&amp;#039;&amp;#039;&amp;#039;. Please note that on Supermicro systems, the maximum password length is effectively 19 characters when setting a new password (The array length is 20 characters and the string is NULL-terminated, leaving 19 characters available). &amp;lt;ref&amp;gt;[https://www.supermicro.com/support/faqs/faq.cfm?faq=16778 What is the maximum password length for IPMI?] (Supermicro FAQ 16778)&amp;lt;/ref&amp;gt;  ==Resetting the password...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article describes how to reset the &amp;#039;&amp;#039;&amp;#039;password&amp;#039;&amp;#039;&amp;#039; of an &amp;#039;&amp;#039;&amp;#039;IPMI module&amp;#039;&amp;#039;&amp;#039;. Please note that on Supermicro systems, the maximum password length is effectively 19 characters when setting a new password (The array length is 20 characters and the string is NULL-terminated, leaving 19 characters available). &amp;lt;ref&amp;gt;[https://www.supermicro.com/support/faqs/faq.cfm?faq=16778 What is the maximum password length for IPMI?] (Supermicro FAQ 16778)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Resetting the password using the impicfg tool on Supermicro systems==&lt;br /&gt;
&lt;br /&gt;
The IPMI password can be reset by restoring the IPMI to its factory defaults. Please note that with many IPMI versions, particularly older ones, the network settings are also reset! Therefore, it is recommended to note or save the network settings before the reset. All steps, that are required, can be performed with the command line tool ipmicfg. This tool is available for Windows as well as for Linux operating systems.&lt;br /&gt;
&lt;br /&gt;
In the following, the recommended process is explained:&lt;br /&gt;
&lt;br /&gt;
===Step 1: Reading out the current network configuration===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@(none):~# ipmicfg -m&lt;br /&gt;
IP=10.10.10.183 MAC=00:25:90:19:78:5A&lt;br /&gt;
root@(none):~# ipmicfg -k&lt;br /&gt;
Net Mask=255.255.255.0&lt;br /&gt;
root@(none):~# ipmicfg -g&lt;br /&gt;
IP=10.10.10.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Step 2: Reset to factory defaults===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@(none):~# ipmicfg -fd&lt;br /&gt;
Reset to the factory default completed!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Step 3: Verify network settings and adjust as needed===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@(none):~# ipmicfg -m&lt;br /&gt;
IP=10.10.10.183 MAC=00:25:90:19:78:5A&lt;br /&gt;
root@(none):~# ipmicfg -k&lt;br /&gt;
Net Mask=255.255.255.0&lt;br /&gt;
root@(none):~# ipmicfg -g&lt;br /&gt;
IP=10.10.10.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If these network settings are not correct anymore, the settings must be reset to the original values.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@(none):~# ipmicfg -m 10.10.10.183&lt;br /&gt;
IP=10.10.10.183&lt;br /&gt;
root@(none):~# ipmicfg -k 255.255.255.0&lt;br /&gt;
Net Mask=255.255.255.0&lt;br /&gt;
root@(none):~# ipmicfg -g 10.10.10.1&lt;br /&gt;
Gateway IP=10.10.10.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Default IPMI password===&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Hint:&amp;#039;&amp;#039;&amp;#039; Since the end of 2019, Supermicro creates an individual password per IPMI interface for X10- and X11-mainboards. Please follow the instructions on the stickers on the mainboards or system.&lt;br /&gt;
&lt;br /&gt;
User: ADMIN&lt;br /&gt;
&lt;br /&gt;
Password: ADMIN&lt;br /&gt;
&lt;br /&gt;
===Download link for ipmicfg===&lt;br /&gt;
* [ftp://ftp.supermicro.com/utility/IPMICFG/ ipmicfg für DOS/Linux/Windows]&lt;br /&gt;
&lt;br /&gt;
==Resetting password using ipmitool on a Linux server==&lt;br /&gt;
&lt;br /&gt;
The IPMI password can be changed by using &amp;lt;code&amp;gt;ipmitool user set password &amp;lt;userid&amp;gt;&amp;lt;/code&amp;gt;. Here is the general syntax for &amp;lt;code&amp;gt;ipmitool user&amp;lt;/code&amp;gt;:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@sr2500 ~]# ipmitool user &lt;br /&gt;
User Commands: summary [&amp;lt;channel number&amp;gt;]&lt;br /&gt;
                   list    [&amp;lt;channel number&amp;gt;]&lt;br /&gt;
                   set name     &amp;lt;user id&amp;gt; &amp;lt;username&amp;gt;&lt;br /&gt;
                   set password &amp;lt;user id&amp;gt; [&amp;lt;password&amp;gt;]&lt;br /&gt;
                   disable      &amp;lt;user id&amp;gt;&lt;br /&gt;
                   enable       &amp;lt;user id&amp;gt;&lt;br /&gt;
                   priv         &amp;lt;user id&amp;gt; &amp;lt;privilege level&amp;gt; [&amp;lt;channel number&amp;gt;]&lt;br /&gt;
                   test         &amp;lt;user id&amp;gt; &amp;lt;16|20&amp;gt; [&amp;lt;password]&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[root@sr2500 ~]# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In the article [[Configuring IPMI under Linux using ipmitool]], there is an example for the SR2500 server.&lt;br /&gt;
&lt;br /&gt;
==Resetting the whole module using the DOS-tool for Supermicro IPMI modules==&lt;br /&gt;
&lt;br /&gt;
Content of Readme.txt&lt;br /&gt;
&lt;br /&gt;
 Please boot from a bootable floppy disk then run A:\&amp;gt;defaultp.exe (bzw. erasedat20.exe)&lt;br /&gt;
 &lt;br /&gt;
 Attention! IPNMAC must then be executed, as the IPMI module is reset to factory defaults! &lt;br /&gt;
&lt;br /&gt;
=== Download link ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.thomas-krenn.com/redx_tools/mb_download.php/mid.070084079082053073121049051113056061/IPMI_config_tools.zip IPMI_config_tools.zip] (contains IPnMAC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:IPMI]]&lt;br /&gt;
[[pl:Przywrócenie domyślnego hasła w IPMI]]&lt;br /&gt;
[[de:IPMI Passwort zurücksetzen]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Reading_the_Fortron_TwinsPro_FSP900_DUAL_power_supply_under_Linux</id>
		<title>Reading the Fortron TwinsPro FSP900 DUAL power supply under Linux</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Reading_the_Fortron_TwinsPro_FSP900_DUAL_power_supply_under_Linux"/>
		<updated>2026-05-11T13:17:06Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;1st image: Fortron TwinsPro FSP 900 DUAL  &amp;#039;&amp;#039;&amp;#039;Fortron TwinsPro FSP900 Dual power supply&amp;#039;&amp;#039;&amp;#039; does not provide a native way to read data from the power supply when used with Linux on a server motherboard. However, the data can still be analyzed using Linux&amp;#039;s built-in tools.    == Problem ==  Fortron provides only a Windows port as standard, allowing users to monitor the power supply using...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:TwinsPro900W.png|alt=Abb. 1: Forton TwinsPro FSP 900 DUAL|thumb|300x300px|1st image: Fortron TwinsPro FSP 900 DUAL ]]&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Fortron TwinsPro FSP900 Dual power supply&amp;#039;&amp;#039;&amp;#039; does not provide a native way to read data from the power supply when used with [[Linux]] on a server motherboard. However, the data can still be analyzed using Linux&amp;#039;s built-in tools.  &lt;br /&gt;
&lt;br /&gt;
== Problem == &lt;br /&gt;
Fortron provides only a Windows port as standard, allowing users to monitor the power supply using the company&amp;#039;s proprietary software, FSP Guardian.&lt;br /&gt;
&lt;br /&gt;
If you want to use the power supply on a server motherboard running a Linux server operating system, the manufacturer does not provide the means to read the data. A PMBus interface is also missing.&lt;br /&gt;
&lt;br /&gt;
The following section will therefore explain how to retrieve the data using existing tools in modern Linux environments:&lt;br /&gt;
* Configuration with board resources&lt;br /&gt;
* Connecting and testing the power supply unit&lt;br /&gt;
* Making available the kernelspace for monitoring functions&lt;br /&gt;
* Error checking&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
In the following, we configure the data readout with the help of &amp;lt;code&amp;gt;i2c-tools&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;lm-sensors&amp;lt;/code&amp;gt; from a power supply by connecting it to a &amp;#039;&amp;#039;&amp;#039;USB 2.0 header&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Testing environment === &lt;br /&gt;
For the configuration, a system with Linux operating system is required. We test with an Ubuntu image:&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Linux custom-hw-image 5.15.0-97-generic #107-Ubuntu SMP Wed Feb 7 13:26:48 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Configuration == &lt;br /&gt;
&lt;br /&gt;
=== Package installation ===&lt;br /&gt;
&lt;br /&gt;
Install &amp;lt;code&amp;gt;i2c-tools&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;lm-sensors&amp;lt;/code&amp;gt;:&amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;&lt;br /&gt;
root@custom-hw-image:~# apt install i2c-tools lm-sensors&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hardware detection ===&lt;br /&gt;
So that the data can be read out, the device must be detected correctly and integrated. Verify first, if the power supply is connected via USB 2.0 header:&amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;root@custom-hw-image:~# lsusb&lt;br /&gt;
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub&lt;br /&gt;
Bus 001 Device 003: ID 10c4:ea90 Silicon Labs CP2112 HID I2C Bridge&lt;br /&gt;
Bus 001 Device 002: ID 046d:c31c Logitech, Inc. Keyboard K120&lt;br /&gt;
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub&amp;lt;/syntaxhighlight&amp;gt;The searched power supply unit &amp;#039;&amp;#039;&amp;#039;device 003 on bus 001&amp;#039;&amp;#039;&amp;#039; has been detected correctly. Now verify, on which bus the bridge is integrated via I2C:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
root@custom-hw-image:~# i2cdetect -l&lt;br /&gt;
i2c-0   smbus           SMBus I801 adapter at efa0              SMBus adapter&lt;br /&gt;
i2c-1   i2c             Synopsys DesignWare I2C adapter         I2C adapter&lt;br /&gt;
i2c-2   i2c             Synopsys DesignWare I2C adapter         I2C adapter&lt;br /&gt;
i2c-3   i2c             Synopsys DesignWare I2C adapter         I2C adapter&lt;br /&gt;
i2c-4   i2c             Synopsys DesignWare I2C adapter         I2C adapter&lt;br /&gt;
i2c-5   i2c             Synopsys DesignWare I2C adapter         I2C adapter&lt;br /&gt;
i2c-6   i2c             CP2112 SMBus Bridge on hidraw2          I2C adapter&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Here, the &amp;#039;&amp;#039;&amp;#039;SMBus bridge&amp;#039;&amp;#039;&amp;#039; has been found on &amp;#039;&amp;#039;&amp;#039;bus i2c-6&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Reading out bus ===&lt;br /&gt;
&lt;br /&gt;
You can now read out the I2C-bus on this address:&amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
root@custom-hw-image:~# i2cdetect -y 6&lt;br /&gt;
Warning: Can&amp;#039;t use SMBus Quick Write command, will skip some addresses&lt;br /&gt;
     0  1  2  3  4  5  6  7  8  9  a  b  c  d  e  f&lt;br /&gt;
00:&lt;br /&gt;
10:&lt;br /&gt;
20:&lt;br /&gt;
30: -- -- -- -- -- -- -- --&lt;br /&gt;
40:&lt;br /&gt;
50: 50 51 -- -- -- -- 56 -- 58 59 -- -- -- -- -- --&lt;br /&gt;
60:&lt;br /&gt;
70:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Here, both power supply units are detected on the addresses &amp;#039;&amp;#039;&amp;#039;0x58&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;0x59&amp;#039;&amp;#039;&amp;#039;. To check, if the manufacturer name is correct:&amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;root@custom-hw-image:~# i2cget -y 6 0x58 0x99 i 8&lt;br /&gt;
0x09 0x46 0x53 0x50 0x2d 0x47 0x52 0x4f&lt;br /&gt;
root@custom-hw-image:~# printf &amp;quot;\x09\x46\x53\x50\x2d\x47\x52\x4f\n&amp;quot;&lt;br /&gt;
FSP-GRO&amp;lt;/syntaxhighlight&amp;gt;The voltage can be read out for the verification. &amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;&lt;br /&gt;
root@custom-hw-image:~# i2cget -y 6 0x58 0x8B w&lt;br /&gt;
0x1879&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;This value must be converted and expressed in volts. The manufacturer uses a &amp;#039;&amp;#039;&amp;#039;direct scaling&amp;#039;&amp;#039;&amp;#039;. The voltage can be therefore &amp;#039;&amp;#039;&amp;#039;calculated linearly&amp;#039;&amp;#039;&amp;#039;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;math&amp;gt;(1879)_{16} \widehat{=} (6265)_{10} \widehat{=} \frac{6265}{2^9} = \frac{6265}{512} \approx 12,236 V&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Integration of ports in kernelspace ==&lt;br /&gt;
[[File:Fortron_SP900_readout_DUAL_Linux.png|alt=Abb. 2: Detailed evaluation of the power supplies|thumb|365x365px|2nd image: Detailed evaluation of the power supplies]]&lt;br /&gt;
With the following commands, you can add both power supply ports to the kernelspace:&amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;&lt;br /&gt;
root@custom-hw-image:~# echo pmbus 0x58   | sudo tee /sys/bus/i2c/devices/i2c-6/new_device&lt;br /&gt;
pmbus 0x58&lt;br /&gt;
root@custom-hw-image:~# echo pmbus 0x59   | sudo tee /sys/bus/i2c/devices/i2c-6/new_device&lt;br /&gt;
pmbus 0x59&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Verify the successful integration:   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
root@custom-hw-image:~# i2cdetect -y 6&lt;br /&gt;
Warning: Can&amp;#039;t use SMBus Quick Write command, will skip some addresses&lt;br /&gt;
     0  1  2  3  4  5  6  7  8  9  a  b  c  d  e  f&lt;br /&gt;
00:&lt;br /&gt;
10:&lt;br /&gt;
20:&lt;br /&gt;
30: -- -- -- -- -- -- -- --&lt;br /&gt;
40:&lt;br /&gt;
50: 50 51 -- -- -- -- 56 -- UU UU -- -- -- -- -- --&lt;br /&gt;
60:&lt;br /&gt;
70:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The two power supplies cannot be accessed directly via I2C because they are now fully integrated into the kernel-space &amp;quot;UU (Upper Unit)&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Both power supplies can be completely read out with &amp;lt;code&amp;gt;lm-sensors&amp;lt;/code&amp;gt; (for the output, take a look at the &amp;#039;&amp;#039;second image&amp;#039;&amp;#039;):&amp;lt;syntaxhighlight lang=&amp;quot;shell-session&amp;quot;&amp;gt;&lt;br /&gt;
root@custom-hw-image:~# sensors&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Error checking ==&lt;br /&gt;
&lt;br /&gt;
Finally, you can simulate an error scenario.&lt;br /&gt;
Here, the IEC power plug from &amp;#039;&amp;#039;&amp;#039;power supply 1&amp;#039;&amp;#039;&amp;#039; (3rd image): &lt;br /&gt;
[[File:Psu failure ps1.png|none|thumb|957x957px|3rd image: Error simulation]]&lt;br /&gt;
{{wseifert}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[de:Fortron TwinsPro FSP900 DUAL Netzteil unter Linux auslesen]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/AIC_backplane_firmware-_and_MFG-update_via_serial_console</id>
		<title>AIC backplane firmware- and MFG-update via serial console</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/AIC_backplane_firmware-_and_MFG-update_via_serial_console"/>
		<updated>2026-05-06T09:07:48Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article describes how to &amp;#039;&amp;#039;&amp;#039;update&amp;#039;&amp;#039;&amp;#039; the &amp;#039;&amp;#039;&amp;#039;AIC backplane firmware&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;MFG&amp;#039;&amp;#039;&amp;#039; using a &amp;#039;&amp;#039;&amp;#039;serial console connection&amp;#039;&amp;#039;&amp;#039;.  &lt;br /&gt;
&lt;br /&gt;
== Hardware requirements ==&lt;br /&gt;
[[file:4HE AIC Gehäuse XE1-4BT00-05 backsideMarked.jpg|alt=Back side of a 4U AIC chassis XE1-4BT00-05|thumb|353x353px|Backside of a 4U AIC chassis XE1-4BT00-05. AUX-ports are highlighted. The upper port is connected to the frontal 24-bay backplane.]]&lt;br /&gt;
&lt;br /&gt;
The following two cables are needed:&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;250&amp;quot; heights=&amp;quot;250&amp;quot;&amp;gt;&lt;br /&gt;
file:SerialCableAux.jpeg|alternativtext=Serial cable with 3,5-mm auxiliary connector (male)|1.: Serial cable with 3,5-mm auxiliary connector (male)&lt;br /&gt;
file:SerialCableAuxJEXP UART.JPG|2.: AUX to JEXP_UART adapter. This is included in the accessories for a Thomas Krenn server or is already pre-installed in the system.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A secondary system (for example a laptop or neighboring server) is recommended for the flashing procedure. &lt;br /&gt;
&lt;br /&gt;
=== Connection between backplane and secondary system ===&lt;br /&gt;
The JEXP_UART-header on the backplane consists of six pins. However, only the upper three pins are needed for flashing.[[file:BackplaneMarkiert.JPG.jpg|alt=4HE AIC Backplane, JEXP_UART header highlighted|thumb|714x714px|Example of a backplane with highlighted JEXP_UART-header  |none]]&lt;br /&gt;
[[file:JEXP UART Header pluggedIn.jpg|alt=Connected JEXP_UART-Header, top view|thumb|A connected JEXP_UART cable. (top view) Cable colors from left to right: red, black, yellow|none]]&lt;br /&gt;
&lt;br /&gt;
The other end must be connected to the secondary system via serial port. &lt;br /&gt;
&lt;br /&gt;
[[file:SerialCableConnected.jpg|alt=Serial cable connected to the second system|none|thumb|Serial cable connected to the secondary system]]&lt;br /&gt;
&lt;br /&gt;
== Establishing a connection ==&lt;br /&gt;
Programs such as &amp;#039;&amp;#039;&amp;#039;PuTTY&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;ExtraPutty&amp;#039;&amp;#039;&amp;#039; are required to establish a connection. Due to its expanded data transfer options, &amp;#039;&amp;#039;&amp;#039;ExtraPuTTY&amp;#039;&amp;#039;&amp;#039; is highly recommended. &lt;br /&gt;
&lt;br /&gt;
The following parameters need to be set: &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Parameter&lt;br /&gt;
! Value&lt;br /&gt;
|-&lt;br /&gt;
| Speed (baudrate)&lt;br /&gt;
| 38400&lt;br /&gt;
|-&lt;br /&gt;
| Data Bits&lt;br /&gt;
| 8&lt;br /&gt;
|-&lt;br /&gt;
| Stop Bits&lt;br /&gt;
| 1&lt;br /&gt;
|-&lt;br /&gt;
| Parity&lt;br /&gt;
| none&lt;br /&gt;
|-&lt;br /&gt;
| Flow Control&lt;br /&gt;
| none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;250&amp;quot; heights=&amp;quot;250&amp;quot;&amp;gt;&lt;br /&gt;
file:PuttySettings.png|Settings for establishing a connection with the backplane in ExtraPuTTY&lt;br /&gt;
file:SessionOffen.png|Live session. After clicking the Enter-key, &amp;#039;cmd &amp;gt;&amp;#039; should appear.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Checking active firmware / MFG ===&lt;br /&gt;
The commands &amp;#039;&amp;#039;&amp;#039;rev&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;showmfg&amp;#039;&amp;#039;&amp;#039; can be used to check the installed firmware and MFG versions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;250&amp;quot; heights=&amp;quot;250&amp;quot;&amp;gt;&lt;br /&gt;
file:Rev.png|&amp;#039;&amp;#039;&amp;#039;The rev command&amp;#039;&amp;#039;&amp;#039; displays the current firmware version.&lt;br /&gt;
file:Showmfg.png|&amp;#039;&amp;#039;&amp;#039;The showmfg command&amp;#039;&amp;#039;&amp;#039; displays the currently installed MFG version.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Flashing the backplane ==&lt;br /&gt;
&lt;br /&gt;
=== Precautions ===&lt;br /&gt;
To ensure that the backplane is functioning properly and that there are no hardware defects or similar issues, you should run a few commands and check the results before actually flashing the device.&amp;lt;gallery widths=&amp;quot;250&amp;quot; heights=&amp;quot;250&amp;quot;&amp;gt;&lt;br /&gt;
file:Sensor.png|The &amp;#039;&amp;#039;&amp;#039;sensor&amp;#039;&amp;#039;&amp;#039; command can be used to get information about temperature, connected fans or voltage.&lt;br /&gt;
file:Phyinfo.png|The &amp;#039;&amp;#039;&amp;#039;phyinfo&amp;#039;&amp;#039;&amp;#039; displays information about the connected storage devices (none are installed in the screenshot).&lt;br /&gt;
file:Counters.png|With the &amp;#039;&amp;#039;&amp;#039;counters&amp;#039;&amp;#039;&amp;#039; command, different error counter values are displayed. The values nvWrdCnt, DispErrCnt, LossSyncCnt and RstSeqFailCnt need to be 0. If this is not the case, &amp;#039;&amp;#039;&amp;#039;counters reset&amp;#039;&amp;#039;&amp;#039; can be used to reset all values. Then execute the &amp;#039;&amp;#039;&amp;#039;counters&amp;#039;&amp;#039;&amp;#039; command again. If the values are not zero, it is likely that there is a defect. &amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;[https://www.aicipc.com/image/images/psg/EOB%20Backplane%20Check-up%20via%20Serial%20console.pdf EOB Backplane Check-up via Serial console]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Firmware update&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; ===&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;250&amp;quot; heights=&amp;quot;250&amp;quot;&amp;gt;&lt;br /&gt;
file:Fdl 0 0.png|&amp;#039;&amp;#039;&amp;#039;The fdl 0 0&amp;#039;&amp;#039;&amp;#039; command sets the backplane into update mode. It now expects a firmware file.&lt;br /&gt;
file:FileTransfer.png|alternativtext=Xmodem Transfer|The Xmodem protocol is to be used for file transfer. In ExtraPuTTY, this can be done via &amp;#039;File Transfer → Xmodem → Send&amp;#039;&lt;br /&gt;
file:FirmweareFile.png|alternativtext=select firmware file|Afterwards, select the desired firmware file.&lt;br /&gt;
file:Datenuebertragung.png|Upload and flash procedure starts automatically.&lt;br /&gt;
file:Transferdone.png|Once the process is complete, the message &amp;quot;Upload successful&amp;quot; appears.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== MFG-update&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; ===&lt;br /&gt;
Updating the MFG works similar to the firmware.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;250&amp;quot; heights=&amp;quot;250&amp;quot;&amp;gt;&lt;br /&gt;
file:Fdl 83 0.png|The update is started with the &amp;#039;&amp;#039;&amp;#039;fdl 83 0&amp;#039;&amp;#039;&amp;#039; command.  &lt;br /&gt;
file:Mfg file.png|Select the correct mfg-file.&lt;br /&gt;
file:Mfg transfer.png|Data transfer begins.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== After the updates ===&lt;br /&gt;
If no storage devices are connected to any backplane, the update can be completed by executing the &amp;#039;&amp;#039;&amp;#039;reset&amp;#039;&amp;#039;&amp;#039; command.[[file:Reset.png|alt=Reset command|thumb|&amp;#039;&amp;#039;&amp;#039;The reset command&amp;#039;&amp;#039;&amp;#039; reboots the backplane.|none]]&amp;#039;&amp;#039;&amp;#039;Attention!&amp;#039;&amp;#039;&amp;#039; If the &amp;#039;&amp;#039;&amp;#039;reset&amp;#039;&amp;#039;&amp;#039; command is executed while data storage devices with an active RAID array are connected to the backplane, this may cause the RAID to degrade or fail completely.&lt;br /&gt;
&lt;br /&gt;
[[file:NeueFW.png|alt=new firmware active|thumb|The new firmware and MFG is now active on the backplane. |none]]&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Swolf}}&lt;br /&gt;
[[Category:Server-Hardware]]&lt;br /&gt;
[[de:AIC Backplane Firmware- und MFG-Update via serielle Konsole]]&lt;/div&gt;</summary>
		<author><name>Swolf</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Internet-Speed-Test_with_LibreSpeed</id>
		<title>Internet-Speed-Test with LibreSpeed</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Internet-Speed-Test_with_LibreSpeed"/>
		<updated>2026-04-29T09:17:03Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;There are websites for testing the own &amp;#039;&amp;#039;&amp;#039;internet speed&amp;#039;&amp;#039;&amp;#039; offered by a lot of providers. The most services of this kind collect &amp;#039;&amp;#039;&amp;#039;multiple local data&amp;#039;&amp;#039;&amp;#039; in such tests, which is why they are &amp;#039;&amp;#039;&amp;#039;not without risk from a data protection perspective&amp;#039;&amp;#039;&amp;#039;. The open source alternative &amp;#039;&amp;#039;&amp;#039;LibreSpeed&amp;#039;&amp;#039;&amp;#039; offers a data-efficient alternative.   == Data collection of conventional speedtest-alternatives == Traditional providers of internet speed testing services collect a large amoun...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are websites for testing the own &amp;#039;&amp;#039;&amp;#039;internet speed&amp;#039;&amp;#039;&amp;#039; offered by a lot of providers. The most services of this kind collect &amp;#039;&amp;#039;&amp;#039;multiple local data&amp;#039;&amp;#039;&amp;#039; in such tests, which is why they are &amp;#039;&amp;#039;&amp;#039;not without risk from a data protection perspective&amp;#039;&amp;#039;&amp;#039;. The open source alternative &amp;#039;&amp;#039;&amp;#039;LibreSpeed&amp;#039;&amp;#039;&amp;#039; offers a data-efficient alternative. &lt;br /&gt;
&lt;br /&gt;
== Data collection of conventional speedtest-alternatives ==&lt;br /&gt;
Traditional providers of internet speed testing services collect a large amount of data from their own networks, own devices and from the applications on it. In connection with the aquisition of Ookla (operator of Speedtest and Downdetector), the international consulting firm, Accenture, announced that &amp;#039;&amp;#039;&amp;#039;more than 1,000 attributes&amp;#039;&amp;#039;&amp;#039; are queried per test in March 2026.&amp;lt;ref name=accenture&amp;gt;[https://newsroom.accenture.com/news/2026/accenture-to-acquire-ookla-to-strengthen-network-intelligence-and-experience-with-data-and-ai-for-enterprises Accenture to Acquire Ookla to Strengthen Network Intelligence and Experience with Data and AI For Enterprises] (newsroom.accenture.com, 03.03.2026) &amp;lt;cite&amp;gt;As AI scales, the insights captured at the &amp;#039;&amp;#039;&amp;#039;network, device, and application layers&amp;#039;&amp;#039;&amp;#039; are essential to enhance fraud prevention in banking, smart home analytics in utilities, and traffic optimization in retail. Ookla’s platform, which captures &amp;#039;&amp;#039;&amp;#039;more than 1,000 attributes per test&amp;#039;&amp;#039;&amp;#039;, provides the foundation for these insights.&amp;lt;/cite&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Accenture-Newsroom-2026-03-03.png|When it acquired Ookla, Accenture announced that more than 1,000 attributes are collected from the user by Speedtest or Downdetecor.&lt;br /&gt;
File:Speedtest.png|Always active at speedtest.net: more than 500 partners can, for example, use the cookie information to identify end devices. &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LibreSpeed ==&lt;br /&gt;
LibreSpeed works data-efficient. on [https://librespeed.org/ LibreSpeed.org], no data is collected: &lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:LibreSpeed-Website.png|Example of a test from a fiber-optic connection in Austria. &lt;br /&gt;
File:LibreSpeed-Anbieter.png|Selection of LibreSpeed servers.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Optionally, LibreSpeed servers can, if they are operated by the company itself, store the following data:&amp;lt;ref&amp;gt;[https://github.com/librespeed/speedtest/blob/master/results/stats.php#L103 stats.php Quellcode] (github.com/librespeed/speedtest)&amp;lt;/ref&amp;gt;&lt;br /&gt;
* Test ID&lt;br /&gt;
* Date and time&lt;br /&gt;
* IP and ISP Info&lt;br /&gt;
* Download speed&lt;br /&gt;
* Upload speed&lt;br /&gt;
* Ping&lt;br /&gt;
* Jitter&lt;br /&gt;
* Log&lt;br /&gt;
* Extra info&lt;br /&gt;
&lt;br /&gt;
[https://librespeed.org/ LibreSpeed.org] had not enabled this feature as of April 29, 2026, however.&lt;br /&gt;
&lt;br /&gt;
== LibreSpeed App for Android ==&lt;br /&gt;
The LibreSpeed app for Android is available in the F-Droid store (Autor Federico Dossenda).&amp;lt;ref&amp;gt;[https://f-droid.org/en/packages/com.dosse.speedtest/ LibreSpeed F-Droid] (f-droid.org/en/packages)&amp;lt;/ref&amp;gt; Attention: Only use this app; there are others in the Google Play Store that have intentionally built in numerous trackers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:LibreSpeed-App-01-App-Lounge.png|LibreSpeed Privacy Rating in App Lounge by /e/OS.&lt;br /&gt;
File:LibreSpeed-App-02-Trackers.png|Tracker-Report (0 Tracker)&amp;lt;ref&amp;gt;[https://reports.exodus-privacy.eu.org/de/reports/com.dosse.speedtest/latest/ Report for LibreSpeed] (reports.exodus-privacy.eu.org)&amp;lt;/ref&amp;gt; for LibreSpeed from Exodus-Privacy&amp;lt;ref&amp;gt;[https://exodus-privacy.eu.org/en/page/who/ Exodus Privacy - Who we are] (exodus-privacy.eu.org)&amp;lt;/ref&amp;gt; (French non-Profit).&lt;br /&gt;
File:LibreSpeed-App-03-Test.png|LibreSpeed App Home.&lt;br /&gt;
File:LibreSpeed-App-04-Privacy-Policy.png|LibreSpeed App Privacy Policy.&lt;br /&gt;
File:LibreSpeed-App-05-Test-Result.png|LibreSpeed sample result for an LTE connection in Austria.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Alternatives == &lt;br /&gt;
The Federal Network Agency&amp;#039;s broadband measurement is equally data-efficient:&lt;br /&gt;
* https://www.breitbandmessung.de/&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://www.theregister.com/2026/03/03/accenture_buys_ookla_downdetector_ziff_davis/ Accenture down to buy Downdetector as part of $1.2 billion deal] (theregister.com, 03.03.2026)&lt;br /&gt;
* [https://arstechnica.com/information-technology/2026/03/downdetector-speedtest-sold-to-it-service-provider-accenture-in-1-2b-deal/ Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal] (arstechnica.com, 03.03.2026)&lt;br /&gt;
* [https://www.reddit.com/r/xprivo/comments/1rmalpy/news_librespeed_opensource_alternative_made_in/ (News) Librespeed - Open-Source Alternative Made in Europe: Downdetector and Speedtest sold to Accenture for $1.2 billion] (www.reddit.com, 2026)&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Wfischer}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category: Data Protection]]&lt;br /&gt;
[[de:Internet-Speed-Test mit LibreSpeed]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/TKMI_Settings</id>
		<title>TKMI Settings</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/TKMI_Settings"/>
		<updated>2026-04-29T07:28:32Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;== Menu ==  {| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot; | style=&amp;quot;width:240px; text-align:center;&amp;quot; | overview | &amp;#039;&amp;#039;&amp;#039;Overview&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt; Overview of the settings available in the TKMI. |}  == System and basic configuration ==   {| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot; | style=&amp;quot;width:240px; text-align:center;&amp;quot; | configure date and time | &amp;#039;&amp;#039;&amp;#039;Date &amp;amp; Time&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt; The &amp;#039;&amp;#039;&amp;#039;date, time and time synchronizat...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Menu == &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:240px; text-align:center;&amp;quot; | [[file:TKMI-Settings_overview.png|220px|overview]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Overview&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
Overview of the settings available in the TKMI.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== System and basic configuration == &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:240px; text-align:center;&amp;quot; | [[file:TKMI-Settings_date_time.png|220px|configure date and time]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Date &amp;amp; Time&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;date, time and time synchronization&amp;#039;&amp;#039;&amp;#039; of the BMC is configured including NTP. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_network_settings.png|220px|network configuration]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Network settings&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;BMC&amp;#039;&amp;#039;&amp;#039; &amp;#039;&amp;#039;&amp;#039;network settings&amp;#039;&amp;#039;&amp;#039; are determined, for example IP-address, gateway, VLAN and DNS. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_services.png|220px|service settings]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Services&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;BMC-services&amp;#039;&amp;#039;&amp;#039; such as Web, SSH, KVM or SNMP are activated or deactivated. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_ipmi_interfaces.png|220px|IPMI interfaces]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;IPMI interfaces&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;IPMI-interfaces&amp;#039;&amp;#039;&amp;#039; are configured here. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_identify_led.png|220px|Identify LED]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Identify LED&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;Identify-LED&amp;#039;&amp;#039;&amp;#039; of the system can be controlled here. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_fan_control.png|220px|fan control]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Fan control&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;fan control&amp;#039;&amp;#039;&amp;#039; can be configured here. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== User, registration and safety ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:240px; text-align:center;&amp;quot; | [[file:TKMI-Settings_user_management.png|220px|Benutzerverwaltung]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;User Management&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;User accounts and permissions are managed in &amp;#039;&amp;#039;&amp;#039;the User Management.&amp;#039;&amp;#039;&amp;#039;  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_external_user_services.png|220px|Externe Authentifizierung]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;External User Services&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
This section is used to integrate external &amp;#039;&amp;#039;&amp;#039;authentication services&amp;#039;&amp;#039;&amp;#039; such as LDAP or Active Directory. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_pam_order.png|220px|Authentifizierungsreihenfolge]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;PAM order settings&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
This is where the &amp;#039;&amp;#039;&amp;#039;order of the authentication methods&amp;#039;&amp;#039;&amp;#039; is defined. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_ssl_settings.png|220px|SSL Zertifikate]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;SSL settings&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
This section covers &amp;#039;&amp;#039;&amp;#039;SSL- and certificate management&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_system_firewall.png|220px|Firewall Einstellungen]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;System firewall&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
The access on the BMC can be restricted via &amp;#039;&amp;#039;&amp;#039;integrated firewall&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Logging, notification and events == &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:240px; text-align:center;&amp;quot; | [[file:TKMI-Settings_log_settings.png|220px|Log Einstellungen]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Log settings&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
This section is where you configure settings for &amp;#039;&amp;#039;&amp;#039;system and audit logs&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_platform_event_filters.png|220px|Platform Event Filter]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Platform Event Filter&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;Platform Event Filter&amp;#039;&amp;#039;&amp;#039; enables automated actions in response to hardware events, such as sending SNMP traps.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_smtp_settings.png|220px|SMTP Konfiguration]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;SMTP settings&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;lt;br&amp;gt;This is where the settings &amp;#039;&amp;#039;&amp;#039;for sending emails&amp;#039;&amp;#039;&amp;#039; are configured.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_bsod.png|220px|Captured BSOD Übersicht]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Captured BSOD&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
This section displays any &amp;#039;&amp;#039;&amp;#039;blue screen errors&amp;#039;&amp;#039;&amp;#039; in a Windows system that have been detected and logged by the BMC.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Remote-console and media ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:240px; text-align:center;&amp;quot; | [[file:TKMI-Settings_kvm_mouse_settings.png|220px|KVM Maus Einstellungen]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;KVM mouse settings&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
Here, the settings for the &amp;#039;&amp;#039;&amp;#039;mouse control&amp;#039;&amp;#039;&amp;#039; can be configured in the &amp;#039;&amp;#039;&amp;#039;remote KVM console&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_media_redirection.png|220px|Virtuelle Medien]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Media redirection settings&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
This section provides options on &amp;#039;&amp;#039;&amp;#039;virtual media redirection&amp;#039;&amp;#039;&amp;#039;, for example, for mounting ISO files via the KVM console.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[file:TKMI-Settings_video_recording.png|220px|KVM Aufzeichnung]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Video recording&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
This section provides functions for &amp;#039;&amp;#039;&amp;#039;recording remote KVM sessions&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Storage and administration ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:240px; text-align:center;&amp;quot; | [[file:TKMI-Settings_raid_management.png|220px|RAID Verwaltung]]&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;RAID Management&amp;#039;&amp;#039;&amp;#039;&amp;lt;br&amp;gt;&lt;br /&gt;
This is where supported &amp;#039;&amp;#039;&amp;#039;RAID-functions&amp;#039;&amp;#039;&amp;#039; are administrated. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== More articles == &lt;br /&gt;
* [[TKMI overview]]&lt;br /&gt;
* [[How to activate and configure SNMP in TKMI]]&lt;br /&gt;
&lt;br /&gt;
{{Azillner}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Thomas-Krenn Management Interface]]&lt;br /&gt;
[[de:TKMI Settings]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/TKMI_Remote_Control</id>
		<title>TKMI Remote Control</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/TKMI_Remote_Control"/>
		<updated>2026-04-29T05:39:13Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [[TKMI overview|TKMI]] provides &amp;#039;&amp;#039;&amp;#039;remote control&amp;#039;&amp;#039;&amp;#039; functions for remote operation &amp;#039;&amp;#039;&amp;#039;and direct interaction with the system.&amp;#039;&amp;#039;&amp;#039; These include, in particular, the remote KVM console as well as additional control and management options. &lt;br /&gt;
&lt;br /&gt;
In the following, the individual sections are explained. &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[File:TKMI-Remote-Control_overview.png|alt=Remote Control Menu|thumb|220x220px|Remote Control Menu ]]&lt;br /&gt;
&lt;br /&gt;
This section provides &amp;#039;&amp;#039;&amp;#039;access to the remote KVM console (H5Viewer)&amp;#039;&amp;#039;&amp;#039; as well as &amp;#039;&amp;#039;&amp;#039;Serial over LAN (SOL)&amp;#039;&amp;#039;&amp;#039; for direct system integration.&lt;br /&gt;
&lt;br /&gt;
== Remote KVM console ==&lt;br /&gt;
[[File:TKMI-Remote-Control_console.png|alt=Remote KVM console|thumb|220x220px|Remote KVM console]]&lt;br /&gt;
&lt;br /&gt;
The system can be &amp;#039;&amp;#039;&amp;#039;completely controlled remotely&amp;#039;&amp;#039;&amp;#039; via H5Viewer including BIOS/UEFI-access and operating system interaction. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Functions within the remote console:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Video&amp;#039;&amp;#039;&amp;#039; – Control &amp;#039;&amp;#039;&amp;#039;video output&amp;#039;&amp;#039;&amp;#039; functions such as pause, refresh or turning the display on/off&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Mouse&amp;#039;&amp;#039;&amp;#039; – Configuring &amp;#039;&amp;#039;&amp;#039;mouse control&amp;#039;&amp;#039;&amp;#039;, for example between absolute and relative mode&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Options&amp;#039;&amp;#039;&amp;#039; – Adjustment of &amp;#039;&amp;#039;&amp;#039;display quality, zoom level and colour depth&amp;#039;&amp;#039;&amp;#039; of the remote session&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Keyboard&amp;#039;&amp;#039;&amp;#039; – Selecting the &amp;#039;&amp;#039;&amp;#039;keyboard layout&amp;#039;&amp;#039;&amp;#039; for the remote session &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Send Keys&amp;#039;&amp;#039;&amp;#039; – Allows to &amp;#039;&amp;#039;&amp;#039;send shortcuts&amp;#039;&amp;#039;&amp;#039; such as &amp;lt;code&amp;gt;Ctrl+Alt+Del&amp;lt;/code&amp;gt; to the system&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Video Record&amp;#039;&amp;#039;&amp;#039; – function for recording the &amp;#039;&amp;#039;&amp;#039;remote KVM session&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Power -&amp;#039;&amp;#039;&amp;#039; Direct &amp;#039;&amp;#039;&amp;#039;control of system&amp;#039;&amp;#039;&amp;#039; (Restart, Shutdown, Power Cycle) &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Active Users&amp;#039;&amp;#039;&amp;#039; – Display of active users currently accessing the remote console&lt;br /&gt;
&lt;br /&gt;
== Serial Over LAN (SOL) ==&lt;br /&gt;
[[File:TKMI-Remote-Control-Serialconsole.png|alt=Serial over LAN|thumb|220x220px|Serial over LAN ]]&lt;br /&gt;
This allows the access on the &amp;#039;&amp;#039;&amp;#039;serial console of the system via network&amp;#039;&amp;#039;&amp;#039;, particularly for diagnostic and troubleshooting purposes.&lt;br /&gt;
&lt;br /&gt;
{{Azillner}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[de:TKMI Remote Control]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/How_to_activate_and_configure_SNMP_in_TKMI</id>
		<title>How to activate and configure SNMP in TKMI</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/How_to_activate_and_configure_SNMP_in_TKMI"/>
		<updated>2026-04-21T05:06:13Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;This article describes how to activate and configure the &amp;#039;&amp;#039;&amp;#039; SNMP-access&amp;#039;&amp;#039;&amp;#039; for an user in the  TKMI (Thomas-Krenn Management Interface)   == Prerequisites == * A compatible TKMI or Thomas-Krenn server * Access to the TKMI/IPMI-websurface * Valid user login data with administrative rights  == User administration ==  So that  SNMP can be used, the access must be activated for a user in the  TKMI...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article describes how to activate and configure the &amp;#039;&amp;#039;&amp;#039;[[SNMP_basics | SNMP-access]]&amp;#039;&amp;#039;&amp;#039; for an user in the [[TKMI overview | TKMI (Thomas-Krenn Management Interface)]] &lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
* A compatible TKMI or Thomas-Krenn server&lt;br /&gt;
* Access to the TKMI/IPMI-websurface&lt;br /&gt;
* Valid user login data with administrative rights&lt;br /&gt;
&lt;br /&gt;
== User administration ==&lt;br /&gt;
&lt;br /&gt;
So that [[SNMP_Grundlagen | SNMP]] can be used, the access must be activated for a user in the [[Übersicht_TKMI | TKMI]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;nolines&amp;quot; widths=&amp;quot;300&amp;quot; heights=&amp;quot;300&amp;quot;&amp;gt;&lt;br /&gt;
TKMI-SNMP-User_Login.png|Log in to the TKMI web interface with a valid username (for example &amp;#039;&amp;#039;admin&amp;#039;&amp;#039;).&lt;br /&gt;
TKMI-SNMP-Dashboard.png|After logging in, go to &amp;#039;&amp;#039;&amp;#039;Settings&amp;#039;&amp;#039;&amp;#039; in the left-hand menu.&lt;br /&gt;
TKMI-SNMP-Settings.png|In the &amp;#039;&amp;#039;&amp;#039;Settings&amp;#039;&amp;#039;&amp;#039; section, open the &amp;#039;&amp;#039;&amp;#039;User Management&amp;#039;&amp;#039;&amp;#039; option.&lt;br /&gt;
TKMI-SNMP-User_Management.png|Select the user for whom you want to enable SNMP.&lt;br /&gt;
TKMI-SNMP-User_Logged_In_Password.png|Enter your current password in the &amp;#039;&amp;#039;&amp;#039;Logged-In Password&amp;#039;&amp;#039;&amp;#039; field to confirm.&lt;br /&gt;
TKMI-SNMP-User_SNMP_Activate.png|In the lower section, enable &amp;#039;&amp;#039;&amp;#039;SNMP Access&amp;#039;&amp;#039;&amp;#039; and configure the desired SNMP parameters.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After the configuration, the changes must be saved with &amp;#039;&amp;#039;&amp;#039;Save&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
== MIB browser ==&lt;br /&gt;
&lt;br /&gt;
For the verification of the SNMP-availability and to read out values, a MIB browser can be used.&lt;br /&gt;
&lt;br /&gt;
In this example, the iReasoning MIB browser is used.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;nolines&amp;quot; widths=&amp;quot;100&amp;quot; heights=&amp;quot;100&amp;quot;&amp;gt;&lt;br /&gt;
Download.png| iReasoning MIB browser [https://www.ireasoning.com/mibbrowser.shtml download]&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Establish connection to TKMI ==&lt;br /&gt;
&lt;br /&gt;
After activation of the SNMP in TKMI, the connection can be tested as follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;nolines&amp;quot; widths=&amp;quot;300&amp;quot; heights=&amp;quot;300&amp;quot;&amp;gt;&lt;br /&gt;
TKMI-SNMP_MIB_Browser.png|Enter the TKMI&amp;#039;s IP address in the &amp;#039;&amp;#039;&amp;#039;Address&amp;#039;&amp;#039;&amp;#039; field. Click &amp;#039;&amp;#039;&amp;#039;Advanced...&amp;#039;&amp;#039;&amp;#039; to access the advanced SNMP settings.&lt;br /&gt;
TKMI-SNMP-MIB_Browser_Settings.png|In the advanced settings, select &amp;#039;&amp;#039;&amp;#039;SNMP Version 3&amp;#039;&amp;#039;&amp;#039; and enter the login access data.&lt;br /&gt;
TKMI-SNMP-MIB_Browser_Test.png|Once configured, you can run a query by clicking &amp;#039;&amp;#039;&amp;#039;Go&amp;#039;&amp;#039;&amp;#039;. Successful results are displayed in the &amp;#039;&amp;#039;&amp;#039;Result Table&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Important settings (SNMPv3) ==&lt;br /&gt;
&lt;br /&gt;
For a successful connection, the following parameters must comply with the set values in TKMI:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Address:&amp;#039;&amp;#039;&amp;#039; IP-address of TKMI&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Port:&amp;#039;&amp;#039;&amp;#039; 161&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;SNMP Version:&amp;#039;&amp;#039;&amp;#039; 3&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;User:&amp;#039;&amp;#039;&amp;#039; Corresponds to the user configured in the TKMI &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Security Level:&amp;#039;&amp;#039;&amp;#039; authPriv&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Auth Algorithm:&amp;#039;&amp;#039;&amp;#039; for example SHA256&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Auth Password:&amp;#039;&amp;#039;&amp;#039; set authentication password&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Privacy Algorithm:&amp;#039;&amp;#039;&amp;#039; for example DES&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Privacy Password:&amp;#039;&amp;#039;&amp;#039;  set encryption password&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Hint:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
If there are discrepancies in the username, password, or algorithms, no SNMP responses will be returned.&lt;br /&gt;
&lt;br /&gt;
== Test query == &lt;br /&gt;
&lt;br /&gt;
For a simple function test, the following OID can be used:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;1.3.6.1.2.1.1.1.0&amp;#039;&amp;#039;&amp;#039; (sysDescr)&lt;br /&gt;
&lt;br /&gt;
If the connection is successful, a system description of the TKMI is displayed in the &amp;#039;&amp;#039;&amp;#039;Result Table&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
If the SNMP-access does not function:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;SNMP Access not activated&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Wrong access data / community&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Firewall blocks SNMP (Port 161/UDP)&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Incorrect OID specified&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;SNMP-version does not comply&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{{Azillner}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:IPMI]]&lt;br /&gt;
[[de:SNMP im TKMI aktivieren und konfigurieren]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/AMD_Security_Vulnerabilities_-_April_2026</id>
		<title>AMD Security Vulnerabilities - April 2026</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/AMD_Security_Vulnerabilities_-_April_2026"/>
		<updated>2026-04-20T09:14:47Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;On &amp;#039;&amp;#039;&amp;#039;April 14th&amp;#039;&amp;#039;&amp;#039;, &amp;#039;&amp;#039;&amp;#039;2026&amp;#039;&amp;#039;&amp;#039;, AMD published &amp;#039;&amp;#039;&amp;#039;AMD-SB-7054&amp;#039;&amp;#039;&amp;#039; Security Bulletins &amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7054.html Incorrect use of LocateProtocol Service of the EFI_BOOT_Services table in SMI Handler – April 2026] (www.amd.com/en/resources/product-security)&amp;lt;/ref&amp;gt;, &amp;#039;&amp;#039;&amp;#039;AMD-SB-3034&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3034.html SEV-SNP Routing Misconfiguration – April 2026] (www.amd...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;On &amp;#039;&amp;#039;&amp;#039;April 14th&amp;#039;&amp;#039;&amp;#039;, &amp;#039;&amp;#039;&amp;#039;2026&amp;#039;&amp;#039;&amp;#039;, AMD published &amp;#039;&amp;#039;&amp;#039;AMD-SB-7054&amp;#039;&amp;#039;&amp;#039; Security Bulletins &amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7054.html Incorrect use of LocateProtocol Service of the EFI_BOOT_Services table in SMI Handler – April 2026] (www.amd.com/en/resources/product-security)&amp;lt;/ref&amp;gt;, &amp;#039;&amp;#039;&amp;#039;AMD-SB-3034&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3034.html SEV-SNP Routing Misconfiguration – April 2026] (www.amd.com/en/resources/product-security)&amp;lt;/ref&amp;gt; and &amp;#039;&amp;#039;&amp;#039;AMD-SB-3016&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref&amp;gt;[https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3016.html IOMMU Write Buffer Vulnerability – April 2026] (www.amd.com/en/resources/product-security)&amp;lt;/ref&amp;gt; containing a security vulnerability each. This article contains tables listing measures to address the security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Affected systems ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD Threadripper systems:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* systems with AMD Ryzen Threadripper PRO 3000WX processors&lt;br /&gt;
* systems with AMD Ryzen Threadripper PRO 5000WX processors&lt;br /&gt;
* systems with AMD Ryzen Threadripper 7000 / PRO 7000WX processors&lt;br /&gt;
* systems with AMD Ryzen Threadripper 9000 / PRO 9000WX processors&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC systems:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* systems with &amp;quot;Zen 4&amp;quot; [[AMD EPYC 4004 Raphael]] processors&lt;br /&gt;
* systems with &amp;quot;Zen 2&amp;quot; [[AMD EPYC 7002 Rome]] processors&lt;br /&gt;
* systems with &amp;quot;Zen 3&amp;quot; [[AMD EPYC 7003 Milan]] processors&lt;br /&gt;
* systems with &amp;quot;Zen 4&amp;quot; [[AMD EPYC 9004 Genoa und Bergamo]] &amp;amp; 8004 Siena processors&lt;br /&gt;
* systems with &amp;quot;Zen 5&amp;quot; [[AMD EPYC 9005 Turin]] processors&lt;br /&gt;
&lt;br /&gt;
== Solution for the problem == &lt;br /&gt;
&lt;br /&gt;
Here is a table listing the relevant CVEs and corrective measures for each EPYC generation, where available.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 4004 Raphael&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54502 CVE-2025-54502]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.1 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ComboAM5PI 1.0.0.d (2025-11-12)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 7002 Rome&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54502 CVE-2025-54502]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.1 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |RomePI 1.0.0.P (2025-11-04)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 7003 Milan:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
!SEV FW&lt;br /&gt;
!TCB‑Wert for SEV‑certification&lt;br /&gt;
!TCB‑Wert for SNP‑certification&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54502 CVE-2025-54502]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.1 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |MilanPI 1.0.0.J (2025-12-15)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54510 CVE-2025-54510]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |MilanPI 1.0.0.J (2025-12-15)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[SNP]&amp;gt;=0x1D &lt;br /&gt;
mitigation bit = 4&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-20585 CVE-2023-20585]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.6 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | MilanPI 1.0.0.H (2025-09-04) + OS update&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | SEV FW 1.37.23 + OS update&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[SNP]&amp;gt;=0x1B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 8004 Siena:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
!SEV FW&lt;br /&gt;
!TCB‑Wert for SEV‑certification&lt;br /&gt;
!TCB‑Wert for SNP‑certification&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54502 CVE-2025-54502]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.1 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |GenoaPI 1.0.0.H (2025-12-15) &lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54510 CVE-2025-54510]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |GenoaPI 1.0.0.H (2025-12-15)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[SNP]&amp;gt;=0x1C&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-20585 CVE-2023-20585]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.6 (Mittel)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | GenoaPI_1.0.0.G (2025-06-27) + OS update&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | SEV FW 1.37.31 + OS update&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[SNP]&amp;gt;=0x1B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 9004 Genoa:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
!SEV FW&lt;br /&gt;
!TCB‑Wert für die SEV‑certification&lt;br /&gt;
!TCB‑Wert für die SNP‑certification&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54502 CVE-2025-54502]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.1 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |GenoaPI 1.0.0.H (2025-12-15) &lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54510 CVE-2025-54510]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |GenoaPI 1.0.0.H (2025-12-15)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[SNP]&amp;gt;=0x1C&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-20585 CVE-2023-20585]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.6 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | GenoaPI_1.0.0.G (2025-06-27) + OS update&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | SEV FW 1.37.31 + OS update&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[SNP]&amp;gt;=0x1B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;AMD EPYC 9005 Turin / Turin Dense&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Security vulnerability&lt;br /&gt;
!Risk potential:&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
!SEV FW&lt;br /&gt;
!TCB‑Wert für die SEV‑certification&lt;br /&gt;
!TCB‑Wert für die SNP‑certification&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54502 CVE-2025-54502]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |7.1 (high)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TurinPI 1.0.0.9 (2025-12-31) &lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-54510 CVE-2025-54510]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |5.9 (medium)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TurinPI 1.0.0.8 (2025-11-26)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |TCB[SNP]&amp;gt;=0x5&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |N/A&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Table from [https://www.cve.org/CVERecord?id=CVE-2025-54502 CVE-2025-54502] affected Threadripper processors:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!CPU&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;AGESA version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |AMD Ryzen Threadripper PRO 3000WX&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ChagallWSPI-sWRX8 1.0.0.D (2025-11-04)&lt;br /&gt;
CastlePeakWSPI-sWRX8 1.0.0.I (2025-10-17)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |AMD Ryzen Threadripper PRO 5000WX&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ChagallWSPI-sWRX8 1.0.0.D (2025-11-04)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |AMD Ryzen Threadripper 7000&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |AMD Ryzen Threadripper PRO 7000WX&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)&lt;br /&gt;
StormPeakPI-SP6 1.0.0.1m (2025-12-01)&lt;br /&gt;
&lt;br /&gt;
StormPeakPI-SP6_1.1.0.0k (2025-12-01)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |AMD Ryzen Threadripper 9000&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |AMD Ryzen Threadripper PRO 9000WX&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |ShimadaPeakPI-SP6 1.0.0.1c (2025-10-21)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Supermicro Security Bulletins were published on security vulnerabilities. A list with BIOS-versions of the respective mainboards, to close the gaps, is also included. Below is an extract from this table, which lists all the motherboards available from Thomas-Krenn: &amp;lt;ref&amp;gt;[https://www.supermicro.com/en/support/security_center#!advisories Supermicro Security Center] (www.supermicro.com)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!AMD motherboard &lt;br /&gt;
! align=&amp;quot;center&amp;quot; |&amp;#039;&amp;#039;&amp;#039;BIOS version&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H12SSW-iN/NT&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.6&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H12SSL-i/C/CT/NT&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.6&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H12DSi-N6/NT6&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.6&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H13SSW&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.9&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |H13SSL-N/NC&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |3.9&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Updates on Thomas-Krenn products ===&lt;br /&gt;
Updates on the respective system can be found in the &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;440&amp;quot;&amp;gt;  Thomas-Krenn download area&amp;lt;/tklink&amp;gt;.&lt;br /&gt;
The versions in the download area have been tested by us to guarantee the stability and compatibility of our systems.&lt;br /&gt;
&lt;br /&gt;
If you require the latest version for your system and it is not yet available in our download area, you can get it at [https://www.asus.com/de/support/download-center/ Asus] or [https://www.supermicro.com/en/support/resources/downloadcenter/swdownload Supermicro].&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Thomas-Krenn.AG}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:AMD Safety Information]]&lt;br /&gt;
[[de:AMD Sicherheitslücken - April 2026]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Windows_Secure_Boot_certificate_expiry</id>
		<title>Windows Secure Boot certificate expiry</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Windows_Secure_Boot_certificate_expiry"/>
		<updated>2026-04-17T08:13:04Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: /* Which certificates are affected? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In this article, we explain how to read out the secure boot certificate.&lt;br /&gt;
&lt;br /&gt;
The previous certificates have been issued in 2011 which expire this year. &lt;br /&gt;
&lt;br /&gt;
== Which certificates are affected? ==&lt;br /&gt;
Definitions:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;KEK:&amp;#039;&amp;#039;&amp;#039; Key Enrollment Key&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;CA:&amp;#039;&amp;#039;&amp;#039; Certificate Authority&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;DB:&amp;#039;&amp;#039;&amp;#039; Secure Boot Signature Database&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;DBX:&amp;#039;&amp;#039;&amp;#039; Secure Boot Revoked Signature Database&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Summary table &lt;br /&gt;
!Expiring certificates&lt;br /&gt;
!Expiry date &lt;br /&gt;
!New certificate&lt;br /&gt;
!Location&lt;br /&gt;
!Purpose&lt;br /&gt;
|-&lt;br /&gt;
|&amp;#039;&amp;#039;&amp;#039;Microsoft Corporation KEK CA 2011&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|June 2026&lt;br /&gt;
|Microsoft Corporation KEK 2K CA 2023&lt;br /&gt;
|Stored in KEK &lt;br /&gt;
|Signes updates for DB and DBX. &lt;br /&gt;
|-&lt;br /&gt;
|&amp;#039;&amp;#039;&amp;#039;Microsoft Windows Production PCA 2011&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|October 2026&lt;br /&gt;
|Windows UEFI CA 2023&lt;br /&gt;
|Stored in data base&lt;br /&gt;
|Used for signing of the Windows boot loader. &lt;br /&gt;
|-&lt;br /&gt;
|&amp;#039;&amp;#039;&amp;#039;Microsoft UEFI CA 2011&amp;#039;&amp;#039;*&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|June 2026&lt;br /&gt;
|Microsoft UEFI CA 2023&lt;br /&gt;
|Stored in data base &lt;br /&gt;
|Signs boot loaders from third-party providers and EFI applications.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;#039;&amp;#039;&amp;#039;Microsoft UEFI CA 2011&amp;#039;&amp;#039;*&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|June 2026&lt;br /&gt;
|Microsoft Option ROM UEFI CA 2023&lt;br /&gt;
|Stored in data base &lt;br /&gt;
|Signs third-party Option ROMs&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;During the renewal of the Microsoft Corporation UEFI CA 2011 certificate, two certificates separate the bootloader signature from the Option ROM signature. &lt;br /&gt;
&lt;br /&gt;
This enables precise control over the system trust. Systems, that trust Option-ROMs, can, for example, add the Microsoft option ROM UEFI CA 2023 without granting a trusted status to third-party bootloaders.&lt;br /&gt;
&lt;br /&gt;
== What happens if my certificate expires? ==&lt;br /&gt;
&lt;br /&gt;
Windows starts and functions as usual. Updates can still be downloaded and installed. &lt;br /&gt;
&lt;br /&gt;
However, updates cannot be installed for the early boot process. This concerns the Windows Boot Manager, Secure Boot data base and Revocation lists or fixes for new discovered boot level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
These effects reduce the protection of the devices against impending dangers, which rely on Secure Boot, such as BitLocker Hardening or third-party bootloaders. &lt;br /&gt;
&lt;br /&gt;
== How do I verify my certificates == &lt;br /&gt;
&lt;br /&gt;
The validity of the installed certificates can be checked using the Windows Security app. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Windows-Security&amp;gt; Equipment Safety &amp;gt; Safe Start&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
There are three possible scenarios.&lt;br /&gt;
&lt;br /&gt;
=== Scenario 1: Everything is completely updated (green tick) ===&lt;br /&gt;
All certificate updates were applied. &lt;br /&gt;
&lt;br /&gt;
=== Scenario 2: No update has been installed yet (yellow warning symbol) ===&lt;br /&gt;
Automatic updates are not available. The hardware manufacturer must be contacted. &lt;br /&gt;
&lt;br /&gt;
=== Scenario 3: Action is required (Red X) ===&lt;br /&gt;
The device cannot receive required updates. &lt;br /&gt;
&lt;br /&gt;
If a Windows Update is missing, this menu option may not display any information about the certificates.&lt;br /&gt;
&lt;br /&gt;
In this case, the certificate can be read out manually with a workaround. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
With the following powershell command, the certificates can be stored as .bin in any location.&amp;lt;syntaxhighlight lang=&amp;quot;powershell&amp;quot;&amp;gt;&lt;br /&gt;
$var = Get-SecureBootUEFI -Name db; [System.IO.File]::WriteAllBytes(&amp;quot;C:\Users\Administrator\Documents\db.bin&amp;quot;, $var.Bytes)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;This path can be customized as required.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After this, the db.bin file must be divided on a Linux system (for example WSL) with the efitools.&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
sudo apt update &amp;amp;&amp;amp; apt install efitools&lt;br /&gt;
sudo sig-list-to-certs db.bin cert&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now, 5 certificates have been created in the current directory: cert-0.der cert-1.der cert-2.der cert-3.der cert-4.der&lt;br /&gt;
&lt;br /&gt;
The content of these certificates can be read out with Openssl.&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
openssl x509 -in cert-0.der -inform DER -text -noout&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
The file name &amp;quot;cert-0.der&amp;quot; must be adapted to the respective certificate.&lt;br /&gt;
&lt;br /&gt;
The line Validity is important. If this line displays the following value, the certificate expires in June 2026:&lt;br /&gt;
&lt;br /&gt;
Validity&lt;br /&gt;
&lt;br /&gt;
            Not Before: Jun 27 21:22:45 2011 GMT&lt;br /&gt;
&lt;br /&gt;
            Not After : Jun 27 21:32:45 2026 GMT&lt;br /&gt;
&lt;br /&gt;
==How do I update my certificates? ==&lt;br /&gt;
&lt;br /&gt;
There are multiple ways to update the certificate. The simplest and best method is to update the BIOS, as the hardware manufacturer has already incorporated the new certificates.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* [https://support.microsoft.com/en-us/topic/windows-secure-boot-certificate-expiration-and-ca-updates-7ff40d33-95dc-4c3c-8725-a9b95457578e Windows Secure Boot certificate expiration and CA updates] (support.microsoft.com)&lt;br /&gt;
* [https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-secure-boot-key-creation-and-management-guidance?view=windows-11#14-signature-databases-db-and-dbx Windows Secure Boot Key Creation and Management Guidance] (learn.microsoft.com)&lt;br /&gt;
* [https://support.microsoft.com/en-us/topic/it-admin-guide-secure-boot-certificate-update-status-in-the-windows-security-app-fb8e2121-4402-433b-af8b-623760951fdb IT admin guide: Secure Boot certificate update status in the Windows Security app] (support.microsoft.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Bstockinger}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[de:Windows Secure Boot Zertifikat Ende der Gültigkeit]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Activation_of_Q-Feeds_webinterface_and_licenses</id>
		<title>Activation of Q-Feeds webinterface and licenses</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Activation_of_Q-Feeds_webinterface_and_licenses"/>
		<updated>2026-04-16T08:54:06Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;Q-Feeds, the cybersecurity plugin, provides a Cloud platform with a variety of information. With this, licenses can be added to the own account and tokens can be created for devices such as OPNsense-firewalls. This article shows how to &amp;#039;&amp;#039;&amp;#039;add a license&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;create a token for your firewall&amp;#039;&amp;#039;&amp;#039; in the &amp;#039;&amp;#039;&amp;#039;Q-Feeds Threat Intelligence Platform v2.3&amp;#039;&amp;#039;&amp;#039;.  {{#widget:Imagebox-left|link={{#tklink:type=sitex|id=21563|linkonly=1}}|image=/de/wikiDE/images/8/84/Q-Feeds-Sh...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Q-Feeds]], the cybersecurity plugin, provides a Cloud platform with a variety of information. With this, licenses can be added to the own account and tokens can be created for devices such as [[OPNsense]]-firewalls. This article shows how to &amp;#039;&amp;#039;&amp;#039;add a license&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;create a token for your firewall&amp;#039;&amp;#039;&amp;#039; in the &amp;#039;&amp;#039;&amp;#039;Q-Feeds Threat Intelligence Platform v2.3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
{{#widget:Imagebox-left|link={{#tklink:type=sitex|id=21563|linkonly=1}}|image=/de/wikiDE/images/8/84/Q-Feeds-Shopbanner.png|text=Click here for our Q-Feeds licenses in the Thomas-Krenn online shop|campaign=Activate Q-Feeds webinterface and license}}&lt;br /&gt;
{{#widget:SitexBox|link={{#tklink:type=sitex|id=21563|linkonly=1}}|text=Click here for our Q-Feeds licenses in the Thomas-Krenn online shop|campaign=Activate Q-Feeds webinterface and license}}&lt;br /&gt;
&lt;br /&gt;
== Cloud platform login ==&lt;br /&gt;
Log in to tip.qfeeds.com, or create a new account.&lt;br /&gt;
&lt;br /&gt;
:[[File:Q-Feeds-Webinterface-001.png|300px]]&lt;br /&gt;
&lt;br /&gt;
== Q-Feeds dashboard == &lt;br /&gt;
Now, the dashboard is displayed after the login. &lt;br /&gt;
&lt;br /&gt;
:[[File:Q-Feeds-Webinterface-002.png|300px]]&lt;br /&gt;
&lt;br /&gt;
== Add and administrate license ==&lt;br /&gt;
This paragraph shows how to activate a license and add it to your account. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Q-Feeds-Webinterface-003.png|Click on your &amp;#039;&amp;#039;account name&amp;#039;&amp;#039; in the top right-hand corner, then select &amp;#039;&amp;#039;Licenses&amp;#039;&amp;#039;.&lt;br /&gt;
File:Q-Feeds-Webinterface-004.png|Then click on the &amp;#039;&amp;#039;Activate License&amp;#039;&amp;#039; button in the top-right corner. A menu will then appear; enter the licence key and click on &amp;#039;&amp;#039;Activate License&amp;#039;&amp;#039;.&lt;br /&gt;
File:Q-Feeds-Webinterface-005.png|The license has been added and is now active. &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Create API key for terminal devices such as OPNsense firewalls ==&lt;br /&gt;
This paragraph shows how to create API keys for your OPNsense firewalls. Such a key is required for the Q-Feeds plugin on the OPNsense firewall.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Q-Feeds-Webinterface-006.png|In the dashboard, click on &amp;#039;&amp;#039;Account Settings&amp;#039;&amp;#039; in the bottom-left corner, then click on the &amp;#039;&amp;#039;API KEYS&amp;#039;&amp;#039; tab. You can now add a key using the &amp;#039;&amp;#039;Add API Key&amp;#039;&amp;#039; button. Enter a description and select a valid licence in the &amp;#039;&amp;#039;Assign License&amp;#039;&amp;#039; field. Click on &amp;#039;&amp;#039;Save Key&amp;#039;&amp;#039;.&lt;br /&gt;
File:Q-Feeds-Webinterface-007.png|The API token appears. Copy it and paste it into the OPNsense firewall using the Q-Feeds plugin.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Tniedermeier}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Q-Feeds]]&lt;br /&gt;
[[de:Q-Feeds Webinterface und Lizenz aktivieren]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Q-Feeds_Connect_Installation_under_OPNsense_26.1</id>
		<title>Q-Feeds Connect Installation under OPNsense 26.1</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Q-Feeds_Connect_Installation_under_OPNsense_26.1"/>
		<updated>2026-04-09T08:35:20Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;The Open Source Firewall OPNsense can be enhanced by integrating Q-Feeds firewall blocklists and DNS filter rules with the latest threat intelligence. This article shows how to install &amp;#039;&amp;#039;&amp;#039;Q-Feeds Connect plugin and how to create firewall rules&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Unbound DNS filter rules&amp;#039;&amp;#039;&amp;#039; under &amp;#039;&amp;#039;&amp;#039;OPNsense 26.1&amp;#039;&amp;#039;&amp;#039;.  {{#widget:Imagebox-left|link={{#tklink:type=sitex|id=21563|linkonly=1}}|image=/de/wikiDE/images/8/84/Q-Feeds-Shopbanner.png|text=Click here for our Q-Feeds Conne...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Open Source Firewall [[OPNsense]] can be enhanced by integrating Q-Feeds firewall blocklists and DNS filter rules with the latest threat intelligence. This article shows how to install &amp;#039;&amp;#039;&amp;#039;Q-Feeds Connect plugin and how to create firewall rules&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Unbound DNS filter rules&amp;#039;&amp;#039;&amp;#039; under &amp;#039;&amp;#039;&amp;#039;OPNsense 26.1&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
{{#widget:Imagebox-left|link={{#tklink:type=sitex|id=21563|linkonly=1}}|image=/de/wikiDE/images/8/84/Q-Feeds-Shopbanner.png|text=Click here for our Q-Feeds Connect licenses in the Thomas-Krenn online shop|campaign=Q-Feeds Connect installation under OPNsense 26.1 }}&lt;br /&gt;
{{#widget:SitexBox|link={{#tklink:type=sitex|id=21563|linkonly=1}}|text=Click here for our Q-Feeds Connect licenses in the Thomas-Krenn online shop|campaign=Q-Feeds Connect Einrichtung unter OPNsense 26.1}}&lt;br /&gt;
&lt;br /&gt;
== Q-Feeds Connect plugin ==&lt;br /&gt;
The Q-Feeds Connect plugin can be installed as Plugin at OPNsense. &lt;br /&gt;
&lt;br /&gt;
=== Installation of plugin === &lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:OPNsense-Q-Feeds-001.png|Go to &amp;#039;&amp;#039;System → Firmware → Plugins&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-002.png|The &amp;quot;os-q-feeds-connector&amp;quot; plugin is maintained in the OPNsense repository and can be installed directly. To install it, click on the &amp;#039;&amp;#039;&amp;#039;+&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-003.png|Q-Feeds Connect has been installed.&lt;br /&gt;
File:OPNsense-Q-Feeds-004.png|Click on the button to reload the browser. &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Configuration of plugin ===&lt;br /&gt;
The plugin has been installed and the configuration can now be made.&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:OPNsense-Q-Feeds-005.png|Click on the new menu option &amp;#039;&amp;#039;Security&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-006.png|After this, go to &amp;#039;&amp;#039;Q-Feeds Connect&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-007.png|The settings are configured in the Settings tab.&lt;br /&gt;
File:OPNsense-Q-Feeds-008.png|State you API-key. Set the box next to  &amp;#039;&amp;#039;&amp;#039;Register domain feeds&amp;#039;&amp;#039;&amp;#039;, to activate the Unbound DNS blocklists from Q-Feeds. After this, click on &amp;#039;&amp;#039;Apply&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-009.png|In the &amp;#039;&amp;#039;&amp;#039;Feeds&amp;#039;&amp;#039;&amp;#039; tab, the loaded IP-addresses and domain names are listed. &lt;br /&gt;
File:OPNsense-Q-Feeds-010.png|Events tab. &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Firewall Maximum Table Entries adjustments ===&lt;br /&gt;
The maximum number of Firewall Maximum Table Entries can be adjusted optionally. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:OPNsense-Q-Feeds-011.png|Switch to the menu &amp;#039;&amp;#039;Firewall → Settings → Advanced&amp;#039;&amp;#039; and scroll to   &amp;#039;&amp;#039;&amp;#039;Firewall Maximum Table Entries&amp;#039;&amp;#039;&amp;#039;. Adjust the default value if necessary. &lt;br /&gt;
File:OPNsense-Q-Feeds-012.png|The current number of entries can be considered in the menu &amp;#039;&amp;#039;Firewall → Aliases&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-013.png|A Q-Feeds Alias has been created. &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Q-Feeds firewall rule configuration ==&lt;br /&gt;
After installation and configuration of the plugin, the firewall rules can be set. In this example, the Q-Feeds blocklist is activated on the LAN and WAN interface. &lt;br /&gt;
&lt;br /&gt;
=== Block rule for outbound traffic on the LAN interface ===&lt;br /&gt;
For a LAN interface, a suitable rule would be one that blocks all incoming LAN traffic destined for addresses included in the block list.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:OPNsense-Q-Feeds-029.png|Go to the menu Firewall → Rules [new] and click on the &amp;#039;&amp;#039;&amp;#039;+&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-030.png|State a description and assign the &amp;#039;&amp;#039;&amp;#039;LAN&amp;#039;&amp;#039;&amp;#039; interface to the rule.  &lt;br /&gt;
File:OPNsense-Q-Feeds-031.png|Select &amp;#039;&amp;#039;Block on Action.&amp;#039;&amp;#039; &lt;br /&gt;
File:OPNsense-Q-Feeds-032.png|Destination is the Alias &amp;#039;&amp;#039;&amp;#039;__qfeeds_malware_ip&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-033.png|Click on &amp;#039;&amp;#039;Save&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-034.png|Activate the checkbox before the new rule and click on the arrow at Allow from LAN rule.  Therefore, the block rule is processed before the allow rule. &lt;br /&gt;
File:OPNsense-Q-Feeds-035.png|Click on &amp;#039;&amp;#039;&amp;#039;Apply&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Block rule for incoming traffic on the WAN interface ===&lt;br /&gt;
For a WAN interface, a suitable rule would be one that blocks all incoming WAN traffic from source IP addresses included in the Q-Feeds blocklist.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:OPNsense-Q-Feeds-036.png|Go to the menu Firewall → Rules [new] and click on the &amp;#039;&amp;#039;&amp;#039;+&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-037.png|State a description and assign the &amp;#039;&amp;#039;&amp;#039;WAN&amp;#039;&amp;#039;&amp;#039; interface to the rule. &lt;br /&gt;
File:OPNsense-Q-Feeds-038.png|On Action, select &amp;#039;&amp;#039;Block&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-039.png|Alias is the source &amp;#039;&amp;#039;&amp;#039;__qfeeds_malware_ip&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-040.png|Click on &amp;#039;&amp;#039;Save&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-041.png|Tick the box next to the new rule and click the arrow next to the Allow from WAN net rule. Therefore, the block rule is processed before the allow rule. &lt;br /&gt;
File:OPNsense-Q-Feeds-042.png|Click on &amp;#039;&amp;#039;&amp;#039;Apply&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== More settings on Unbound DNS ==&lt;br /&gt;
With Q-Feeds Plus (only OSINT) and Premium (OSINT and Paid), DNS requests can be filtered with the Unbound DNS. The DNS filter rule are activated automatically. &lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:OPNsense-Q-Feeds-027.png|You can activate the Unbound DNS reporting. Click on &amp;#039;&amp;#039;Reporting → Settings&amp;#039;&amp;#039; and allow the local collection of statistics on Unbound. Click on &amp;#039;&amp;#039;Save&amp;#039;&amp;#039;.&lt;br /&gt;
File:OPNsense-Q-Feeds-028.png|The size of the blocklist is now displayed. &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Tniedermeier}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Q-Feeds]]&lt;br /&gt;
[[de:Q-Feeds Connect Einrichtung unter OPNsense 26.1]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Q-Feeds_Versions:_Feature_Comparison</id>
		<title>Q-Feeds Versions: Feature Comparison</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Q-Feeds_Versions:_Feature_Comparison"/>
		<updated>2026-04-08T08:12:15Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;Next-Generation-Firewalls (NGFWs) are important tools to protect networks. You can filter DNS and web traffic using external dynamic lists of threat indicators, known as Indicators of Compromise (IoCs). Q-Feeds provides dynamic and updated lists of these IoCs that were specifically designed for use with security controls such as NGFWs. By adding Q-Feeds as a plugin to OPNsense firewalls, you can enhance protection against new and emerging threats. This means that OPN...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Next-Generation-Firewalls (NGFWs) are important tools to protect networks. You can filter DNS and web traffic using external dynamic lists of threat indicators, known as Indicators of Compromise (IoCs). Q-Feeds provides dynamic and updated lists of these IoCs that were specifically designed for use with security controls such as NGFWs. By adding Q-Feeds as a plugin to [[OPNsense]] firewalls, you can enhance protection against new and emerging threats. This means that OPNsense can stay up to date with the latest threat intelligence to filter out malicious traffic. This article shows &amp;#039;&amp;#039;&amp;#039;different Q-Feeds licenses&amp;#039;&amp;#039;&amp;#039; with its features &amp;#039;&amp;#039;&amp;#039;presented in a table for comparison&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
{{#widget:Imagebox-left|link={{#tklink:type=sitex|id=21563|linkonly=1}}|image=/de/wikiDE/images/8/84/Q-Feeds-Shopbanner.png|text=Click here to view Q-Feeds Connect licenses in the Thomas-Krenn online shop|campaign=Q-Feeds Versions: Feature Comparison}}&lt;br /&gt;
{{#widget:SitexBox|link={{#tklink:type=sitex|id=21563|linkonly=1}}|text=Click here to view Q-Feeds Connect licenses in the Thomas-Krenn online shop|campaign=Q-Feeds Versions: Feature Comparison}}&lt;br /&gt;
&lt;br /&gt;
== Q-Feeds versions ==&lt;br /&gt;
This table shows three Q-Feeds licenses with its features and differences. &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Q-Feeds Versionen Eigenschaften und Unterschiede&lt;br /&gt;
!&lt;br /&gt;
!Feature&lt;br /&gt;
!Community Edition&lt;br /&gt;
!Plus&lt;br /&gt;
!Premium&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;8&amp;quot; |Services&lt;br /&gt;
|Active Support&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
|Easy Integration&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
|Curated data&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
|Update frequency&lt;br /&gt;
|delayed by 7 days&lt;br /&gt;
|delayed by 4 hours&lt;br /&gt;
|every 20 minutes&lt;br /&gt;
|-&lt;br /&gt;
|IoC (indicators of compromise) lookup&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
|[https://qfeeds.com/external-attack-surface-management-easm/?srsltid=AfmBOooV-Qo_q4fAO0jWsdbrFjMqRpUGMmKDZnZBOSFYMCfDXFBnFI5U EASM (External Attack Service Management)]&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
|1 scan per week&lt;br /&gt;
|1 scan per day&lt;br /&gt;
|-&lt;br /&gt;
|[https://qfeeds.com/darkweb-monitoring/?srsltid=AfmBOoo6ZXk6TLFtXnFutk_4XD-mwwPRO-pHzSWMI2N9L7yr8Fqd66dz Dark web monitoring]&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
|[https://qfeeds.com/brand-protection-phishing-detection/?srsltid=AfmBOoqTwqgD2DpEVUpBH_8nQ6JstPjBqgQjxcaOqeHBh0uPE07wC1Ed Brand Protection]&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |OSINT (Open-Source Intelligence)&lt;br /&gt;
|IP&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
|DNS&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Paid&lt;br /&gt;
|IP&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|-&lt;br /&gt;
|DNS&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|-&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|&amp;amp;#x2714;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Tniedermeier}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Q-Feeds]]&lt;br /&gt;
[[de:Q-Feeds Versionen Featurevergleich]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Cloud_Computing_Concepts</id>
		<title>Cloud Computing Concepts</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Cloud_Computing_Concepts"/>
		<updated>2026-04-02T08:24:19Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;The term &amp;#039;&amp;#039;&amp;#039;Cloud&amp;#039;&amp;#039;&amp;#039;—actually cloud computing—is a term for various concepts related to the delivery of IT services. These can be broadly divided into three categories and classified using the cloud computing stack. This article provides an overview of these concepts.   == Cloud Computing Stack == file:Cloud Computing Stack.jpg|250px|thumb|right|Cloud Computing Stack.&amp;lt;ref&amp;gt;[http://oracle-help.com/oracle-cloud/...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The term &amp;#039;&amp;#039;&amp;#039;Cloud&amp;#039;&amp;#039;&amp;#039;—actually [[:Category:Cloud Computing|cloud computing]]—is a term for various concepts related to the delivery of IT services. These can be broadly divided into three categories and classified using the [[#Cloud Computing Stack|cloud computing stack]]. This article provides an overview of these concepts.&lt;br /&gt;
 &lt;br /&gt;
== Cloud Computing Stack ==&lt;br /&gt;
[[file:Cloud Computing Stack.jpg|250px|thumb|right|Cloud Computing Stack.&amp;lt;ref&amp;gt;[http://oracle-help.com/oracle-cloud/cloud-computing-stack-saas-paas-iaas/ WHAT IS CLOUD COMPUTING STACK (SAAS, PAAS, IAAS)] (oracle-help.com)&amp;lt;/ref&amp;gt;]] &lt;br /&gt;
This section describes the various cloud concepts using the cloud computing stack. The cloud computing stack illustrates these concepts through the components of externally managed services that are hosted services.&lt;br /&gt;
&lt;br /&gt;
=== Infrastructure as a Service (IaaS) ===&lt;br /&gt;
In this concept, the server infrastructure is managed by the cloud service provider (CSP). All components (CPU, [[RAM Basics|RAM]], storage, network) are already virtualized and can be freely allocated by the user. The user has full control over resource usage, meaning that CPU cores, RAM, and storage can be adjusted at any time as needed. Since the infrastructure is a virtualized environment and is typically designed to be redundant, it is impossible to determine on which hardware within a data center the infrastructure is currently running (exceptions are [[Virtual Location|Virtual Locations]]—not to be confused with [[Virtual Private Cloud|VPCs]]).&lt;br /&gt;
&lt;br /&gt;
The user is solely responsible for the maintenance and support of all software, including the operating system (this also includes proper licensing).&lt;br /&gt;
&lt;br /&gt;
Many service providers operate multiple data centers, giving users the ability to choose the geographic location of their data.&lt;br /&gt;
&lt;br /&gt;
==== Benefits ====&lt;br /&gt;
Since IaaS allows for the rapid migration of virtual machines and applications without refactoring&amp;lt;ref&amp;gt;[https://de.wikipedia.org/wiki/Refactoring Refactoring] (de.wikipedia.org) &amp;lt;/ref&amp;gt; (see also [[Lift and Shift Migration|Lift &amp;amp; Shift]]), it is a particularly good option for time-critical IT migrations to the cloud (for example, when discontinuing colocation in a data center). Using an IaaS platform can also be worthwhile for purpose-specific applications that do not require 24-hour operation.&lt;br /&gt;
&lt;br /&gt;
=== Platform as a Service (PaaS) ===&lt;br /&gt;
In addition to the infrastructure, this cloud concept also provides the operating system and runtime environment. As a user, you are only responsible for managing the data within the applications. Specifically, this means that a database pre-installed by the service provider (MySQL, Oracle, Postgres, etc.) is used to develop and deploy your own applications. One advantage for developers is that performance can be scaled dynamically.&lt;br /&gt;
&lt;br /&gt;
Unlike IaaS, there is no longer a need to create a virtual environment.&lt;br /&gt;
&lt;br /&gt;
==== Benefits ====&lt;br /&gt;
&lt;br /&gt;
This approach is particularly beneficial for web developers—such as those in the e-commerce sector or other service providers—as it allows them to focus on application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software as a Service (SaaS) ===&lt;br /&gt;
SaaS is arguably the best-known model for online services. This is because it has also found its way into the consumer market and is used on a regular basis.&lt;br /&gt;
&lt;br /&gt;
With SaaS, the entire stack—from the hardware to the finished application—is provided as a ready-made solution.&lt;br /&gt;
&lt;br /&gt;
==== Benefits ====&lt;br /&gt;
SaaS offerings are a resource-efficient alternative, as they eliminate the need for personnel and time to manage hardware and software.&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://www.isbn-suchen.de/search.php?q=978-3-446-46184-0 IT-Management Guide: Concepts, Methods, Solutions and Resources for practical use] (ISBN 978-3-446-46184-0, 7. revised edition (9. März 2020)), Chapter 7: Cloud Computing&lt;br /&gt;
* [https://www.linkedin.com/pulse/20140730172610-9679881-pizza-as-a-service/ Pizza as a Service] (linkedin.com/pulse, Albert Barron, 30.07.2014)&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Sbohn}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Cloud Computing]]&lt;br /&gt;
[[de:Cloud Computing Konzepte]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Boot-Device_Replacement_-_Change_of_Proxmox_ZFS_Mirror_Disk</id>
		<title>Boot-Device Replacement - Change of Proxmox ZFS Mirror Disk</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Boot-Device_Replacement_-_Change_of_Proxmox_ZFS_Mirror_Disk"/>
		<updated>2026-03-26T12:45:09Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;These instructions describe the &amp;#039;&amp;#039;&amp;#039;change of a boot device&amp;#039;&amp;#039;&amp;#039; in a &amp;#039;&amp;#039;&amp;#039;Proxmox VE (PVE) host system&amp;#039;&amp;#039;&amp;#039; &amp;#039;&amp;#039;&amp;#039;with ZFS-mirror&amp;#039;&amp;#039;&amp;#039;. This change is necessary, when a disk is damaged or has failed in the compound. In this article, it is explained what to do after a system hard drive failure. Options for different boot-loaders (&amp;quot;GRUB&amp;quot; or &amp;quot;systemd-boot&amp;quot;) are explained. Furthermore, it is explained how to change a hard drive within a PVE so that the used mirror is completely &amp;#039;&amp;#039;o...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These instructions describe the &amp;#039;&amp;#039;&amp;#039;change of a boot device&amp;#039;&amp;#039;&amp;#039; in a &amp;#039;&amp;#039;&amp;#039;[[Proxmox VE]] (PVE) host system&amp;#039;&amp;#039;&amp;#039; &amp;#039;&amp;#039;&amp;#039;with ZFS-mirror&amp;#039;&amp;#039;&amp;#039;. This change is necessary, when a disk is damaged or has failed in the compound. In this article, it is explained what to do after a system hard drive failure. Options for different boot-loaders (&amp;quot;GRUB&amp;quot; or &amp;quot;systemd-boot&amp;quot;) are explained. Furthermore, it is explained how to change a hard drive within a PVE so that the used mirror is completely &amp;#039;&amp;#039;online,&amp;#039;&amp;#039; and &amp;#039;&amp;#039;healthy&amp;#039;&amp;#039; and that the redundancy of the operating system is recreated. &lt;br /&gt;
&lt;br /&gt;
{{#widget:Imagebox-left|link={{#tklink:type=sitex|id=19702|linkonly=1}}|image=/de/wikiDE/images/d/d5/Ceph-hci-proxmox-3.png|text=Buy Proxmox optimized servers|campaign=Buy Proxmox Servers}}&lt;br /&gt;
{{#widget:SitexBox|link={{#tklink:type=sitex|id=19702|linkonly=1}}|text=Buy Proxmox optimized servers|campaign=campaign=Buy Proxmox Servers}}&lt;br /&gt;
&lt;br /&gt;
== Recommendation - Test environment ==&lt;br /&gt;
All described steps can be previously performed in a test environment. For this, create a &amp;#039;&amp;#039;&amp;#039;virtual machine in Proxmox VE&amp;#039;&amp;#039;&amp;#039; and install PVE on a ZFS RAID-1.&lt;br /&gt;
&lt;br /&gt;
Therefore, you gain experience in this process and lower the risk for your productive system.&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
This paragraph summarizes the commands that are necessary for changing your data carrier and its influence on your system in brief. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Attention: It is highly recommended to read the detailed instructions if it is your first time performing this process or are still inexperienced in administering Proxmox VE systems!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
#Identify the faulty storage device and change it.&lt;br /&gt;
#Copy partition layout of the &amp;#039;&amp;#039;healthy&amp;#039;&amp;#039; disk on the &amp;#039;&amp;#039;exchange&amp;#039;&amp;#039; disk (and randomize the GUID)&lt;br /&gt;
#Find the ZFS partition using the volume ID (&amp;lt;code&amp;gt;Solaris /usr &amp;amp; Apple ZFS&amp;lt;/code&amp;gt;)&lt;br /&gt;
#Copy partition of the &amp;#039;&amp;#039;new&amp;#039;&amp;#039; disk into the &amp;#039;&amp;#039;zpool&amp;#039;&amp;#039;&lt;br /&gt;
#Finalize exchange with &amp;lt;code&amp;gt;proxmox-boot-tool&amp;lt;/code&amp;gt; &lt;br /&gt;
Once you have completed all the steps correctly, your ZFS will be &amp;quot;online&amp;quot;, &amp;quot;healthy&amp;quot;, and &amp;quot;boot-safe&amp;quot; again.&lt;br /&gt;
&lt;br /&gt;
== Identify failed data carrier ==&lt;br /&gt;
First, you need to identify the failed disk and its name in your PVE system. This can be made, for example, with the &amp;lt;code&amp;gt;lsblk&amp;lt;/code&amp;gt; command.&lt;br /&gt;
&lt;br /&gt;
=== Before failure ===&lt;br /&gt;
After installation, two boot disks are available (&amp;#039;&amp;#039;sda&amp;#039;&amp;#039; and &amp;#039;&amp;#039;sdb&amp;#039;&amp;#039;):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve-virtual-01:~# lsblk&lt;br /&gt;
NAME   MAJ:MIN RM   SIZE RO TYPE MOUNTPOINT&lt;br /&gt;
sda      8:0    0   100G  0 disk&lt;br /&gt;
├─sda1   8:1    0  1007K  0 part&lt;br /&gt;
├─sda2   8:2    0   512M  0 part&lt;br /&gt;
└─sda3   8:3    0  99.5G  0 part&lt;br /&gt;
sdb      8:16   0   100G  0 disk&lt;br /&gt;
├─sdb1   8:17   0  1007K  0 part&lt;br /&gt;
├─sdb2   8:18   0   512M  0 part&lt;br /&gt;
└─sdb3   8:19   0  99.5G  0 part&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== After failure ===&lt;br /&gt;
In this test scenario, the &amp;#039;&amp;#039;sda&amp;#039;&amp;#039; hard drive has failed. It is missing in the &amp;lt;code&amp;gt;lsblk&amp;lt;/code&amp;gt; output after the failure:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve-virtual-01:~# lsblk&lt;br /&gt;
NAME   MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT&lt;br /&gt;
sdb      8:16   0  100G  0 disk&lt;br /&gt;
├─sdb1   8:17   0 1007K  0 part&lt;br /&gt;
├─sdb2   8:18   0  512M  0 part&lt;br /&gt;
└─sdb3   8:19   0 99.5G  0 part&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Important&amp;#039;&amp;#039;&amp;#039;:  When replacing a data storage device, the descriptions may change. &amp;#039;&amp;#039;&amp;#039;Always verify the exact name immediately after replacing the damaged storage device with a new one!&amp;#039;&amp;#039;&amp;#039; A faulty specification of the name could irreparably damage your system in the next steps.&lt;br /&gt;
&lt;br /&gt;
== Copy partition layout == &lt;br /&gt;
This information can be always found in the current Proxmox VE documentation. &amp;lt;ref&amp;gt;[https://pve.proxmox.com/pve-docs/pve-admin-guide.html#chapter_zfs ZFS on Linux] (pve.proxmox.com) Abschnitt &amp;#039;&amp;#039;Changing a failed device&amp;#039;&amp;#039; im Unterkapitel 3.8.5.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# sgdisk &amp;lt;healthy bootable device&amp;gt; -R &amp;lt;new device&amp;gt;&lt;br /&gt;
# sgdisk -G &amp;lt;new device&amp;gt;&lt;br /&gt;
# zpool replace -f &amp;lt;pool&amp;gt; &amp;lt;old zfs partition&amp;gt; &amp;lt;new zfs partition&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The new data carrier is in the system and does not have a partition layout yet. However, we require the partitions so that the system can boot properly and that we can provide two technically identic data carriers for the ZFS: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve-virtual-01:~# lsblk&lt;br /&gt;
NAME   MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT&lt;br /&gt;
sda      8:0    0  100G  0 disk&lt;br /&gt;
sdb      8:16   0  100G  0 disk&lt;br /&gt;
├─sdb1   8:17   0 1007K  0 part&lt;br /&gt;
├─sdb2   8:18   0  512M  0 part&lt;br /&gt;
└─sdb3   8:19   0 99.5G  0 part&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We now copy the partition layout from the &amp;#039;&amp;#039;healthy&amp;#039;&amp;#039; data carrier to the &amp;#039;&amp;#039;new&amp;#039;&amp;#039; data carrier.&lt;br /&gt;
{| {{Prettytable}} cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;margin: 1em 1em 1em 0; background: #f9f9f9; border: 1px #a0a0a0 solid; border-collapse: collapse; &amp;quot; rules=&amp;quot;all&amp;quot;&lt;br /&gt;
| Please note once again that you MUST first identify the correct device name (&amp;#039;&amp;#039;device-name&amp;#039;&amp;#039;) using (&amp;#039;&amp;#039;Device-Name&amp;#039;&amp;#039;) with &amp;lt;code&amp;gt;lsblk&amp;lt;/code&amp;gt;. Otherwise, you risk ending up with a broken Proxmox VE system, as the partition layout of the &amp;quot;new&amp;quot; disk might be accidentally replicated to the &amp;quot;healthy&amp;quot; disk. This would result in the system being unable to boot at all, forcing you to perform a clean install.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve-virtual-01:~# sgdisk /dev/sdb -R /dev/sda&lt;br /&gt;
The operation has completed successfully.&lt;br /&gt;
&lt;br /&gt;
root@pve-virtual-01:~# lsblk&lt;br /&gt;
NAME   MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT&lt;br /&gt;
sda      8:0    0  100G  0 disk&lt;br /&gt;
├─sda1   8:1    0 1007K  0 part&lt;br /&gt;
├─sda2   8:2    0  512M  0 part&lt;br /&gt;
└─sda3   8:3    0 99.5G  0 part&lt;br /&gt;
sdb      8:16   0  100G  0 disk&lt;br /&gt;
├─sdb1   8:17   0 1007K  0 part&lt;br /&gt;
├─sdb2   8:18   0  512M  0 part&lt;br /&gt;
└─sdb3   8:19   0 99.5G  0 part&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since we copied the layout to the new disk, the disk and partitions now have the same GUIDs. That is why we still need to randomize them:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve-virtual-01:~# sgdisk -G /dev/sda&lt;br /&gt;
The operation has completed successfully.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Find out disk ID (by-id) ==&lt;br /&gt;
To replace the volume correctly in ZFS, we need to determine the ID of the new volume. In this case, we are looking for the volume associated with the device name sda.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve:~# ls -l /dev/disk/by-id/*&lt;br /&gt;
&lt;br /&gt;
lrwxrwxrwx 1 root root  9 Mar 16 15:11 /dev/disk/by-id/ata-QEMU_DVD-ROM_QM00003 -&amp;gt; ../../sr0&lt;br /&gt;
lrwxrwxrwx 1 root root  9 Mar 16 15:11 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0 -&amp;gt; ../../sda&lt;br /&gt;
lrwxrwxrwx 1 root root 10 Mar 16 15:11 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part1 -&amp;gt; ../../sda1&lt;br /&gt;
lrwxrwxrwx 1 root root 10 Mar 16 15:11 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part2 -&amp;gt; ../../sda2&lt;br /&gt;
lrwxrwxrwx 1 root root 10 Mar 16 15:11 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part3 -&amp;gt; ../../sda3&lt;br /&gt;
lrwxrwxrwx 1 root root  9 Mar 16 15:11 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi1 -&amp;gt; ../../sdb&lt;br /&gt;
lrwxrwxrwx 1 root root 10 Mar 16 15:11 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi1-part1 -&amp;gt; ../../sdb1&lt;br /&gt;
lrwxrwxrwx 1 root root 10 Mar 16 15:11 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi1-part2 -&amp;gt; ../../sdb2&lt;br /&gt;
lrwxrwxrwx 1 root root 10 Mar 16 15:11 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi1-part3 -&amp;gt; ../../sdb3&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PVE always creates dedicated partitions for &amp;#039;&amp;#039;boot, EFI,&amp;#039;&amp;#039; and &amp;#039;&amp;#039;ZFS&amp;#039;&amp;#039; on storage devices:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve:~# fdisk -l /dev/sda&lt;br /&gt;
&lt;br /&gt;
Disk /dev/sda: 32 GiB, 34359738368 bytes, 67108864 sectors&lt;br /&gt;
Disk model: QEMU HARDDISK&lt;br /&gt;
Units: sectors of 1 * 512 = 512 bytes&lt;br /&gt;
Sector size (logical/physical): 512 bytes / 512 bytes&lt;br /&gt;
I/O size (minimum/optimal): 512 bytes / 512 bytes&lt;br /&gt;
Disklabel type: gpt&lt;br /&gt;
Disk identifier: 7D6423DE-2A9C-4B8D-A272-C7B28E1452D9&lt;br /&gt;
&lt;br /&gt;
Device       Start      End  Sectors  Size Type&lt;br /&gt;
/dev/sda1       34     2047     2014 1007K BIOS boot&lt;br /&gt;
/dev/sda2     2048  1050623  1048576  512M EFI System&lt;br /&gt;
/dev/sda3  1050624 67108830 66058207 31.5G Solaris /usr &amp;amp; Apple ZFS&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this case, we require the device-ID (&amp;#039;&amp;#039;by-id&amp;#039;&amp;#039;) from the &amp;#039;&amp;#039;/dev/sda3.&amp;#039;&amp;#039; partition, which is as follows:&lt;br /&gt;
 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part3&lt;br /&gt;
&lt;br /&gt;
== Switch ZFS data carrier ==&lt;br /&gt;
First, we verify the ZFS pool status. Here, we see that the failed hard drive is not available anymore in the system and previously had the ID &amp;#039;&amp;#039;/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part3.&amp;#039;&amp;#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve-virtual-01:~# zpool status -v&lt;br /&gt;
  pool: rpool&lt;br /&gt;
 state: DEGRADED&lt;br /&gt;
status: One or more devices could not be used because the label is missing or&lt;br /&gt;
        invalid.  Sufficient replicas exist for the pool to continue&lt;br /&gt;
        functioning in a degraded state.&lt;br /&gt;
action: Replace the device using &amp;#039;zpool replace&amp;#039;.&lt;br /&gt;
   see: http://zfsonlinux.org/msg/ZFS-8000-4J&lt;br /&gt;
  scan: none requested&lt;br /&gt;
config:&lt;br /&gt;
&lt;br /&gt;
        NAME                                            STATE     READ WRITE CKSUM&lt;br /&gt;
        rpool                                           DEGRADED     0     0     0&lt;br /&gt;
          mirror-0                                      DEGRADED     0     0     0&lt;br /&gt;
            15467202543801207082                        UNAVAIL      0     0     0  was /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part3&lt;br /&gt;
            scsi-0QEMU_QEMU_HARDDISK_drive-scsi1-part3  ONLINE       0     0     0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now, we change the data carriers.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Important:&amp;#039;&amp;#039;&amp;#039; In this example, our new hard drive has the same ID as the old one. This will not be the case in your actual scenario. Please follow the syntax:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;root@pve-virtual-01:~# zpool replace -f rpool /dev/disk/by-id/ID-ALTE-FESTPLATTE /dev/disk/by-id/ID-NEUE-FESTPLATTE&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In our example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve-virtual-01:~# zpool replace -f rpool /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part3 /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part3&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The exchange is now complete. Now, you can verify if the RAID-1 (&amp;#039;&amp;#039;ZFS-Mirror&amp;#039;&amp;#039;) is &amp;#039;&amp;#039;&amp;#039;online&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;healthy&amp;#039;&amp;#039;&amp;#039; again:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve-virtual-01:~# zpool status -v&lt;br /&gt;
  pool: rpool&lt;br /&gt;
 state: ONLINE&lt;br /&gt;
  scan: resilvered 998M in 0 days 00:00:08 with 0 errors on Tue Mar 16 12:16:34 2021&lt;br /&gt;
config:&lt;br /&gt;
&lt;br /&gt;
        NAME                                            STATE     READ WRITE CKSUM&lt;br /&gt;
        rpool                                           ONLINE       0     0     0&lt;br /&gt;
          mirror-0                                      ONLINE       0     0     0&lt;br /&gt;
            scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part3  ONLINE       0     0     0&lt;br /&gt;
            scsi-0QEMU_QEMU_HARDDISK_drive-scsi1-part3  ONLINE       0     0     0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Finalize disk exchange ==&lt;br /&gt;
Finally, there are a few steps left to ensure that the system is stable after a reboot and fully functional. &lt;br /&gt;
&lt;br /&gt;
Now, you have to perform the following steps with the &amp;#039;&amp;#039;proxmox-boot-tool&amp;#039;&amp;#039;:&lt;br /&gt;
&lt;br /&gt;
* First, you need to find out the disk ID as described in the step [[Boot-Device Replacement - Replacing a Proxmox ZFS Mirror Disk#Find out disk ID (by-id)|Find out disk ID (by-id)]]—but this time, you need to find the &amp;#039;&amp;#039;&amp;#039;ID of the second partition&amp;#039;&amp;#039;&amp;#039;, since this is always used for the &amp;#039;&amp;#039;&amp;#039;EFI system&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* When you have found out the ID (in this case &amp;#039;&amp;#039;/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part2),&amp;#039;&amp;#039;, you can execute the following commands:&lt;br /&gt;
&amp;lt;pre&amp;gt;root@pve:~# proxmox-boot-tool format /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part2&lt;br /&gt;
&lt;br /&gt;
UUID=&amp;quot;&amp;quot; SIZE=&amp;quot;536870912&amp;quot; FSTYPE=&amp;quot;&amp;quot; PARTTYPE=&amp;quot;c12a7328-f81f-11d2-ba4b-00a0c93ec93b&amp;quot; PKNAME=&amp;quot;sdb&amp;quot; MOUNTPOINT=&amp;quot;&amp;quot;&lt;br /&gt;
Formatting &amp;#039;/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part2&amp;#039; as vfat..&lt;br /&gt;
mkfs.fat 4.2 (2021-01-31)&lt;br /&gt;
Done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root@pve:~# proxmox-boot-tool init /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part2&lt;br /&gt;
&lt;br /&gt;
Re-executing &amp;#039;/usr/sbin/proxmox-boot-tool&amp;#039; in new private mount namespace..&lt;br /&gt;
UUID=&amp;quot;FD52-5CAE&amp;quot; SIZE=&amp;quot;536870912&amp;quot; FSTYPE=&amp;quot;vfat&amp;quot; PARTTYPE=&amp;quot;c12a7328-f81f-11d2-ba4b-00a0c93ec93b&amp;quot; PKNAME=&amp;quot;sdb&amp;quot; MOUNTPOINT=&amp;quot;&amp;quot;&lt;br /&gt;
Mounting &amp;#039;/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part2&amp;#039; on &amp;#039;/var/tmp/espmounts/FD52-5CAE&amp;#039;.&lt;br /&gt;
Installing systemd-boot..&lt;br /&gt;
Created &amp;quot;/var/tmp/espmounts/FD52-5CAE/EFI/systemd&amp;quot;.&lt;br /&gt;
Created &amp;quot;/var/tmp/espmounts/FD52-5CAE/EFI/BOOT&amp;quot;.&lt;br /&gt;
Created &amp;quot;/var/tmp/espmounts/FD52-5CAE/loader&amp;quot;.&lt;br /&gt;
Created &amp;quot;/var/tmp/espmounts/FD52-5CAE/loader/entries&amp;quot;.&lt;br /&gt;
Created &amp;quot;/var/tmp/espmounts/FD52-5CAE/EFI/Linux&amp;quot;.&lt;br /&gt;
Copied &amp;quot;/usr/lib/systemd/boot/efi/systemd-bootx64.efi&amp;quot; to &amp;quot;/var/tmp/espmounts/FD52-5CAE/EFI/systemd/systemd-bootx64.efi&amp;quot;.&lt;br /&gt;
Copied &amp;quot;/usr/lib/systemd/boot/efi/systemd-bootx64.efi&amp;quot; to &amp;quot;/var/tmp/espmounts/FD52-5CAE/EFI/BOOT/BOOTX64.EFI&amp;quot;.&lt;br /&gt;
Random seed file /var/tmp/espmounts/FD52-5CAE/loader/random-seed successfully written (512 bytes).&lt;br /&gt;
Not installing system token, since we are running in a virtualized environment.&lt;br /&gt;
Created EFI boot entry &amp;quot;Linux Boot Manager&amp;quot;.&lt;br /&gt;
Configuring systemd-boot..&lt;br /&gt;
Unmounting &amp;#039;/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part2&amp;#039;.&lt;br /&gt;
Adding &amp;#039;/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-part2&amp;#039; to list of synced ESPs..&lt;br /&gt;
Refreshing kernels and initrds..&lt;br /&gt;
Running hook script &amp;#039;proxmox-auto-removal&amp;#039;..&lt;br /&gt;
Running hook script &amp;#039;zz-proxmox-boot&amp;#039;..&lt;br /&gt;
Copying and configuring kernels on /dev/disk/by-uuid/5D2E-4BFB&lt;br /&gt;
        Copying kernel and creating boot-entry for 5.15.30-2-pve&lt;br /&gt;
WARN: /dev/disk/by-uuid/5D2F-103F does not exist - clean &amp;#039;/etc/kernel/proxmox-boot-uuids&amp;#039;! - skipping&lt;br /&gt;
Copying and configuring kernels on /dev/disk/by-uuid/FD52-5CAE&lt;br /&gt;
        Copying kernel and creating boot-entry for 5.15.30-2-pve&lt;br /&gt;
&lt;br /&gt;
root@pve:~# proxmox-boot-tool status&lt;br /&gt;
&lt;br /&gt;
Re-executing &amp;#039;/usr/sbin/proxmox-boot-tool&amp;#039; in new private mount namespace..&lt;br /&gt;
System currently booted with uefi&lt;br /&gt;
5D2E-4BFB is configured with: uefi (versions: 5.15.30-2-pve)&lt;br /&gt;
WARN: /dev/disk/by-uuid/5D2F-103F does not exist - clean &amp;#039;/etc/kernel/proxmox-boot-uuids&amp;#039;! - skipping&lt;br /&gt;
FD52-5CAE is configured with: uefi (versions: 5.15.30-2-pve)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root@pve:~# proxmox-boot-tool refresh&lt;br /&gt;
&lt;br /&gt;
Running hook script &amp;#039;proxmox-auto-removal&amp;#039;..&lt;br /&gt;
Running hook script &amp;#039;zz-proxmox-boot&amp;#039;..&lt;br /&gt;
Re-executing &amp;#039;/etc/kernel/postinst.d/zz-proxmox-boot&amp;#039; in new private mount namespace..&lt;br /&gt;
Copying and configuring kernels on /dev/disk/by-uuid/5D2E-4BFB&lt;br /&gt;
        Copying kernel and creating boot-entry for 5.15.30-2-pve&lt;br /&gt;
WARN: /dev/disk/by-uuid/5D2F-103F does not exist - clean &amp;#039;/etc/kernel/proxmox-boot-uuids&amp;#039;! - skipping&lt;br /&gt;
Copying and configuring kernels on /dev/disk/by-uuid/FD52-5CAE&lt;br /&gt;
        Copying kernel and creating boot-entry for 5.15.30-2-pve&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root@pve:~# proxmox-boot-tool clean&lt;br /&gt;
&lt;br /&gt;
Checking whether ESP &amp;#039;5D2E-4BFB&amp;#039; exists.. Found!&lt;br /&gt;
Checking whether ESP &amp;#039;5D2F-103F&amp;#039; exists.. Not found!&lt;br /&gt;
Checking whether ESP &amp;#039;FD52-5CAE&amp;#039; exists.. Found!&lt;br /&gt;
Sorting and removing duplicate ESPs..&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root@pve:~# proxmox-boot-tool status&lt;br /&gt;
&lt;br /&gt;
Re-executing &amp;#039;/usr/sbin/proxmox-boot-tool&amp;#039; in new private mount namespace..&lt;br /&gt;
System currently booted with uefi&lt;br /&gt;
5D2E-4BFB is configured with: uefi (versions: 5.15.30-2-pve)&lt;br /&gt;
FD52-5CAE is configured with: uefi (versions: 5.15.30-2-pve)&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After that, the system has been successfully rebooted and is now fully redundant and secure again.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Jsterr}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Proxmox Administration]]&lt;br /&gt;
[[de:Boot-Device Replacement - Proxmox ZFS Mirror Disk austauschen]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Backup_and_restore_under_Debian_13_with_Proxmox_Backup_Client</id>
		<title>Backup and restore under Debian 13 with Proxmox Backup Client</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Backup_and_restore_under_Debian_13_with_Proxmox_Backup_Client"/>
		<updated>2026-03-25T12:55:01Z</updated>

		<summary type="html">&lt;p&gt;Pstreifinger: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
This article describes how to back up a &amp;#039;&amp;#039;&amp;#039;Debian 13&amp;#039;&amp;#039;&amp;#039; system with the help of &amp;#039;&amp;#039;&amp;#039;Proxmox Backup Clients&amp;#039;&amp;#039;&amp;#039; on a Proxmox Backup server.&lt;br /&gt;
&lt;br /&gt;
== Initial situation ==&lt;br /&gt;
For the performance, a &amp;#039;&amp;#039;&amp;#039;Proxmox Backup Server&amp;#039;&amp;#039;&amp;#039; and a &amp;#039;&amp;#039;&amp;#039;Debian 13&amp;#039;&amp;#039;&amp;#039; system, that you want to back up, is required. &lt;br /&gt;
&lt;br /&gt;
If you &amp;#039;&amp;#039;&amp;#039;did not install a PBS yet&amp;#039;&amp;#039;&amp;#039;, you will find the instructions for the installation here: [[Proxmox Backup Server Installation]].&lt;br /&gt;
&lt;br /&gt;
== Proxmox Backup Client ==&lt;br /&gt;
In this paragraph, the &amp;#039;&amp;#039;&amp;#039;Proxmox Backup Client&amp;#039;&amp;#039;&amp;#039; is installed and configured on a Debian 13 system. &lt;br /&gt;
&lt;br /&gt;
The whole installation is performed as &amp;#039;&amp;#039;&amp;#039;root user&amp;#039;&amp;#039;&amp;#039;. With the following command, you can log in as root-user: &amp;lt;pre&amp;gt;su&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Add repository === &lt;br /&gt;
First, the &amp;#039;&amp;#039;&amp;#039;repository&amp;#039;&amp;#039;&amp;#039; must be configured for the &amp;#039;&amp;#039;Proxmox Backup Client&amp;#039;&amp;#039;. For this, the &amp;#039;&amp;#039;proxmox-backup-client.list&amp;#039;&amp;#039; file must be created with the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo nano /etc/apt/sources.list.d/proxmox-backup-client.list&amp;lt;/pre&amp;gt;&lt;br /&gt;
The following content must be added to this file:&lt;br /&gt;
&amp;lt;pre&amp;gt;deb http://download.proxmox.com/debian/pbs-client trixie main&amp;lt;/pre&amp;gt;&lt;br /&gt;
Next, the &amp;#039;&amp;#039;&amp;#039;Repository-GPG-Key&amp;#039;&amp;#039;&amp;#039; must be imported. Proxmox uses for every Debian version another GPG-key. For Debian version 13, the GPG-key for Trixie is required:&lt;br /&gt;
&amp;lt;pre&amp;gt;wget -qO - https://enterprise.proxmox.com/debian/proxmox-release-trixie.gpg | sudo tee /etc/apt/trusted.gpg.d/proxmox-release-trixie.gpg &amp;gt;/dev/null&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Installation ===&lt;br /&gt;
After installing the &amp;#039;&amp;#039;Proxmox Backup Client&amp;#039;&amp;#039; repository, all package lists must be updated:&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo apt update&amp;lt;/pre&amp;gt;&lt;br /&gt;
Now, you can install &amp;#039;&amp;#039;Proxmox Backup Client&amp;#039;&amp;#039;:&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo apt install proxmox-backup-client&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Connect to PBS ===&lt;br /&gt;
After successful installation of the client, you can connect to the Proxmox Backup server with the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;proxmox-backup-client login --repository &amp;lt;user&amp;gt;@&amp;lt;pam&amp;gt;@&amp;lt;ipadresse&amp;gt;:&amp;lt;datastore&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
The following adjustments must be made:&lt;br /&gt;
* &amp;lt;code&amp;gt;&amp;lt;user&amp;gt;&amp;lt;/code&amp;gt;: Enter the PBS username; we recommend using an alternative account with the necessary permissions rather than the root account&lt;br /&gt;
* &amp;lt;code&amp;gt;&amp;lt;pam&amp;gt;&amp;lt;/code&amp;gt;: Enter the realm required when logging in to PBS here (usually this is &amp;#039;&amp;#039;&amp;#039;pam&amp;#039;&amp;#039;&amp;#039;)&lt;br /&gt;
* &amp;lt;code&amp;gt;&amp;lt;ipaddress&amp;gt;&amp;lt;/code&amp;gt;: Enter the IP address of the Proxmox Backup server here &lt;br /&gt;
* &amp;lt;code&amp;gt;&amp;lt;datastore&amp;gt;&amp;lt;/code&amp;gt;: Specify the name of the datastore where the backups should be stored&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;The entry could look like this: &amp;quot;backup@pam@10.26.33.11:zfs-pool&amp;quot;.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
Accept the fingerprint and enter the password in the PBS.&lt;br /&gt;
&lt;br /&gt;
Now, the Backup Client is installed on your Debian system.&lt;br /&gt;
&lt;br /&gt;
== Perform backup ==&lt;br /&gt;
&lt;br /&gt;
=== Type of security === &lt;br /&gt;
To back up a file or a path, run the following command:&lt;br /&gt;
&amp;lt;pre&amp;gt;proxmox-backup-client backup etc.pxar:/(directory or file that should be secured) --repository &amp;lt;user&amp;gt;@&amp;lt;pam&amp;gt;@&amp;lt;ipadresse&amp;gt;:&amp;lt;datastore&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
If you want to back up the whole system, you require this command:&lt;br /&gt;
&amp;lt;pre&amp;gt;proxmox-backup-client backup etc.pxar:/ --repository &amp;lt;user&amp;gt;@&amp;lt;pam&amp;gt;@&amp;lt;ipadresse&amp;gt;:&amp;lt;datastore&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
After you have performed one of these commands, the backup should now be displayed in the datastore of the Proxmox Backup server.&lt;br /&gt;
&lt;br /&gt;
=== Display in the shell ===&lt;br /&gt;
You can display the backups in the Debian shell:&amp;lt;pre&amp;gt;proxmox-backup-client snapshots --repository &amp;lt;user&amp;gt;@&amp;lt;pam&amp;gt;@&amp;lt;ipadresse&amp;gt;:&amp;lt;datastore&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
Sample output:&amp;lt;pre&amp;gt;&lt;br /&gt;
┌──────────────────────────────────┬───────┬───────────────────────────────────┐&lt;br /&gt;
│ snapshot                         │  size │ files                             │&lt;br /&gt;
╞══════════════════════════════════╪═══════╪═══════════════════════════════════╡&lt;br /&gt;
│ host/debian/2026-03-11T11:33:16Z │ 728 B │ catalog.pcat1 etc.pxar index.json │&lt;br /&gt;
└──────────────────────────────────┴───────┴───────────────────────────────────┘&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Restore ==&lt;br /&gt;
For the recreation of your data, perform the following command:&amp;lt;pre&amp;gt;proxmox-backup-client restore &amp;lt;Backup Name&amp;gt; etc.pxar &amp;lt;destination directory&amp;gt; --repository &amp;lt;user&amp;gt;@&amp;lt;pam&amp;gt;@&amp;lt;ipaddress&amp;gt;:&amp;lt;datastore&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;&amp;lt;Backup Name&amp;gt;&amp;lt;/code&amp;gt;: Enter the complete name of the backup &lt;br /&gt;
* &amp;lt;code&amp;gt;&amp;lt;Destination Directory&amp;gt;&amp;lt;/code&amp;gt;:  Enter the destination directory for the restore here&lt;br /&gt;
* &amp;lt;code&amp;gt;&amp;lt;user&amp;gt;, &amp;lt;pam&amp;gt;, &amp;lt;ipaddress&amp;gt;, &amp;lt;datastore&amp;gt;&amp;lt;/code&amp;gt;: These should be selected as specified for connection to PBS&lt;br /&gt;
&lt;br /&gt;
=== Example === &lt;br /&gt;
The following values are used for the example:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Backup name&amp;#039;&amp;#039;&amp;#039;: &amp;lt;code&amp;gt;host/debian/2026-03-11T11:33:16Z&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Destination directory&amp;#039;&amp;#039;&amp;#039;: &amp;lt;code&amp;gt;/home&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;user&amp;#039;&amp;#039;&amp;#039;: &amp;lt;code&amp;gt;backup&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;pam&amp;#039;&amp;#039;&amp;#039;: &amp;lt;code&amp;gt;pam&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ip-address&amp;#039;&amp;#039;&amp;#039;: &amp;lt;code&amp;gt;10.21.0.50&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;datastore&amp;#039;&amp;#039;&amp;#039;: &amp;lt;code&amp;gt;backup_ssd&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This results in the following command:&amp;lt;pre&amp;gt;proxmox-backup-client restore host/debian/2026-03-11T11:33:16Z etc.pxar /home --repository backup@pam@10.21.0.50:backup_ssd&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cron job ==&lt;br /&gt;
You can also automate your backups using a &amp;#039;&amp;#039;&amp;#039;cron job&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Create script ===&lt;br /&gt;
First, you have to create the file &amp;lt;code&amp;gt;/usr/local/sbin/debian-backup.sh&amp;lt;/code&amp;gt;:&lt;br /&gt;
&amp;lt;pre&amp;gt;nano /usr/local/sbin/debian-backup.sh&amp;lt;/pre&amp;gt;&lt;br /&gt;
Create the following script (select the values enclosed in &amp;lt;code&amp;gt;&amp;lt;&amp;gt;&amp;lt;/code&amp;gt; according to your settings):&lt;br /&gt;
&amp;lt;pre&amp;gt;#!/bin/bash&lt;br /&gt;
set -euo pipefail&lt;br /&gt;
&lt;br /&gt;
export PBS_REPOSITORY=&amp;quot;&amp;lt;user&amp;gt;@&amp;lt;pam&amp;gt;@&amp;lt;IPaddress&amp;gt;:&amp;lt;Datastore&amp;gt;&amp;quot;&lt;br /&gt;
export PBS_PASSWORD=&amp;quot;&amp;lt;Password&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
proxmox-backup-client backup \&lt;br /&gt;
	home.pxar:/&amp;lt;directory&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
Then make the script executable: &lt;br /&gt;
&amp;lt;pre&amp;gt;chmod +x debian-backup.sh&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Installation and configuration of Cron ===&lt;br /&gt;
Next, &amp;#039;&amp;#039;&amp;#039;Cron&amp;#039;&amp;#039;&amp;#039; must be installed with the following commands:&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo apt update&lt;br /&gt;
&lt;br /&gt;
sudo apt install cron&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Create &amp;#039;&amp;#039;&amp;#039;Cron&amp;#039;&amp;#039;&amp;#039; file:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo crontab -e&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If you want to back up your data every day at 3:30 a.m., add the following text to the file:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
30 3 * * * /usr/local/sbin/debian-backup.sh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
The exact instructions for creating or changing Cron jobs can be found in the article https://wiki.ubuntuusers.de/Cron/ .&lt;br /&gt;
&lt;br /&gt;
{{Pstreifinger}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[de:Backup und Restore unter Debian 13 mit Proxmox Backup Client]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/VirtualBox</id>
		<title>VirtualBox</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/VirtualBox"/>
		<updated>2026-03-25T05:43:31Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;VirtualBox&amp;#039;&amp;#039;&amp;#039; is a virtualization solution from Oracle. VirtualBox was originally developed by Innotek, which was later acquired by Sun Microsystems. In 2010, Oracle acquired Sun, including VirtualBox.   VirtualBox runs on Windows, Linux, Mac OS and Solaris.   == General information ==  * Documentation: http://www.virtualbox.org/manual/UserManual.html  == Versions == === VirtualBox 6.1 === * Most important new features (excerpt) in version 6.1: ** Now supports importi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;VirtualBox&amp;#039;&amp;#039;&amp;#039; is a virtualization solution from Oracle. VirtualBox was originally developed by Innotek, which was later acquired by Sun Microsystems. In 2010, Oracle acquired Sun, including VirtualBox. &lt;br /&gt;
&lt;br /&gt;
VirtualBox runs on Windows, Linux, Mac OS and Solaris. &lt;br /&gt;
&lt;br /&gt;
== General information == &lt;br /&gt;
* Documentation: http://www.virtualbox.org/manual/UserManual.html&lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
=== VirtualBox 6.1 ===&lt;br /&gt;
* Most important new features (excerpt) in version 6.1:&lt;br /&gt;
** Now supports importing a VM from Oracle Cloud Infrastructure&lt;br /&gt;
** Enhanced support for exporting a VM to Oracle Cloud Infrastructure&lt;br /&gt;
** Supports nested hardware virtualization for Intel CPUs&lt;br /&gt;
** Supports Linux kernel 5.4 for Linux based guests &lt;br /&gt;
* Complete changelogs: https://www.virtualbox.org/wiki/Changelog&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 6.0 ===&lt;br /&gt;
* Most important renewals (excerpt) in version 6.0:&lt;br /&gt;
** Support of export for virtual machines in the Oracle Cloud Infrastructure&lt;br /&gt;
** Improved user interface&lt;br /&gt;
** Improved support of HiDPI monitors &lt;br /&gt;
** New file manager supports copying files between host and guest&lt;br /&gt;
** Large update of 3D graphic support for Windows guests&lt;br /&gt;
** Hyper-V as fallback option for Windows hosts&lt;br /&gt;
** Support for Linux kernel 4.20 for Linux-based guests&lt;br /&gt;
* Complete changelogs: https://www.virtualbox.org/wiki/Changelog&lt;br /&gt;
* More information:&lt;br /&gt;
** [https://www.heise.de/ix/meldung/VirtualBox-6-0-mit-vielen-punktuellen-Verbesserungen-4255869.html VirtualBox 6.0 with lots of selective improvements]  (heise.de, 19.12.2018)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 5.2 ===&lt;br /&gt;
* Most important renewals (excerpt) in version 5.2:&lt;br /&gt;
** VM export to Oracle Cloud (OPC)&lt;br /&gt;
** Unattended operating system installation in the guest system&lt;br /&gt;
** Revised graphical user interface&lt;br /&gt;
* Complete changelogs:https://www.virtualbox.org/wiki/Changelog&lt;br /&gt;
* More information:&lt;br /&gt;
** [https://www.heise.de/ix/meldung/Inklusive-Upload-in-die-Oracle-Cloud-VirtualBox-5-2-freigegeben-3866366.html Includes upload to the Oracle-Cloud: VirtualBox 5.2 released] (heise.de, 20.10.2017)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 5.1 ===&lt;br /&gt;
* Most important renewals (excerpt) in version 5.1:&lt;br /&gt;
** Improved performance through a new implementation for APIC and I/O-APIC&lt;br /&gt;
** Debugging Windows guests using Hyper-V paravirtualization&lt;br /&gt;
** Graphical user interface fully migrated to Qt5&lt;br /&gt;
** Higher performance and faster access times through passive API event listener&lt;br /&gt;
** Better support for Python 3&lt;br /&gt;
** NVMHCI-compatible storage-controller enables the emulation of NVMe devices&lt;br /&gt;
* Complete changelogs: https://www.virtualbox.org/wiki/Changelog&lt;br /&gt;
* More information: &lt;br /&gt;
** [http://www.heise.de/ix/meldung/Virtualization-software-VirtualBox-5-1-relies-on-Qt5-3265361.html Virtualization software: VirtualBox 5.1 relies on Qt5] (heise.de, 13.07.2016)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 5.0 ===&lt;br /&gt;
* Most important renewals (excerpt) in version 5.0:&lt;br /&gt;
** USB 3.0 support&lt;br /&gt;
** Improved Drag&amp;amp;Drop&lt;br /&gt;
** Disk-Image encryption&lt;br /&gt;
* Complete changelogs: https://www.virtualbox.org/wiki/Changelog&lt;br /&gt;
* More information: ** [http://www.heise.de/newsticker/meldung/Virtualisierungssoftware-VirtualBox-5-0-vorgestellt-USB-3-0-Support-und-bessere-Performance-2747850.html Virtualization software VirtualBox 5.0 presented: USB-3.0-support and better performance]  (heise.de, 10.07.2015)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 4.3 ===&lt;br /&gt;
* Important renewals (excerpt) from in 4.3:&lt;br /&gt;
** New NAT network mode ([[Netzwerkkonfiguration in VirtualBox#NAT Service|NAT Service]]) that allows guest systems to communicate with one another&lt;br /&gt;
** Support of Windows 8.1, Windows Server 2012 R2 and OS X 10.9 &amp;quot;Mavericks&amp;quot;&lt;br /&gt;
** Windows 8.1 Touch Device input assistance&lt;br /&gt;
** Faster 3D effects on Ubuntu or Fedora Linux guest systems&lt;br /&gt;
** IPv6 is available in bridged, host, internal, and new NAT modes&lt;br /&gt;
* Complete changelogs: https://www.virtualbox.org/wiki/Changelog&lt;br /&gt;
* More information:&lt;br /&gt;
** [http://www.admin-magazin.de/News/Virtualbox-4.3-verbessert-Netzwerk-Funktionalitaet VirtualBox 4.3 improves network functionality]  (ADMIN Magazine, 16.10.2013)&lt;br /&gt;
** [http://www.heise.de/open/meldung/VirtualBox-4-3-unterstuetzt-Multitouch-1979845.html VirtualBox 4.3 supports Multitouch] (heise open, 15.10.2013)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 4.2 ===&lt;br /&gt;
* Most important renewals (excerpt) in version 4.2:&lt;br /&gt;
** Support for Windows 8 and OS X 10.8 &amp;quot;Mountain Lion&amp;quot;&lt;br /&gt;
* Complete changelogs: http://www.virtualbox.org/wiki/Changelog-4.2&lt;br /&gt;
* More information:&lt;br /&gt;
** [http://www.heise.de/open/meldung/VirtualBox-4-2-unterstuetzt-Windows-8-und-Mountain-Lion-1707785.html VirtualBox 4.2 supports Windows 8 and Mountain Lion] (heise open, 13.09.2012)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 4.1 ===&lt;br /&gt;
* Most important renewals (in part) in version 4.1:&lt;br /&gt;
** Cloning support: vull clones can be created via GUI and VBoxManage, linked clones via VBoxManage&lt;br /&gt;
** GUI: new/extended wizards for creating new virtual disks or for copying virtual disks&lt;br /&gt;
** Memory limit on 64-bit hosts now 1 TB&lt;br /&gt;
** Experimental support for PCI passthrough on Linux hosts&lt;br /&gt;
** Windows guest systems: experimental WDDM graphic driver with Windows Aero and Direct3D support&lt;br /&gt;
** Network: new connection mode &amp;#039;&amp;#039;Generic Driver&amp;#039;&amp;#039;&lt;br /&gt;
** New network mode &amp;#039;&amp;#039;UDP tunnel&amp;#039;&amp;#039;: allows the connection of VMs that run on different hosts&lt;br /&gt;
** Experimental support for SATA HDD Hotplugging with VBoxManage&lt;br /&gt;
* Complete changelogs: http://www.virtualbox.org/wiki/Changelog-4.1&lt;br /&gt;
* More information:&lt;br /&gt;
** [http://www.heise.de/open/meldung/Oracle-veroeffentlicht-VirtualBox-4-1-1281936.html Oracle publishes VirtualBox 4.1] (heise open, 19.07.2011)&lt;br /&gt;
** [http://virtualization.info/en/news/2011/07/release-oracle-virtualbox-4-1-0.html Release: Oracle VirtualBox 4.1.0] (virtualization.info)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 4.0 ===&lt;br /&gt;
* Current maintenance release: [http://blogs.oracle.com/virtualization/entry/oracle_vm_virtualbox_4_02 4.0.12 (2011-07-15)]&lt;br /&gt;
* Most important renewals (in part) from version 4.0:&lt;br /&gt;
** Extension packs for expansions&lt;br /&gt;
** New settings and disk file format&lt;br /&gt;
** New GUI (VirtualBox Manager)&lt;br /&gt;
** Improved OVF support &lt;br /&gt;
* Possible limitation of CPU time and I/O bandwidth of a VM&lt;br /&gt;
* Support for asynchronem I/O für iSCSI, VMDK, VHD and Parallels Image files&lt;br /&gt;
** Support for multiple screens in Linux and Solaris guests with X.Org servers from version 1.3&lt;br /&gt;
* Complete changelogs: http://www.virtualbox.org/wiki/Changelog-4.0&lt;br /&gt;
* More information: &lt;br /&gt;
** [http://virtualization.info/en/news/2010/12/release-oracle-vm-virtualbox-4-0.html Release: Oracle VM VirtualBox 4.0] (virtualization.info)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 3.2 ===&lt;br /&gt;
* Most important renewals (in part):&lt;br /&gt;
** [http://www.virtualbox.org/manual/ch04.html#guestadd-balloon Memory Ballooning] (only on 64-Bit hosts)&lt;br /&gt;
** CPU hot-plug for Linux (hot-add and hot-remove) and some Windows guests (only hot-add) &lt;br /&gt;
** LsiLogic SAS controller emulation&lt;br /&gt;
* Complete changelogs: http://www.virtualbox.org/wiki/Changelog-3.2&lt;br /&gt;
* More information:&lt;br /&gt;
** [http://virtualization.info/en/news/2010/12/release-oracle-vm-virtualbox-version-3-2-12.html Release: Oracle VM VirtualBox 3.2.12] (virtualization.info)&lt;br /&gt;
** [http://virtualization.info/en/news/2010/10/release-oracle-vm-virtualbox-3-2-10.html Release: Oracle VM VirtualBox 3.2.10] (virtualization.info)&lt;br /&gt;
** [http://virtualization.info/en/news/2010/08/release-oracle-virtualbox-3-2-8.html Release: Oracle VM VirtualBox 3.2.8] (virtualization.info)&lt;br /&gt;
** [http://virtualization.info/en/news/2010/06/release-oracle-vm-virtualbox-3-2-6.html Release: Oracle VM VirtualBox 3.2.6] (virtualization.info)&lt;br /&gt;
** [http://virtualization.info/en/news/2010/06/release-oracle-vm-virtualbox-3-2-4.html Release: Oracle VM VirtualBox 3.2.4] (virtualization.info)&lt;br /&gt;
** [http://virtualization.info/en/news/2010/06/release-oracle-vm-virtualbox-3-2-2.html Release: Oracle VM VirtualBox 3.2.2] (virtualization.info)&lt;br /&gt;
** [http://virtualization.info/en/news/2010/05/release-oracle-vm-virtualbox-3-2.html Release: Oracle VM VirtualBox 3.2] (virtualization.info)&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 3.1 ===&lt;br /&gt;
* Complete changelogs: http://www.virtualbox.org/wiki/Changelog-3.1&lt;br /&gt;
&lt;br /&gt;
=== VirtualBox 3.0 ===&lt;br /&gt;
* Complete changelogs: http://www.virtualbox.org/wiki/Changelog-3.0&lt;br /&gt;
&lt;br /&gt;
== More information == &lt;br /&gt;
* http://de.wikipedia.org/wiki/VirtualBox&lt;br /&gt;
&lt;br /&gt;
{{Wfischer}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[de:VirtualBox]]&lt;br /&gt;
[[Category:VirtualBox]]&lt;br /&gt;
[[Category:Review 2023 Q3]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Advantech_Industry_Firewall_server</id>
		<title>Advantech Industry Firewall server</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Advantech_Industry_Firewall_server"/>
		<updated>2026-03-24T12:03:04Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the operation of an open source firewall such as [[OPNsense]], a multiple number of different server systems is suitable. In this article, we present Advantech Industry Firewall systems that were tested with OPNsense at Thomas-Krenn. &lt;br /&gt;
&lt;br /&gt;
{{#widget:Imagebox-left|link={{#tklink:type=sitex|id=20777|linkonly=1}}|image=/de/wikiDE/images/0/0f/OPNsense-Shopbanner.png|text=Click here for our OPNsense Industry Firewalls in the Thomas-Krenn online shop|campaign=Advantech Industry Firewall Server }}&lt;br /&gt;
{{#widget:SitexBox|link={{#tklink:type=sitex|id=20777|linkonly=1}}|text=Click here for our OPNsense Industry Firewalls in the Thomas-Krenn online shop|campaign=Advantech Industrie Firewall Server }}&lt;br /&gt;
&lt;br /&gt;
== Firewall optimized Advantech systems ==&lt;br /&gt;
The following chart shows Advantech systems that were tested with OPNsense at Thomas-Krenn:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background-color: #EFEFEF;text-align:center;&amp;quot;&lt;br /&gt;
! Server&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;20756&amp;quot;&amp;gt;UNO-2271G V2&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:UNO-2271G V2.png|100px]]&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;20804&amp;quot;&amp;gt;FWA-1012VC-4CA1S&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FWA-1012VC.png|100px]]&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;20803&amp;quot;&amp;gt;FWA-1012VC-8CA1S&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FWA-1012VC.png|100px]]&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;20805&amp;quot;&amp;gt;FWA-1112VC-4CA1S&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FWA-1112VC-4CA1S.jpg|100px]]&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;20802&amp;quot;&amp;gt;FWA-2012-16A1S&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FWA-2012-16A1S.png|100px]]&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;21233&amp;quot;&amp;gt;FWA-1214LRI-4CA1R&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FWA-1214.png|100px]]&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;21233&amp;quot;&amp;gt;FWA-1214FRI-8CA1R&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FWA-1214.png|100px]]&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;21123&amp;quot;&amp;gt;FWA-3034&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FWA-3034.jpg|100px]]&lt;br /&gt;
! &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;21073&amp;quot;&amp;gt;FWA-5072-00A1R&amp;lt;/tklink&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:FWA-5072-00A1R.png|100px]]&lt;br /&gt;
|-&lt;br /&gt;
| Special features&lt;br /&gt;
| valign=top |&lt;br /&gt;
* fanless&lt;br /&gt;
* 2 NICs&lt;br /&gt;
* optional 2 additional NICs (2x i350)&lt;br /&gt;
| valign=top |&lt;br /&gt;
* 4 NICs&lt;br /&gt;
* 2 SFP&lt;br /&gt;
* Intel QAT&lt;br /&gt;
| valign=top |&lt;br /&gt;
* 6 NICs&lt;br /&gt;
* 2 SFP&lt;br /&gt;
* Intel QAT&lt;br /&gt;
| valign=top |&lt;br /&gt;
* 6 NICs&lt;br /&gt;
* 2 SFP+&lt;br /&gt;
* 10 Gbit&lt;br /&gt;
* Intel QAT&lt;br /&gt;
* high temperature range&lt;br /&gt;
| valign=top |&lt;br /&gt;
* 6 NICs&lt;br /&gt;
* Intel QAT&lt;br /&gt;
* 1x NMC&lt;br /&gt;
| valign=top |&lt;br /&gt;
* 4 cores (Atom x7433RE)&lt;br /&gt;
* 4 NICs&lt;br /&gt;
| valign=top |&lt;br /&gt;
*8 cores (Atom x7835RE)&lt;br /&gt;
*4 NICs&lt;br /&gt;
* 2 SFP (FWA-1214FRI-8CA1R)&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
* Front I/O&lt;br /&gt;
* 8x 2,5 Gbit onboard&lt;br /&gt;
* 2x 10 Gbit onboard&lt;br /&gt;
* 1x NMC&lt;br /&gt;
* red. NT&lt;br /&gt;
| valign=top |&lt;br /&gt;
* Front I/O&lt;br /&gt;
* 4x NMC&lt;br /&gt;
* red. NT&lt;br /&gt;
|-&lt;br /&gt;
| Mainboard&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | UNO-2271G-N221AE&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | FWA-1012VC 4-Core&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | FWA-1012VC 8-Core&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Advantech Mainboard FWA-1112VC&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Advantech Mainboard FWA-2012&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Advantech Mainboard FWA-1214&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Advantech Mainboard FWA-1214&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Advantech Mainboard FWA-3034&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Advantech Mainboard FWA-5072-00A1R&lt;br /&gt;
|-&lt;br /&gt;
| CPU&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: Taktfrequenz&lt;br /&gt;
: Cores / Threads&lt;br /&gt;
: AES-NI Instructions&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://ark.intel.com/content/www/de/de/ark/products/214754/intel-celeron-processor-n6210-1-5m-cache-up-to-2-60-ghz.html Celeron N6210]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 1,2 GHz&lt;br /&gt;
: 2 / 2&lt;br /&gt;
: yes&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://www.intel.de/content/www/de/de/products/sku/97937/intel-atom-processor-c3558-8m-cache-up-to-2-20-ghz/specifications.html Atom C3558]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 2,2 GHz&lt;br /&gt;
: 4 / 4&lt;br /&gt;
: yes&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://www.intel.de/content/www/de/de/products/sku/97926/intel-atom-processor-c3758-16m-cache-up-to-2-20-ghz/specifications.html Atom C3758]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 2,2 GHz&lt;br /&gt;
: 8 / 8&lt;br /&gt;
: yes&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://www.intel.de/content/www/de/de/products/sku/97937/intel-atom-processor-c3558-8m-cache-up-to-2-20-ghz/specifications.html Atom C3558]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 2,2 GHz&lt;br /&gt;
: 4 / 4&lt;br /&gt;
: yes&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://www.intel.de/content/www/de/de/products/sku/97927/intel-atom-processor-c3958-16m-cache-up-to-2-0-ghz/specifications.html Atom C3958]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 2,0 GHz&lt;br /&gt;
: 16 /16&lt;br /&gt;
: yes&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://www.intel.de/content/www/de/de/products/sku/236967/intel-atom-x7433re-processor-6m-cache-up-to-3-40-ghz/specifications.html Atom x7433RE]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 3,4 GHz&lt;br /&gt;
: 4 / 4&lt;br /&gt;
: yes &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://www.intel.de/content/www/de/de/products/sku/236968/intel-atom-x7835re-processor-6m-cache-up-to-3-60-ghz/specifications.html Atom x7835RE]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 3,6 GHz&lt;br /&gt;
: 8 / 8&lt;br /&gt;
: yes&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://www.intel.de/content/www/de/de/products/sku/232105/intel-core-i313100te-processor-12m-cache-up-to-4-10-ghz/specifications.html Core i3-13100TE] - [https://www.intel.de/content/www/de/de/products/sku/132219/intel-core-i712700e-processor-25m-cache-up-to-4-80-ghz/specifications.html Core i7-12700E]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 4,1 - 5,1 GHz&lt;br /&gt;
: 8 / 8 - 12 / 20&lt;br /&gt;
: yes&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [https://www.intel.de/content/www/de/de/products/sku/236636/intel-xeon-silver-4509y-processor-22-5m-cache-2-60-ghz/specifications.html Xeon Silver 4509Y] - [https://www.intel.de/content/www/de/de/products/sku/237250/intel-xeon-platinum-8580-processor-300m-cache-2-00-ghz/specifications.html Xeon Platinum 8580]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
: 2,0 - 3,9 GHz&lt;br /&gt;
: 8 / 16 - 60 / 120&lt;br /&gt;
: yes&lt;br /&gt;
|-&lt;br /&gt;
| RAM&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2 - 8 GB&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8 - 32 GB&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8 - 32 GB&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8 - 32 GB&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8 - 32 GB&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8 GB&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8 GB&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8 - 64 GB&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 16 - 1024 GB&lt;br /&gt;
|-&lt;br /&gt;
| Disk (SATA)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| Disk (NVMe and other)&lt;br /&gt;
|&lt;br /&gt;
* 32 GB eMMC onboard&lt;br /&gt;
* 1 mSATA&lt;br /&gt;
|&lt;br /&gt;
* 1 SATA M.2 2280&lt;br /&gt;
|&lt;br /&gt;
* 1 SATA M.2 2242/2280&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
* 1 SATA M.2 2280&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
* 1 SATA M.2 2280&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
* 64GB M.2 SATA SSD 2242 onboard&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
* 64GB M.2 SATA SSD 2242 onboard&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 1 SATA/NVMe M.2 2280&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2 SATA/NVMe M.2 2280&lt;br /&gt;
|-&lt;br /&gt;
| NICs 1 Gbit (contained)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2&lt;br /&gt;
(2x i211)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 6&lt;br /&gt;
(4x RJ45, 2x SFP)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8&lt;br /&gt;
(6x RJ45, 2x SFP)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 4&lt;br /&gt;
(2x i211, 2x X553 L)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 6&lt;br /&gt;
(6x RJ45)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 4&lt;br /&gt;
(4x RJ45)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 6&lt;br /&gt;
(4x RJ45 und 2x SFP)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2&lt;br /&gt;
(2x SFP)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2&lt;br /&gt;
(2x RJ45)&lt;br /&gt;
|-&lt;br /&gt;
|NICs 2,5 Gbit (contained)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 8&lt;br /&gt;
(8x i226-LM)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
|-&lt;br /&gt;
| NICs 10 Gbit (contained)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2&lt;br /&gt;
(2x X553 N)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2&lt;br /&gt;
(2x X710)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
|-&lt;br /&gt;
| NICs 25 Gbit (contained)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Tniedermeier}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[de:Advantech Industrie Firewall Server]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Overview_of_virtualization_technologies</id>
		<title>Overview of virtualization technologies</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Overview_of_virtualization_technologies"/>
		<updated>2026-03-24T11:24:55Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;== Technologies ==   === Hardware emulation === In hardware emulation, all hardware components (CPU, chipset, I/O cards, etc.) are emulated. The CPU emulation translates hardware instructions from the emulated to the native CPU (for example emulation of PowerPC, ARM, SPARC, MIPS, ... on x86). This results in significant overhead and, consequently, a loss of performance.  Guest operation systems can be operated without adjustments.   Examples for hardware emulation: * [ht...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Technologies ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hardware emulation ===&lt;br /&gt;
In hardware emulation, all hardware components (CPU, chipset, I/O cards, etc.) are emulated. The CPU emulation translates hardware instructions from the emulated to the native CPU (for example emulation of PowerPC, ARM, SPARC, MIPS, ... on x86). This results in significant overhead and, consequently, a loss of performance.&lt;br /&gt;
&lt;br /&gt;
Guest operation systems can be operated without adjustments. &lt;br /&gt;
&lt;br /&gt;
Examples for hardware emulation:&lt;br /&gt;
* [http://bochs.sourceforge.net/ Bochs]&lt;br /&gt;
* [http://fabrice.bellard.free.fr/qemu/ QEMU]&lt;br /&gt;
* [http://pearpc.sourceforge.net/ PearPC]&lt;br /&gt;
* [http://de.wikipedia.org/wiki/Windows_Virtual_PC#Virtual_PC_f.C3.BCr_Mac Windows Virtual PC for Mac (PPC)] (no longer supported)&lt;br /&gt;
&lt;br /&gt;
=== Hardware virtualization ===&lt;br /&gt;
Similar to hardware emulation, numerous hardware components are emulated (chipset, I/O cards,...) However, the CPU is not emulated, but some CPU instructions are intercepted and adjusted. Therefore, only the CPU architecture can be used in the guest systems, which is also available physically in the host systems. However, performance is significantly higher than with hardware emulation.&lt;br /&gt;
&lt;br /&gt;
Guest operating systems can be operated without adjustments.&lt;br /&gt;
&lt;br /&gt;
Examples for hardware virtualization:&lt;br /&gt;
* [[VMware vSphere 5.5]], [http://www.vmware.com/products/workstation VMware Workstation]&lt;br /&gt;
* [[Microsoft Hyper-V]]&lt;br /&gt;
* [[VirtualBox]]&lt;br /&gt;
* [http://www.xenproject.org/ XEN] starting with version 3 and using Hardware Virtual Machine (HVM), requires an Intel VT/AMD-V CPU&lt;br /&gt;
&lt;br /&gt;
=== Paravirtualization ===&lt;br /&gt;
In paravirtualization, no hardware emulation takes place. The host offers instead a special API for hardware access. In the guest systems, only the CPU architecture can be used that is also available in the host system physically.&lt;br /&gt;
&lt;br /&gt;
Guest systems (kernel) must be adapted, but the ABI (Application Binary Interface) remains unchanged. &lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
* XEN&lt;br /&gt;
* VMware vSphere (paravirtualized device drivers, and previously also paravirtualized CPUs with VMI)&amp;lt;ref&amp;gt;[http://blogs.vmware.com/guestosguide/2009/09/vmi-retirement.html Update: Support for guest OS paravirtualization using VMware VMI to be retired from new products in 2010-2011] (blogs.vmware.com, 22.09.2009)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Operating system virtualization / container ===&lt;br /&gt;
There is also no emulation. There is only one kernel for host and guest system. Therefore, the guest operating system can only be the same operating system as the one running on the host (for example Linux on Linux, different distributions are possible). This technology has a low overhead, as no emulation takes place and syscalls pass through only one kernel, not two. Guest systems can be started within seconds. &lt;br /&gt;
&lt;br /&gt;
Examples: &lt;br /&gt;
* [[Linux Containers LXC]]&lt;br /&gt;
* [http://openvz.org/ OpenVZ]&lt;br /&gt;
* [http://linux-vserver.org/ Linux-VServer]&lt;br /&gt;
* [http://www.oracle.com/technetwork/server-storage/solaris/containers-169727.html Solaris Containers]&lt;br /&gt;
* [http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails.html FreeBSD Jails]&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [http://de.wikipedia.org/wiki/Virtualisierung_(Informatik) Virtualisierung (Informatik)] (de.wikipedia.org)&lt;br /&gt;
* [http://www.tecchannel.de/server/virtualisierung/2076934/ab_wann_lohnt_sich_virtualisierung_fuer_kmus/ Wann lohnt sich Virtualisierung für kleine und mittelständische Unternehmen?] (tecchannel.de, 13.01.2015)&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Fhettenbach}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Virtualization]]&lt;br /&gt;
[[pl:Przegląd technologii wirtualizacji]]&lt;br /&gt;
[[de:Virtualisierungstechnologien im Überblick]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/OPNsense_FAQ</id>
		<title>OPNsense FAQ</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/OPNsense_FAQ"/>
		<updated>2026-03-23T11:47:11Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;In this article, you will find answers on frequently asked questions about the Open Source firewall OPNsense.  {{#widget:Imagebox-left|link={{#tklink:type=sitex|id=19293|linkonly=1}}|image=/de/wikiDE/images/0/0f/OPNsense-Shopbanner.png|text=Click here for our OPNsense firewalls in the Thomas-Krenn online shop|campaign=OPNsense FAQs }} {{#widget:SitexBox|link={{#tklink:type=sitex|id=19293|linkonly=1}}|text=Click here for our OPNsense firewalls in the Thomas-Krenn onli...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In this article, you will find answers on frequently asked questions about the Open Source firewall [[OPNsense]].&lt;br /&gt;
&lt;br /&gt;
{{#widget:Imagebox-left|link={{#tklink:type=sitex|id=19293|linkonly=1}}|image=/de/wikiDE/images/0/0f/OPNsense-Shopbanner.png|text=Click here for our OPNsense firewalls in the Thomas-Krenn online shop|campaign=OPNsense FAQs }}&lt;br /&gt;
{{#widget:SitexBox|link={{#tklink:type=sitex|id=19293|linkonly=1}}|text=Click here for our OPNsense firewalls in the Thomas-Krenn online shop|campaign=OPNsense FAQs}}&lt;br /&gt;
&lt;br /&gt;
== FAQ ==&lt;br /&gt;
This paragraph lists answers on different questions about OPNsense.&lt;br /&gt;
&lt;br /&gt;
# Which servers are suitable for OPNsense?&lt;br /&gt;
#* You will find compatible and tested servers in the Thomas-Krenn online shop in the area &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;19293&amp;quot;&amp;gt;OPNsense Firewalls.&amp;lt;/tklink&amp;gt;&lt;br /&gt;
# Where can I find an overview about the most important data of Thomas-Krenn devices that are compatible with OPNsense?&lt;br /&gt;
#* [[Low Energy Systems (LES) Firewall Server]]&lt;br /&gt;
#* [[Intel based Thomas-Krenn Firewall Server]]&lt;br /&gt;
#* [[AMD based Thomas-Krenn Firewall Server]]&lt;br /&gt;
# Where can I find performance data on different Thomas-Krenn firewall servers?&lt;br /&gt;
#* The article [[Thomas-Krenn OPNsense Firewall Performance]] shows the systems tested on performance.&lt;br /&gt;
#* Additional systems are being added on an ongoing basis.&lt;br /&gt;
# The category [[:Category:OPNsense|OPNsense]] can be found in the Thomas-Krenn-Wiki.&lt;br /&gt;
#* Webinars on the OPNsense topic can be found on our Thomas-Krenn Youtube channel: [https://www.youtube.com/user/ThomasKrenn/videos ThomasKrenn]&lt;br /&gt;
#* In our company blog TKmag, there is also a lot of information on OPNsense: [https://www.thomas-krenn.com/de/tkmag/ TKmag | The expert magazine covering servers, storage, virtualization, and more.]&lt;br /&gt;
# How are network cables properly connected? Standard WAN and LAN port assignments&lt;br /&gt;
#* The article [[Thomas-Krenn OPNsense Firewalls network interfaces]] shows the correct cabling.&lt;br /&gt;
# How can additional interfaces be configured in the OPNsense web interface?&lt;br /&gt;
#* The article [[OPNsense add interface]] shows the required steps.&lt;br /&gt;
# How to install OPNsense?&lt;br /&gt;
#* Information can be found in the article [[Install OPNsense]].&lt;br /&gt;
# How to perform the basic configuration?&lt;br /&gt;
#* [[Install OPNsense#Configuration|Basic configuration after installation]]&lt;br /&gt;
# How to secure the configuration?&lt;br /&gt;
#* The configuration can be secured as[[OPNsense_installieren#Konfiguration_sichern| XML file]].&lt;br /&gt;
#* The XML-file can be encrypted, too.&lt;br /&gt;
# How to recreate the configuration. &lt;br /&gt;
#* Option 1: Via the web interface under System -&amp;gt; Configuration -&amp;gt; Backups, under the &amp;quot;Restore&amp;quot; heading.&lt;br /&gt;
#* Option 2: Via the [[OPNsense Konfiguration wiederherstellen|console of the OPNsense firewall]].&lt;br /&gt;
# Which OPNsense version ist the current version?&lt;br /&gt;
#* Information on the releases with the most important renewals can be found in the article [[OPNsense]].&lt;br /&gt;
# What options does OPNsense offer for VPN connections?&lt;br /&gt;
#* With an OPNsense firewall, you can set up VPNs using [[OpenVPN]], IPsec, and [[WireGuard]] (via plugin), among others; additional VPN technologies can also be added as plugins, just like WireGuard.&lt;br /&gt;
#* The VPN-techniques can be used for site-to-site and also for Roadwarrior.&lt;br /&gt;
#* [[OPNsense OpenVPN für Road Warrior einrichten|Setup for OPNsense OpenVPN for Road Warrior]] &lt;br /&gt;
#* [[Installation of OPNsense OpenVPN instances site-to-site]]&lt;br /&gt;
#* [[OPNsense_OpenVPN_Performance_Tests#OpenVPN_Einstellungen|OpenVPN Site-to-Site settings]] between two OPNsense firewalls &lt;br /&gt;
#* [[OPNsense WireGuard VPN for Road Warrior configuration]]&lt;br /&gt;
#* [[OPNsense OpenVPN performance tests and results]]&lt;br /&gt;
#* [[OPNsense_IPsec_Performance_Tests#IPsec_Einstellungen|IPsec Site-to-Site settings]] between two OPNsense firewalls &lt;br /&gt;
#* A concrete configuration recommendation for a IPsec Roadwarrior configuration does not exist. It is important to always take the end device into account. A Windows 10 client requires different settings than an Android or iOS device.&lt;br /&gt;
# Are Chelsio, Mellanox, and Broadcom network cards supported by OPNsense?&lt;br /&gt;
#* Yes, but the driver must be activated manually: [[OPNsense Chelsio Mellanox Broadcom Netzwerkkarten-Treiber aktivieren|Activation of OPNsense Chelsio Mellanox Broadcom network cards driver]]&lt;br /&gt;
#* &amp;#039;&amp;#039;&amp;#039;Hint:&amp;#039;&amp;#039;&amp;#039; Broadcom cards are activated automatically with the release of the OPNsense 24.7 version.&lt;br /&gt;
# Is it possible to connect two OPNsense firewalls to form a cluster?&lt;br /&gt;
#* Yes, you will also find an article on how to [[OPNsense HA Cluster configuration]].&lt;br /&gt;
#* [[OPNsense_HA_Cluster_einrichten#Anforderungen|Requirements for hardware]]&lt;br /&gt;
# The dashboard of the OPNsense firewall shows no CPU temperatures. &lt;br /&gt;
#* There is an article on how to [[CPU Temperaturen in OPNsense anzeigen|Display CPU temperatures in OPNsense]]&lt;br /&gt;
&lt;br /&gt;
== Selection of suitable hardware ==&lt;br /&gt;
When making your selection, please keep the following points in mind:&lt;br /&gt;
* Location (fanless system for office or 19&amp;quot; rack server)&lt;br /&gt;
* Front-IO system or classic rack server&lt;br /&gt;
* One or two power supplies&lt;br /&gt;
* Number of required 1 GBit, 10 GBit or &amp;gt;25 Gbit network interfaces&lt;br /&gt;
* Required CPU performance&lt;br /&gt;
** OpenVPN: high-clock-speed CPU, for example Xeon-E or Xeon Silver: &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;20460&amp;quot;&amp;gt;RI1101-SMXEFH&amp;lt;/tklink&amp;gt;&lt;br /&gt;
** IPsec VPN Tunnel: If you need a throughput of 1 Gbps or more, choose a Xeon-E CPU or Xeon Silver: &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;20460&amp;quot;&amp;gt;RI1101-SMXEFH&amp;lt;/tklink&amp;gt;&lt;br /&gt;
** Proxy: Number of cores is more important than clock speed&lt;br /&gt;
* Required size of RAM&lt;br /&gt;
** Operation of firewall with basic funtions and VPN services: 4GB RAM (50 or more users: 8 GB RAM)&lt;br /&gt;
** In addition with Intrusion Detection (IDS), Intrusion Prevention (IPS) or Proxy: 8GB RAM (50 or more users: 16GB RAM)&lt;br /&gt;
** When operating Zenarmor: 16GB RAM (250 or more users: 32GB RAM)&lt;br /&gt;
* Hardware compatibility with the firewall solution&amp;#039;s operating system ([[FreeBSD]] for OPNsense or pfSense, [[Linux]] for ipFire)&lt;br /&gt;
* Recommendation of manufacturer, see for example [[Hardwareanforderungen OPNsense|Hardware requirements for OPNsense]]&lt;br /&gt;
&lt;br /&gt;
== Commissioning of Pre-Installed OPNsense firewalls ==&lt;br /&gt;
You can also purchase pre-installed OPNsense firewalls from Thomas-Krenn.&lt;br /&gt;
In the article [[Inbetriebnahme vorinstallierter Thomas-Krenn OPNsense Firewalls|Commissioning of pre-installed Thomas-Krenn OPNsense firewalls]], you will find information how to properly set up and further configure pre-installed systems.&lt;br /&gt;
&lt;br /&gt;
== OPNsense Business Edition == &lt;br /&gt;
In this paragraph, you will find important information on OPNsense Business edition.&lt;br /&gt;
&lt;br /&gt;
# Which additional functions are offered by the OPNsense business edition?&lt;br /&gt;
#* Information on [[OPNsense Business Edition]]&lt;br /&gt;
# Where can I buy the OPNsense Business Edition subscription?&lt;br /&gt;
#* You can add the Business Edition subscription to your order when purchasing an OPNsense-compatible server.&lt;br /&gt;
#* You can also buy Business Edition subscriptions separately via &amp;lt;tklink type=&amp;quot;configurator&amp;quot; detail=&amp;quot;configurator&amp;quot; id=27314 /&amp;gt;&lt;br /&gt;
# How can I activate OPNsense Business Edition?&lt;br /&gt;
#* The Business Edition can be easily activated using the activation key after purchasing a subscription: [[Activate OPNsense Business Edition license]]&lt;br /&gt;
# Is there a specific timeline for when the new OPNsense Business Edition will be released?&lt;br /&gt;
#* Yes, on April 12, 2021, a time table has been defined that is valid for all future business edition releases. It is now published every April and October as a separate issue.&amp;lt;ref&amp;gt;[https://forum.opnsense.org/index.php?&lt;br /&gt;
topic=22602.msg OPNsense business edition 21.4 released] (forum.opnsense.org)&amp;lt;/ref&amp;gt;&lt;br /&gt;
#* Be sure to check the OPNsense interface regularly for available updates.&lt;br /&gt;
# Is there a notification when the business edition subscription expires or is there a function to extend it automatically.&lt;br /&gt;
#* No, this fuction is not available. The subscriptions expire automatically.&lt;br /&gt;
#* In the OPNsense dashboard, you will find an entry called &amp;#039;&amp;#039;Licensed until DATE&amp;#039;&amp;#039; in the &amp;#039;&amp;#039;&amp;#039;System Information&amp;#039;&amp;#039;&amp;#039; widget in the &amp;#039;&amp;#039;&amp;#039;Version&amp;#039;&amp;#039;&amp;#039; line. &lt;br /&gt;
# What happens, when you forget to extend the Business Edition? Will updates still work?&lt;br /&gt;
#* Of course, you can always switch back to the regular OPNsense update mirror and continue to receive updates through it.&lt;br /&gt;
# Is there a separate extension of the subscription and if so, how are they different?&lt;br /&gt;
#* No, there are no separate extensions of the subscription.&lt;br /&gt;
# Are two OPNsense Business Edition subscriptions required when using an HA cluster?&lt;br /&gt;
#* Yes, one subscription is required per machine.&lt;br /&gt;
&lt;br /&gt;
== Questions from the Webinar Q&amp;amp;A: Open Source Firewall OPNsense (with m.a.x. it) (as of June 5, 2024) ==&lt;br /&gt;
Here, you will find all questions from the Q&amp;amp;A that have not been answered yet: Open Source Firewall OPNsense (mit m.a.x. it) listed with the answers:&lt;br /&gt;
&lt;br /&gt;
# Are there experiences with updates of the community version?&lt;br /&gt;
#* Wait for the release upgrade to the .4 or .5 point release&lt;br /&gt;
#* There have been a lot of hotfix updates for the Community Edition lately, as issues have kept cropping up.&lt;br /&gt;
#* In a corporate environment, it’s best to use the OPNsense Business Edition, as this provides three major update packages per release instead of about 10.&lt;br /&gt;
# If not solved in the current version: Problems with DHCP-Relay over a site-to-site VPN-connection?&lt;br /&gt;
#* This should be possible with the Kea-DHCP.&lt;br /&gt;
# How suitable is the OPNsense firewall for the use of, for example, Sophos UTM solutions?&lt;br /&gt;
#* In general, a lot of functions can be represented with OPNsense and plugins.&lt;br /&gt;
#* It depends on the use application case, an additional software (for example Zenarmor) is required for some functions.&lt;br /&gt;
#* WLAN, SD-RED, Userportal and email quarantine is not available for OPNsense&lt;br /&gt;
# What are the general costs associated with purchase and operation?&lt;br /&gt;
#* The hardware costs depend on the size of the network, the desired throughput, and the required features (IDS/IPS or VPNs).&lt;br /&gt;
#** The cost of an OPNsense appliance starts at under 400 euros for a LES device; robust rack servers cost around 1,500 euros, but prices for a high-end HA cluster with two devices can exceed 10,000 euros. For a suitable sizing, it is best to directly contact our experts.&lt;br /&gt;
#** The price depends on a lot of factors, for example performant CPUs or additional network cards.&lt;br /&gt;
#* Software costs either free of charge with the Community Edition or 149 per year with the business edition.&lt;br /&gt;
#* Other ongoing costs include maintenance or support contracts; these costs vary depending on your needs.&lt;br /&gt;
# What resources are available for those new to the subject?&lt;br /&gt;
#* Webinars on the OPNsense topic, for example: [https://www.thomas-krenn.com/de/tkmag/webinare/opnsense-fuer-anwender-wie-sie-die-firewall-richtig-nutzen-und-absichern/ OPNsense for applicators – How to use and secure the firewall correctly]&lt;br /&gt;
#* [https://forum.opnsense.org/index.php OPNsense Forum]&lt;br /&gt;
#* [https://docs.opnsense.org/index.html OPNsense Documentation]&lt;br /&gt;
#* [https://www.zenarmor.com/docs/ Zenarmor User Guide]&lt;br /&gt;
#* Thomas-Krenn-Wiki category [[:Kategorie:OPNsense|OPNsense]]&lt;br /&gt;
&lt;br /&gt;
== Questions from the OPNsense Q&amp;amp;A webinar - with m.a.x. it (as of March 25, 2021) ==&lt;br /&gt;
Here, you will find all questions that have not been answered yet from [https://www.thomas-krenn.com/de/tkmag/webinare/opnsense-qa-webinar/ Large OPNsense Q&amp;amp;A webinar – with m.a.x. it] listed with answers:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Questions about VPN topics&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
# Which setup is recommended if you want to connect &amp;#039;&amp;#039;&amp;#039;10 sites with the same IP subnet&amp;#039;&amp;#039;&amp;#039; per VPN? In the past, this was resolved in pfSense using a &amp;#039;&amp;#039;&amp;#039;Transfer NAT&amp;#039;&amp;#039;&amp;#039; network with OpenVPN certificates. &lt;br /&gt;
#* 10 locations on the same subnet—you shouldn&amp;#039;t do that; alternatively, renumber them. Otherwise, it is also possible with NAT, but quite complicated. Our recommendation is to renew the subnets.&lt;br /&gt;
# What is the best practice when setting up a default gateway and multiple gateways for specific networks? Should you select the default gateway as the “IPv4 Upstream Gateway” for the interface? Or is it better to use auto-detect and then check the box for &amp;quot;Upstream Gateway&amp;quot; (or, depending on the version: &amp;quot;Default Gateway&amp;quot;) under &amp;#039;&amp;#039;System -&amp;gt; Gateways -&amp;gt; Single&amp;#039;&amp;#039;? What if you have multiple uplinks (System/Gateways/Group)? Do you then select the upstream gateway for all interfaces? And how do you specify which gateway OpnSense’s own services (WireGuard, OpenVPN, etc.) should use?&lt;br /&gt;
#* Allowing the upstream gateway on the interface enables true multi-WAN. PF rules are set so that a package so that a packet that comes in on Line B also goes out on that line. Upstream gateway checkbox in gateways simply means that this gateway can also be used as the default gateway if &amp;#039;&amp;#039;Default GW Switching&amp;#039;&amp;#039; is active in &amp;#039;&amp;#039;System -&amp;gt; Settings -&amp;gt; General&amp;#039;&amp;#039;. For more details, feel free to ask about this on the OPNsense forum.&lt;br /&gt;
# How suitable is &amp;#039;&amp;#039;&amp;#039;OPNsense as a central server for VPN road warriors&amp;#039;&amp;#039;&amp;#039; for installations? Is there any way to automate the deployment of the client configuration here?&lt;br /&gt;
#* The OPNsense export feature can be accessed via the API, so you could write a script for it; there isn&amp;#039;t anything off-the-shelf available at the moment.&lt;br /&gt;
# How to set a WireGuard connection as interface?&lt;br /&gt;
#*  Once you have configured and enabled the WireGuard service, you can assign an interface to wg0, for example, in the Interfaces -&amp;gt; Assign Interfaces section.&lt;br /&gt;
# Is it possible to &amp;#039;&amp;#039;&amp;#039;NAT for IPSec connections&amp;#039;&amp;#039;&amp;#039;? For IPsec, no corresponding interface is available when selecting NAT rules.&lt;br /&gt;
#* Yes, you have to look for BINAT in the documentation. The company m.a.x. it has also sponsored the development for more P2 with NAT together with OPNsense 21.1.&lt;br /&gt;
# Is there the opportunity in &amp;#039;&amp;#039;&amp;#039;IPsec&amp;#039;&amp;#039;&amp;#039;, to allocate SPD policies to several phase 2 tunnels?  (source NAT, multiple internal nets) &lt;br /&gt;
#* Yes, this has been sponsored by m.a.x. it with OPNsense 21.1.&lt;br /&gt;
#* Is it known that &amp;#039;&amp;#039;&amp;#039;WireGuard&amp;#039;&amp;#039;&amp;#039; occasionally stops the traffic. Turning the service off and then back on will restore everything to normal.&lt;br /&gt;
#* Which &amp;#039;&amp;#039;&amp;#039;plugins&amp;#039;&amp;#039;&amp;#039; are a must have? Which client-VPN is advantageous for OPNsense? IPsec (Cisco-NCP-bintec-lancom), Wireguard or OpenVPN?&lt;br /&gt;
#* The fewer plugins, the better. OpenVPN is best for ClientVPN.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Questions on firewall topics&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
# Is there the option &amp;quot;were used&amp;quot; in the Firewall -&amp;gt; Alias section to find out, which rules are used by the &amp;#039;&amp;#039;&amp;#039;Alias&amp;#039;&amp;#039;&amp;#039;? &lt;br /&gt;
#* No, as soon as the firewall rules and NAT are migrated on API, it would be worth a feature request for OPNsense. This function is known by Cisco ASA and Sophos systems. &lt;br /&gt;
# Does an OPNsense-firewall help with a recent exchange attack?&lt;br /&gt;
#* No, that would be too late. The Nginx plugin has a WAF ( Web Application Firewall). In our opinion, however, that would not have worked here.&lt;br /&gt;
# How is an &amp;#039;&amp;#039;&amp;#039;additional filter in the firewall live log&amp;#039;&amp;#039;&amp;#039; activated?&lt;br /&gt;
#* In the firewall live log, an additional filter gets active, when it is created and added with +.&lt;br /&gt;
#&amp;#039;&amp;#039;&amp;#039;Blocker for malicious hosts in the Internet&amp;#039;&amp;#039;&amp;#039; can be set up on different levels. When and where should you use a blocker: DNS, pf-Rule, Suricata?&lt;br /&gt;
#* DNS blacklisting and the FireHOL is sufficient.&lt;br /&gt;
#&amp;#039;&amp;#039;&amp;#039;Use OPNsense as a gateway&amp;#039;&amp;#039;&amp;#039; to the Internet for specific applications and monitor data traffic: Create FW-rules with, for example, *.teamviewer.com? Evaluate data traffic and generate alerts?&lt;br /&gt;
#* *. DNS Alias does not work. For this, the proxy is needed.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Performance questions&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
# A &amp;#039;&amp;#039;&amp;#039;performance comparison&amp;#039;&amp;#039;&amp;#039; between pfSense and OPNsense (Internal firewalling without IPS to isolate/protect services yielded the following results: 3Gbit/s were reached with pfSense and 900Mbit with OPNsense. The tests have been performed on the identical hardware, each as a VMware VM. Have there been any improvements to OPNsense in the meantime?&lt;br /&gt;
#* Yes and no, pfSense uses better default settings. So, the settings in OPNsense need to be adjusted accordingly. However, one customer is achieving throughput speeds of 6 Gbps using a VMware VM (OPNsense 20.1)—could the problem actually be with the VM?&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;General questions&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
# Is it possible to rebuild the &amp;#039;&amp;#039;&amp;#039;webfilter reporting&amp;#039;&amp;#039;&amp;#039; of a Sophos UTM with OPNsense?&lt;br /&gt;
#* Yes, but it would take a lot of effort; you&amp;#039;re better off checking out the Sensei plugin.&lt;br /&gt;
# Is there a &amp;#039;&amp;#039;&amp;#039;graphic mail log&amp;#039;&amp;#039;&amp;#039; as with Sophos UTM?&lt;br /&gt;
#* Yes, Rspamd has a web console that can be accessed via port forwarding to localhost on port 11334.&lt;br /&gt;
# Is it possible to setup a watchdog function for OPNsense services via &amp;#039;&amp;#039;&amp;#039;Monit&amp;#039;&amp;#039;&amp;#039;? Is there a documentation on all relevant services?&lt;br /&gt;
#* Yes, but only manually. In the comprehensive OPNsense documentation covering all relevant services, you will also find a section on [https://docs.opnsense.org/manual/monit.html Monit].&lt;br /&gt;
# Is there something like a &amp;#039;&amp;#039;&amp;#039;Packet Tracer Policy Lookup&amp;#039;&amp;#039;&amp;#039; in OPNsense?&lt;br /&gt;
#* No, this is not available.&lt;br /&gt;
# When will &amp;#039;&amp;#039;&amp;#039;ZFS as a file system option&amp;#039;&amp;#039;&amp;#039; finally be available during installation? &lt;br /&gt;
#* Eventually with OPNsense 22.1. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Questions on high availability cluster&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
# In a &amp;#039;&amp;#039;&amp;#039;HA-compound (currently 2 cores)&amp;#039;&amp;#039;&amp;#039;, Squid should always appear to the outside world with the same source IP, regardless of the node (VIP from a /27 net). How can this be configured?&lt;br /&gt;
#* This should function with outbound NAT.&lt;br /&gt;
# In a test setup, I set up two OPNsense firewalls in a VMware environment and created a high-availability cluster following the Thomas-Krenn instructions. &amp;quot;Disable preempt&amp;quot; has been activated. However, in the event of a failover (when a NIC is disconnected), only that one IP address is moved to Firewall 2, not all IP addresses. Is this the desired behaviour?&lt;br /&gt;
#* Never click on disable preempt! HA in VMware requires adjustments on ESX via CLI.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Hardware and hypervisor-related questions&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
# How can you determine whether a &amp;#039;&amp;#039;&amp;#039;NIC is suitable for Suricata in IPS mode with VLANs&amp;#039;&amp;#039;&amp;#039; (keyword: netmap)? The driver groups listed by FreeBSD are not really helpful (em, re, etc.). In practice, many NICs prove to be unstable.&lt;br /&gt;
#*This was explained in the webinar.&lt;br /&gt;
# Which procedure (also with regard to performance) would be more recommendable: VLANs on fewer NICs or for every VLAN an individual dedicated NIC?&lt;br /&gt;
#* This was explained in the webinar.&lt;br /&gt;
# Is OPNsense compatible with &amp;#039;&amp;#039;&amp;#039;AMD Ryzen CPUs&amp;#039;&amp;#039;&amp;#039;?&lt;br /&gt;
#* Yes, take a look at our AMD-based servers in the Thomas-Krenn online shop.&lt;br /&gt;
# Are there any experiences with &amp;#039;&amp;#039;&amp;#039;OPNsense and VXLAN&amp;#039;&amp;#039;&amp;#039;?&lt;br /&gt;
#* It&amp;#039;s possible, but unfortunately we don&amp;#039;t have any experience with it. It&amp;#039;s usually done at the hypervisor level.&lt;br /&gt;
# How can I add &amp;#039;&amp;#039;&amp;#039;multiple LAN interfaces in a virtual OPNsense environment?&lt;br /&gt;
#* Once they&amp;#039;re added via the hypervisor, they&amp;#039;ll also appear in the system. Attention: This messes up all existing interfaces, and they must be corrected via the console.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Questions on OPNsense Business Edition&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
# We operate a OPNsense-HA-cluster (V. 20.7.8) on a dedicated Thomas-Krenn hardware including an activated &amp;#039;&amp;#039;&amp;#039;Business Edition&amp;#039;&amp;#039;&amp;#039;. Should we already upgrade to version 21.x?&lt;br /&gt;
#* OPNsense 21.1 is not yet available for business edition users.&lt;br /&gt;
# What is next for &amp;#039;&amp;#039;&amp;#039;centralized management of multiple OPNsense firewalls&amp;#039;&amp;#039;&amp;#039;? As far as we know, this feature is only available in the Business Edition; I haven&amp;#039;t used it yet. Is it useful, and what can you tell us about central management?&lt;br /&gt;
#* Only the LITE features, such as upgrades and the WebUI, are available. Policy rollouts are not supported.&lt;br /&gt;
&lt;br /&gt;
{{Tniedermeier}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:OPNsense]]&lt;br /&gt;
[[de:OPNsense FAQs]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Update_Intel_Microcode_under_VMware</id>
		<title>Update Intel Microcode under VMware</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Update_Intel_Microcode_under_VMware"/>
		<updated>2026-03-20T10:44:37Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;VMware regularly releases microcode updates for Intel CPUs for ESXi. After installing such updates, new Intel Microcode versions are installed during the starting process. In this article, we show how to &amp;#039;&amp;#039;&amp;#039;verify the Microcode version&amp;#039;&amp;#039;&amp;#039; on a server with VMware ESXi 6.7 and &amp;#039;&amp;#039;&amp;#039;install newer microcode versions as needed&amp;#039;&amp;#039;&amp;#039;.  == Example of setup == In this example, we use the following setup: * Server with ASUS P10S-M Mainboard with BIOS version 4401 (notifica...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;VMware regularly releases microcode updates for Intel CPUs for ESXi. After installing such updates, new [[Intel Microcode]] versions are installed during the starting process. In this article, we show how to &amp;#039;&amp;#039;&amp;#039;verify the Microcode version&amp;#039;&amp;#039;&amp;#039; on a server with [[VMware ESXi 6.7]] and &amp;#039;&amp;#039;&amp;#039;install newer microcode versions as needed&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
== Example of setup ==&lt;br /&gt;
In this example, we use the following setup:&lt;br /&gt;
* Server with [[ASUS P10S-M Mainboard]] with BIOS version 4401 (notification: This example is not on the VMware HCL)&lt;br /&gt;
* VMware ESXi 6.7 (directly after installation, for now, without applying any patches)&lt;br /&gt;
&lt;br /&gt;
The test was conducted on August 27, 2018, using the latest available BIOS, microcode, and software versions at that time. This clearly demonstrates how the latest security updates—both microcode and software updates—can be applied in security-critical environments.&lt;br /&gt;
&lt;br /&gt;
== Read out BIOS version ==&lt;br /&gt;
First, verify the BIOS version:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@localhost:~] esxcfg-info | grep -i bios&lt;br /&gt;
      |----BIOS UUID................................................0x50 0xaa 0xab 0xc 0x5d 0x93 0x17 0x2c 0x39 0x7b 0x2c 0x4d 0x54 0x47 0xd 0xc1&lt;br /&gt;
      |----BIOS Vendor..............................................American Megatrends Inc.&lt;br /&gt;
      |----BIOS Version.............................................4401&lt;br /&gt;
      |----BIOS ReleaseDate.........................................2018-03-05T00:00:00&lt;br /&gt;
      |----BIOS Asset Tag...........................................To Be Filled By O.E.M.&lt;br /&gt;
               |----Name............................................HardwareSMBIOSHeap&lt;br /&gt;
                           |----Group Name..........................HardwareSMBIOS&lt;br /&gt;
            |----World Command Line.................................grep -i bios&lt;br /&gt;
            |----Option Name........................................ignoreHwSMBIOSInfo&lt;br /&gt;
[root@localhost:~]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it is a Thomas-Krenn system, the latest BIOS version for the mainboard can be found in the [[BIOS security updates]] article. In this example, the latest BIOS-version available is already existing.&lt;br /&gt;
&lt;br /&gt;
== Read out current Microcode version ==&lt;br /&gt;
[[File:Microcode-Update-Guidance-20180808-Page-12.png|thumb|right|In the Microcode Update Guidance dated August 8, 2018 (see [[Intel Microcode#Microcode Versions|Intel Microcode - Microcode Versions]]),  Intel lists the new microcode version 0x8E is listed for the Xeon E3-1220 v6 processor used in this example.]]&lt;br /&gt;
&lt;br /&gt;
The currently available Microcode version can be read out on the SSH shell with the &amp;#039;&amp;#039;&amp;#039;vsish&amp;#039;&amp;#039;&amp;#039; command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@localhost:~] vsish -e cat /hardware/cpu/cpuModelName&lt;br /&gt;
Intel(R) Xeon(R) CPU E3-1220 v6 @ 3.00GHz&lt;br /&gt;
[root@localhost:~] vsish -e cat /hardware/cpu/cpuList/0 | grep -i -E &amp;#039;family|model|stepping|microcode|revision&amp;#039;&lt;br /&gt;
   Family:6&lt;br /&gt;
   Model:158&lt;br /&gt;
   Stepping:9&lt;br /&gt;
   Number of microcode updates:0&lt;br /&gt;
   Original Revision:0x00000084&lt;br /&gt;
   Current Revision:0x00000084&lt;br /&gt;
[root@localhost:~]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this example, the current Microcode version 0x84 is available.&lt;br /&gt;
&lt;br /&gt;
Intel provides information on available Microcode versions in the &amp;#039;&amp;#039;Microcode Update Guidance&amp;#039;&amp;#039; document (see [[Intel Microcode#Microcode Versionen|Intel Microcode - Microcode versions]]). In this document, CPUs are listed by their [[CPUID]] (not by family/model/stepping). In the full output of the vsish cpuList command, the CPUID can be found in the &amp;quot;1:CPUID leaf&amp;quot; section under &amp;quot;EAX&amp;quot; (in this example, 0x906e9):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@localhost:~] vsish -e cat /hardware/cpu/cpuList/0&lt;br /&gt;
CPU information {&lt;br /&gt;
   Family:6&lt;br /&gt;
   Model:158&lt;br /&gt;
   Type:0&lt;br /&gt;
   Stepping:9&lt;br /&gt;
[...]&lt;br /&gt;
   CPUID:CPUID content {&lt;br /&gt;
      0:CPUID leaf {&lt;br /&gt;
         EAX:0x00000016&lt;br /&gt;
         EBX:0x756e6547&lt;br /&gt;
         ECX:0x6c65746e&lt;br /&gt;
         EDX:0x49656e69&lt;br /&gt;
      }&lt;br /&gt;
      1:CPUID leaf {&lt;br /&gt;
         EAX:0x000906e9&lt;br /&gt;
[...]&lt;br /&gt;
   Number of microcode updates:0&lt;br /&gt;
   Original Revision:0x00000084&lt;br /&gt;
   Current Revision:0x00000084&lt;br /&gt;
[...]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Alternatively, the CPUID can be determined in the following way based on Familiy/Model/Stepping:&lt;br /&gt;
# Note Family/Model/Stepping in Hex format. The /proc/cpuinfo file outputs the values in decimal format:&lt;br /&gt;
#* Family: 6 -&amp;gt; 0x6&lt;br /&gt;
#* Model: 158 -&amp;gt; 0x9e&lt;br /&gt;
#* Stepping: 9 -&amp;gt; 0x9&lt;br /&gt;
# The CPUID has the setup &amp;#039;&amp;#039;&amp;#039;0FFM0FMS&amp;#039;&amp;#039;&amp;#039;. Now work your way from the back to the front to determine the CPUID based on Family/Model/Stepping:&lt;br /&gt;
# S (Stepping) = 9&lt;br /&gt;
# M (last digit of the model number) before: e9&lt;br /&gt;
# F (Family) before = 6e9&lt;br /&gt;
# The digit 0 before = 06e9&lt;br /&gt;
# Model (penultimate digit of the model number) before that = &amp;#039;&amp;#039;&amp;#039;906e9&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
When searching for &amp;quot;906e9&amp;quot; in the &amp;quot;Microcode Update Guidance&amp;quot; document dated August 8, 2018, the &amp;quot;New Production MCU Rev&amp;quot; column lists microcode version &amp;quot;0x8E&amp;quot;. In this case, Intel is providing a newer microcode version than the one currently installed on the system.&lt;br /&gt;
&lt;br /&gt;
=== Install patch ===&lt;br /&gt;
VMware provides Microcode updates together with other patches for download.&lt;br /&gt;
&lt;br /&gt;
Install all available updates (as described in the article [[Update VMware ESXi]]). In this example, the ESXi670-201808402-BG update is contained, which contains the new Microcode.&amp;lt;ref&amp;gt;[https://kb.vmware.com/s/article/56538 VMware ESXi 6.7, Patch Release ESXi670-201808402-BG - Updates cpu-microcode VIB] (VMware aknowledge base article 56538)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Query microcode ===&lt;br /&gt;
Checking the microcode version after applying the patches and restarting the host shows the new microcode version 0x8E:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@localhost:~] vsish -e cat /hardware/cpu/cpuList/0 | grep -i -E &amp;#039;family|model|stepping|microcode|revision&amp;#039;&lt;br /&gt;
   Family:6&lt;br /&gt;
   Model:158&lt;br /&gt;
   Stepping:9&lt;br /&gt;
   Number of microcode updates:1&lt;br /&gt;
   Original Revision:0x00000084&lt;br /&gt;
   Current Revision:0x0000008e&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://blogs.vmware.com/vsphere/2015/05/using-esxi-6-0-cpu-microcode-loading-feature.html Using the ESXi 6.0 CPU Microcode Loading Feature] (blogs.vmware.com, 08.05.2015)&lt;br /&gt;
&lt;br /&gt;
{{Wfischer}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Intel]][[Category:VMware]]&lt;br /&gt;
[[pl:Aktualizacja mikrokodu firmy Intel w VMware]]&lt;br /&gt;
[[de:Intel Microcode unter VMware aktualisieren]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Linkspeed_configuration_of_Broadcom_network_cards</id>
		<title>Linkspeed configuration of Broadcom network cards</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Linkspeed_configuration_of_Broadcom_network_cards"/>
		<updated>2026-03-17T13:17:10Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When integrating Broadcom network cards in Linux distributions, the linkspeed may differ from the expected value. This value can be configured later with the help of &amp;#039;&amp;#039;&amp;#039;firmware utility bnxtnvm&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
This article describes the verification and configuration of the linkspeeds with the help of bnxtnvm/NICCLI.&lt;br /&gt;
&lt;br /&gt;
Before you start, follow this article for the [[Activation of maintenance mode in Proxmox VE|Activation of maintenance mode in Proxmox VE]].&lt;br /&gt;
==Verification of linkspeed==&lt;br /&gt;
Due to the mixed operation of different linkspeeds, individual ports may be out of service. In a production environment, this manifests itself as missing connections and/or reduced network speeds, for example, when operating a server cluster with mesh cabling. All transceivers of the configured network card must be also removed. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Hint:&amp;#039;&amp;#039;&amp;#039; Please note the [[Broadcom network cards|Compatibility of linkspeeds]]. Certain Broadcom cards support only certain or no mixed operations.&lt;br /&gt;
&lt;br /&gt;
Here is an example for a defective issue: root@PMX1:~# ethtool enp67s0f0np0 &lt;br /&gt;
 Settings for enp67s0f0np0:&lt;br /&gt;
        Supported ports: [ FIBRE ]&lt;br /&gt;
        Supported link modes:   10000baseT/Full&lt;br /&gt;
                                25000baseCR/Full&lt;br /&gt;
        Supported pause frame use: Symmetric Receive-only&lt;br /&gt;
        Supports auto-negotiation: Yes&lt;br /&gt;
        Supported FEC modes: RS  BASER&lt;br /&gt;
        &amp;#039;&amp;#039;&amp;#039;Advertised link modes:  10000baseT/Full&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
        Advertised pause frame use: No&lt;br /&gt;
        Advertised auto-negotiation: Yes&lt;br /&gt;
        Advertised FEC modes: RS         BASER&lt;br /&gt;
        Speed: 10000Mb/s&lt;br /&gt;
        Duplex: Full&lt;br /&gt;
        Auto-negotiation: on&lt;br /&gt;
        Port: Direct Attach Copper&lt;br /&gt;
        PHYAD: 0&lt;br /&gt;
        Transceiver: internal&lt;br /&gt;
        Supports Wake-on: g&lt;br /&gt;
        Wake-on: d&lt;br /&gt;
        Current message level: 0x00002081 (8321)&lt;br /&gt;
                               drv tx_err hw&lt;br /&gt;
        Link detected: yes&lt;br /&gt;
Under &amp;quot;Advertised link modes&amp;quot;, only the speed is displayed (10 Gb/s), although the network card could run on 25 Gb/s.&lt;br /&gt;
== Linkspeed configuration with bnxtnvm==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Hint:&amp;#039;&amp;#039;&amp;#039; If you are using a mesh network, you may need to disconnect the direct cabling of the systems to be configured before beginning the configuration process. The other systems can remain connected to each other. &lt;br /&gt;
&lt;br /&gt;
To reach the desired and full functionality of the network cards, you must force the network cards to use the desired speed using bnxtnvm.&lt;br /&gt;
&lt;br /&gt;
bnxtnvm can be downloaded in the [https://www.thomas-krenn.com/redx/tools/mb_download.php/ct.YuuHGw/mid.y9b3b4ba2bf7ab3b8/bnxtnvm.zip?utm_source=thomas-krenn.com&amp;amp;utm_medium=RSS-Feed&amp;amp;utm_content=Broadcom%20bnxtnvm%20Firmware%20Update%20Utility&amp;amp;utm_campaign=Downloads Thomas-Krenn download area] for your Windows systems or use the following commands on your Linux systems:&amp;lt;pre lang=&amp;quot;bash&amp;quot; start=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
wget https://www.thomaskrenn.com/redx/tools/mb_download.php/ct.YuuHGw/mid.y9b3b4ba2bf7ab3b8/bnxtnvm.zip &amp;amp;&amp;amp;&lt;br /&gt;
unzip bnxtnvm.zip &amp;amp;&amp;amp;&lt;br /&gt;
chmod +x bnxtnvm&lt;br /&gt;
&amp;lt;/pre&amp;gt;Next, you&amp;#039;ll need to enter a series of commands to adjust your system to the desired speed:&lt;br /&gt;
=== Reading configurable speeds ===&lt;br /&gt;
In the first step, the driver linkspeed IDs of the network card are required: &lt;br /&gt;
 ./bnxtnvm  -dev=enp67s0f0np0 optionhelp=drv_link_speed&lt;br /&gt;
Issue:&amp;lt;pre lang=&amp;quot;bash&amp;quot;&amp;gt;d&lt;br /&gt;
Name                   : drv_link_speed&lt;br /&gt;
Description            : Driver Link speed&lt;br /&gt;
Option Type            : Multi Instance Type&lt;br /&gt;
Max Instance Indexes   : 0 to 15&lt;br /&gt;
Valid values           :&lt;br /&gt;
  0 (Autoneg)&lt;br /&gt;
  1 (1G)&lt;br /&gt;
  2 (10G)&lt;br /&gt;
  3 (25G)&lt;br /&gt;
  4 (40G)&lt;br /&gt;
  5 (50G)&lt;br /&gt;
  6 (100G)&lt;br /&gt;
  7 (200G_PAM4)&lt;br /&gt;
  8 (50G_PAM4)&lt;br /&gt;
  9 (100G_PAM4)&lt;br /&gt;
  14 (5G)&lt;br /&gt;
  15 (100M)&lt;br /&gt;
&amp;lt;/pre&amp;gt;The linkspeed ID is required for the enforcement of the desired linkspeed.&lt;br /&gt;
===Configuration of linkspeed===&lt;br /&gt;
The linkspeed is now set with the help of the linkspeed ID:&amp;lt;pre lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
./bnxtnvm -dev=enp67s0f0np0 setoption=drv_link_speed:0#3&lt;br /&gt;
&lt;br /&gt;
./bnxtnvm -dev=enp67s0f0np0 setoption=firmware_link_speed_d0:0#3&lt;br /&gt;
&lt;br /&gt;
./bnxtnvm -dev=enp67s0f0np0 setoption=firmware_link_speed_d3:0#3&lt;br /&gt;
&amp;lt;/pre&amp;gt;Explanation of the commands:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Interface-ID||Option||Port|| Linkspeed-ID&lt;br /&gt;
|-&lt;br /&gt;
|enp67s0f0np0||drv_link_speed||0||3&lt;br /&gt;
|-&lt;br /&gt;
|enp67s0f0np0||firmware_link_speed_d0||0||3&lt;br /&gt;
|-&lt;br /&gt;
|enp67s0f0np0||firmware_link_speed_d3||0|| 3&lt;br /&gt;
|}The drv_link_speed, firmware_link_speed_d0 &amp;amp; firmware_link_speed_d3 have to be set for all ports. &lt;br /&gt;
&lt;br /&gt;
The values correspond to the number of ports of the used network cards (for example 0, 1, 2 and 3 for a network card with 4 network ports).&lt;br /&gt;
&lt;br /&gt;
With the linkspeed ID &amp;quot;3&amp;quot;, a speed of 25 Gb/s is forced.&lt;br /&gt;
&lt;br /&gt;
You will receive the following issue after performing the command:&amp;lt;pre lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
root@PMX1:~# ./bnxtnvm  -dev=enp67s0f0np0 setoption=drv_link_speed:0#3&lt;br /&gt;
drv_link_speed is set successfully&lt;br /&gt;
Please reboot the system to apply the configuration&lt;br /&gt;
&amp;lt;/pre&amp;gt;After entering the commands for all ports, a reboot of the system is necessary.&lt;br /&gt;
&lt;br /&gt;
===Verification of changes===&lt;br /&gt;
Perform the following command to verify the state:&amp;lt;pre lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
./bnxtnvm -dev=enp67s0f0np0 device_info&lt;br /&gt;
&amp;lt;/pre&amp;gt;The configuration has been performed correctly, when the &amp;#039;&amp;#039;&amp;#039;FW image status&amp;#039;&amp;#039;&amp;#039; outputs the value &amp;#039;&amp;#039;&amp;#039;Operational&amp;#039;&amp;#039;&amp;#039;:&lt;br /&gt;
 root@PMX1:~# ./bnxtnvm -dev=enp67s0f0np0 device_info&lt;br /&gt;
&lt;br /&gt;
 Device Interface Name       : enp67s0f0np0&lt;br /&gt;
 MACAddress                  : bc:97:e1:da:92:a0&lt;br /&gt;
 Base MACAddress             : BC:97:E1:DA:92:A0&lt;br /&gt;
 Device Serial Number        : P425G214400143FV&lt;br /&gt;
 Chip Number                 : BCM57504&lt;br /&gt;
 Part Number                 : BCM957504-P425G&lt;br /&gt;
 Description                 : Broadcom NetXtreme-E Quad-port 25Gb Ethernet PCIe Adapter&lt;br /&gt;
 PCI Vendor Id               : 14e4&lt;br /&gt;
 PCI Device Id               : 1750&lt;br /&gt;
 PCI Subsys Vendor Id        : 14e4&lt;br /&gt;
 PCI Subsys Device Id        : 2100&lt;br /&gt;
 PCI Device Name             : 0000:01:00.0&lt;br /&gt;
 Adapter Rev                 : 11&lt;br /&gt;
 Active Package version      : 224.1.102.0&lt;br /&gt;
 Package version on NVM      : 224.1.102.0&lt;br /&gt;
 Firmware version            : 224.0.159.0&lt;br /&gt;
 Active NVM config version   : 0.0.34&lt;br /&gt;
 NVM config version          : 0.0.34&lt;br /&gt;
 Firmware Reset Counter      : 0&lt;br /&gt;
 Error Recovery Counter      : 0&lt;br /&gt;
 Crash Dump Timestamp        : N/A&lt;br /&gt;
 Reboot Required             : No&lt;br /&gt;
 Secure Boot                 : Enabled&lt;br /&gt;
 Secure Firmware Update      : Enabled&lt;br /&gt;
 &amp;#039;&amp;#039;&amp;#039;FW Image Status                              : Operational&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 Crash Dump Available in DDR : False&lt;br /&gt;
If this is not the case, the firmware of the network card must be synchronized additionally.&lt;br /&gt;
===Firmware sync===&lt;br /&gt;
Synchronizing the firmware will apply the entered link speed:&amp;lt;pre lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
./bnxtnvm -dev=enp67s0f0np0 fw_sync&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Control with the help of ethtool===&lt;br /&gt;
The successful configuration can now be verified with the ethtool:root@PMX1:~# ethtool enp67f0np0 &lt;br /&gt;
 Settings for enp67f0np0:&lt;br /&gt;
        Supported ports: [ FIBRE ]&lt;br /&gt;
        Supported link modes:   10000baseT/Full&lt;br /&gt;
                                25000baseCR/Full&lt;br /&gt;
        Supported pause frame use: Symmetric Receive-only&lt;br /&gt;
        Supports auto-negotiation: Yes&lt;br /&gt;
        Supported FEC modes: RS  BASER&lt;br /&gt;
        &amp;#039;&amp;#039;&amp;#039;Advertised link modes:  25000baseCR/Full&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
        Advertised pause frame use: No&lt;br /&gt;
        Advertised auto-negotiation: Yes&lt;br /&gt;
        Advertised FEC modes: RS         BASER&lt;br /&gt;
        &amp;#039;&amp;#039;&amp;#039;Speed: 25000Mb/s&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
        Duplex: Full&lt;br /&gt;
        Auto-negotiation: on&lt;br /&gt;
        Port: Direct Attach Copper&lt;br /&gt;
        PHYAD: 0&lt;br /&gt;
        Transceiver: internal&lt;br /&gt;
        Supports Wake-on: g&lt;br /&gt;
        Wake-on: d&lt;br /&gt;
        Current message level: 0x00002081 (8321)&lt;br /&gt;
                               drv tx_err hw&lt;br /&gt;
        Link detected: yes&lt;br /&gt;
&lt;br /&gt;
Finally, you can disable maintenance mode again and, if necessary, repeat this procedure for the remaining nodes.&lt;br /&gt;
&lt;br /&gt;
==Linkspeed configuration with NICCLI==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Hint:&amp;#039;&amp;#039;&amp;#039; In case of a mesh cabling, it may be necessary that you disconnect the direct cabling of the systems to be configured before beginning the configuration. The other systems can remain wired to each other. You also have to remove all transceivers of the configured network card.&lt;br /&gt;
&lt;br /&gt;
To ensure that the network cards function as intended and at full capacity, you must use NICCLI to force them to operate at the desired speed.&lt;br /&gt;
&lt;br /&gt;
===NICCLI installation===&lt;br /&gt;
To install NICCLI, follow these instructions: [[Installation NICCLI under Proxmox VE|Installation NICCLI]]&lt;br /&gt;
&lt;br /&gt;
First, perform the following command to find out the assignment of the interface names and PCI-IDs:&lt;br /&gt;
 root@PMX2:~# lshw -c network -businfo&lt;br /&gt;
 Bus info          Device           Class          Description&lt;br /&gt;
 pci@0000:01:00.0  enp1s0f0np0      network        BCM57508 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet&lt;br /&gt;
 pci@0000:01:00.1  enp1s0f1np1      network        BCM57508 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet&lt;br /&gt;
 pci@0000:06:00.0  enp6s0f0         network        I350 Gigabit Network Connection&lt;br /&gt;
 pci@0000:06:00.1  enp6s0f1         network        I350 Gigabit Network Connection&lt;br /&gt;
 pci@0000:41:00.0  enp65s0f0np0     network        BCM57416 NetXtreme-E Dual-Media 10G RDMA Ethernet Controller&lt;br /&gt;
 pci@0000:41:00.1  enp65s0f1np1     network        BCM57416 NetXtreme-E Dual-Media 10G RDMA Ethernet Controller&lt;br /&gt;
 &amp;#039;&amp;#039;&amp;#039;pci@0000:81:00.0       ens17f0np0               network                 BCM57504 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 pci@0000:81:00.1  ens17f1np1       network        BCM57504 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet&lt;br /&gt;
 pci@0000:81:00.2  ens17f2np2       network        BCM57504 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet&lt;br /&gt;
 pci@0000:81:00.3  ens17f3np3       network        BCM57504 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet&lt;br /&gt;
 usb@1:1.3         enx42a65ce855c5  network        Ethernet interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, enter &amp;quot;niccli&amp;quot; in the CLI. After this, you have to select a port index. Select the index here that has the same PCI ID as the one selected above:&lt;br /&gt;
 root@PMX2:~# niccli&lt;br /&gt;
 /opt/niccli/niccli.x86_64: /lib/x86_64-linux-gnu/libnl-3.so.200: no version information available (required by /opt/niccli/niccli.x86_64)&lt;br /&gt;
 &lt;br /&gt;
 -------------------------------------------------------------------------------&lt;br /&gt;
 Scrutiny NIC CLI v229.0.150.0 - Broadcom Inc. (c) 2024 (Bld-79.52.33.102.16.0) &lt;br /&gt;
 -------------------------------------------------------------------------------&lt;br /&gt;
 &lt;br /&gt;
      BoardId     MAC Address        FwVersion    PCIAddr        Type   Mode  &lt;br /&gt;
   1) BCM57508    84:16:0C:6F:16:90  226.0.145.1  0000:01:00.0   NIC    PCI   &lt;br /&gt;
   2) BCM57508    84:16:0C:6F:16:90  226.0.145.1  0000:01:00.1   NIC    PCI   &lt;br /&gt;
   3) BCM57416    00:62:0B:31:4A:F0  226.0.145.0  0000:41:00.0   NIC    PCI   &lt;br /&gt;
   4) BCM57416    00:62:0B:31:4A:F1  226.0.145.0  0000:41:00.1   NIC    PCI   &lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;5)  BCM57504       00:62:0B:6F:00:8C        226.0.145.1       0000:81:00.0         NIC         PCI&amp;#039;&amp;#039;&amp;#039;   &lt;br /&gt;
   6) BCM57504    00:62:0B:6F:00:8C  226.0.145.1  0000:81:00.1   NIC    PCI   &lt;br /&gt;
   7) BCM57504    00:62:0B:6F:00:8E  226.0.145.1  0000:81:00.2   NIC    PCI   &lt;br /&gt;
   8) BCM57504    00:62:0B:6F:00:8E  226.0.145.1  0000:81:00.3   NIC    PCI   &lt;br /&gt;
 &lt;br /&gt;
 Enter the target index to connect with : 5&lt;br /&gt;
&lt;br /&gt;
=== Reading out configurable speeds ===&lt;br /&gt;
&lt;br /&gt;
Now, you can read out the linkspeed ID for the desired port speed:&amp;lt;pre&amp;gt;&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d0 -value ? -scope 0 &lt;br /&gt;
ERROR: Invalid syntax.&lt;br /&gt;
Name                  : firmware_link_speed_d0&lt;br /&gt;
Description           : This per-port option configures the speed setting when the device is in D0 mode.&lt;br /&gt;
                        The default speed is set to Autoneg. A 10GBaseT board only allows Autoneg.&lt;br /&gt;
Option Type           : Multi Instance Type&lt;br /&gt;
Instance Indexes      : 0 to 15&lt;br /&gt;
Valid values          : &lt;br /&gt;
     0 (Autoneg)&lt;br /&gt;
     1 (1G)&lt;br /&gt;
     2 (10G)&lt;br /&gt;
     3 (25G)&lt;br /&gt;
     4 (40G)&lt;br /&gt;
     5 (50G)&lt;br /&gt;
     6 (100G)&lt;br /&gt;
     7 (200G_PAM4)&lt;br /&gt;
     8 (50G_PAM4)&lt;br /&gt;
     9 (100G_PAM4)&lt;br /&gt;
     14 (2_5G)&lt;br /&gt;
     15 (100M)&lt;br /&gt;
BCM57504&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
The linkspeed ID is required for the enforcement of the desired linkspeed.&lt;br /&gt;
&lt;br /&gt;
=== Configuration of the linkspeed ===&lt;br /&gt;
This linkspeed ID must be entered in the following command under &amp;quot;-value &amp;quot;:&amp;lt;pre&amp;gt;&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d0 -value 3 -scope 0&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d0 -value 3 -scope 1&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d0 -value 3 -scope 2&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d0 -value 3 -scope 3&lt;br /&gt;
firmware_link_speed_d0 is set successfully&lt;br /&gt;
Please reboot the system to apply the configuration&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
The same must be repeated for &amp;quot;firmware_link_speed_d3&amp;quot;: &amp;lt;pre&amp;gt;&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d3 -value 3 -scope 0&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d3 -value 3 -scope 1&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d3 -value 3 -scope 2&lt;br /&gt;
BCM57504&amp;gt; setoption -name firmware_link_speed_d3 -value 3 -scope 3&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Explanation of command:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Option || Linkspeed-ID (value)|| Port (scope)&lt;br /&gt;
|-&lt;br /&gt;
| firmware_link_speed_d0|| 3|| 0-3&lt;br /&gt;
|-&lt;br /&gt;
| firmware_link_speed_d3|| 3|| 0-3&lt;br /&gt;
|}&lt;br /&gt;
The firmware_link_speed_d0 &amp;amp; firmware_link_speed_d3 options must be set for all ports.&lt;br /&gt;
&lt;br /&gt;
The values correspond to the number of ports of the used network card (for example 0, 1, 2 and 3 for a network card with 4 network ports).&lt;br /&gt;
&lt;br /&gt;
With the linkspeed ID &amp;quot;3&amp;quot;, a speed of 25 Gb/s is forced.&lt;br /&gt;
&lt;br /&gt;
After entering the commands for all ports, a reboot of the system is necessary.&lt;br /&gt;
&lt;br /&gt;
=== Verification of changes ===&lt;br /&gt;
Enter  &amp;quot;niccli&amp;quot; again in the CLI after the reboot and perform the following command:&lt;br /&gt;
 BCM57504&amp;gt; device_info&lt;br /&gt;
 Interface Name                      : ens17f0np0&lt;br /&gt;
 MAC Address                         : 00:62:0B:6F:00:8C&lt;br /&gt;
 Base MAC Address                    : 00:62:0B:6F:00:8C&lt;br /&gt;
 Serial Number                       : N425G224200E5NFG&lt;br /&gt;
 Part Number                         : BCM957504-N425G&lt;br /&gt;
 PCI Address                         : 0000:81:00.0&lt;br /&gt;
 Chip Number                         : BCM57504&lt;br /&gt;
 Chip Name                           : THOR&lt;br /&gt;
 Description                         : Broadcom NetXtreme E-Series Quad-port 25Gb SFP28 OCP 3.0 Ethernet Adapter&lt;br /&gt;
 Active Package Name                 : 226.1.107.1&lt;br /&gt;
 Firmware Name                       : PRIMATE_FW&lt;br /&gt;
 Firmware Version                    : 226.0.145.1&lt;br /&gt;
 RoCE Firmware Version               : 226.0.145.0&lt;br /&gt;
 HWRM Interface Spec                 : 1.10.2&lt;br /&gt;
 Kong mailbox channel                : Not Applicable&lt;br /&gt;
 Active Package Version              : 226.1.107.1&lt;br /&gt;
 Package Version on NVM              : 226.1.107.1&lt;br /&gt;
 PCI Device ID                       : 0x1751&lt;br /&gt;
 PCI Vendor ID                       : 0x14E4&lt;br /&gt;
 PCI Revision ID                     : 0x11&lt;br /&gt;
 PCI Component ID                    : 0x1751&lt;br /&gt;
 PCI Subsys Device ID                : 0x5425&lt;br /&gt;
 PCI Subsys Vendor ID                : 0x14E4&lt;br /&gt;
 Active NVM config version           : 0.0.37&lt;br /&gt;
 NVM config version                  : 0.0.37&lt;br /&gt;
 Reboot Required                     : No&lt;br /&gt;
 Firmware Reset Counter              : 0&lt;br /&gt;
 Error Recovery Counter              : 0&lt;br /&gt;
 Crash Dump Timestamp                : Not Available&lt;br /&gt;
 Secure Boot                         : Enabled&lt;br /&gt;
 Secure Firmware Update              : Enabled&lt;br /&gt;
 &amp;#039;&amp;#039;&amp;#039;FW Image Status                                               :  Operational&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 Crash Dump Available in DDR         : No&lt;br /&gt;
Verify, whether the value is set to &amp;quot;Operational&amp;quot;. If this is not the case, you have to perform a firmware sync. Otherwise, the configuration has been successful.&lt;br /&gt;
&lt;br /&gt;
=== Firmware sync ===&lt;br /&gt;
Synchronizing the firmware will apply the entered link speed:&amp;lt;pre&amp;gt;&lt;br /&gt;
BCM57504&amp;gt; fw_sync&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Control with the help of ethtool ===&lt;br /&gt;
Now, you can verify the configuration of the network card with ethtool:&lt;br /&gt;
 root@PMX2:~# ethtool ens17f0np0 &lt;br /&gt;
 Settings for ens17f0np0:&lt;br /&gt;
         Supported ports: [ FIBRE ]&lt;br /&gt;
         Supported link modes:   10000baseT/Full&lt;br /&gt;
                                 10000baseKX4/Full&lt;br /&gt;
                                 10000baseKR/Full&lt;br /&gt;
                                 25000baseCR/Full&lt;br /&gt;
                                 25000baseKR/Full&lt;br /&gt;
                                 25000baseSR/Full&lt;br /&gt;
                                 10000baseCR/Full&lt;br /&gt;
                                 10000baseSR/Full&lt;br /&gt;
                                 10000baseLR/Full&lt;br /&gt;
         Supported pause frame use: Symmetric Receive-only&lt;br /&gt;
         Supports auto-negotiation: Yes&lt;br /&gt;
         Supported FEC modes: RS  BASER&lt;br /&gt;
         &amp;#039;&amp;#039;&amp;#039;Advertised link modes:  25000baseCR/Full&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
         Advertised pause frame use: No&lt;br /&gt;
         Advertised auto-negotiation: No&lt;br /&gt;
         Advertised FEC modes: Not reported&lt;br /&gt;
         &amp;#039;&amp;#039;&amp;#039;Speed: 25000Mb/s&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
         Duplex: Full&lt;br /&gt;
         Auto-negotiation: off&lt;br /&gt;
         Port: FIBRE&lt;br /&gt;
         PHYAD: 0&lt;br /&gt;
         Transceiver: internal&lt;br /&gt;
         Supports Wake-on: g&lt;br /&gt;
         Wake-on: d&lt;br /&gt;
         Current message level: 0x00002081 (8321)&lt;br /&gt;
                                drv tx_err hw&lt;br /&gt;
         Link detected: no&lt;br /&gt;
&lt;br /&gt;
Finally, you can disable maintenance mode again and, if necessary, repeat this procedure for the remaining nodes. &lt;br /&gt;
&lt;br /&gt;
{{Npauli}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Network cards]]&lt;br /&gt;
[[Category:Proxmox Administration]]&lt;br /&gt;
[[de:Linkspeed-Konfiguration von Broadcom Netzwerkkarten]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/KeePassXC_password_manager</id>
		<title>KeePassXC password manager</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/KeePassXC_password_manager"/>
		<updated>2026-03-16T12:13:56Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;KeePassXC&amp;#039;&amp;#039;&amp;#039; is an open source password manager for Windows, Linux, BSD and Mac OS that uses the KeePass 2.x (.kdbx) data file format for safing passwords. Such a data file format can also be used with other systems, for example with KeePassDX (open source password manager for Android) when the file is copied there.   == Safety ==  KeePassXC &amp;#039;&amp;#039;&amp;#039;does not perform a synchronisation&amp;#039;&amp;#039;&amp;#039; about cloud providers. &amp;#039;&amp;#039;&amp;#039;All passwords remain on your own computer&amp;#039;&amp;#039;&amp;#039; (unless...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;KeePassXC&amp;#039;&amp;#039;&amp;#039; is an open source password manager for [[Windows]], [[Linux]], BSD and Mac OS that uses the KeePass 2.x (.kdbx) data file format for safing passwords. Such a data file format can also be used with other systems, for example with KeePassDX (open source password manager for Android) when the file is copied there. &lt;br /&gt;
&lt;br /&gt;
== Safety == &lt;br /&gt;
KeePassXC &amp;#039;&amp;#039;&amp;#039;does not perform a synchronisation&amp;#039;&amp;#039;&amp;#039; about cloud providers. &amp;#039;&amp;#039;&amp;#039;All passwords remain on your own computer&amp;#039;&amp;#039;&amp;#039; (unless you manually copy or sync the .kdbx database file, for example, to your smartphone).&lt;br /&gt;
&lt;br /&gt;
Cloud-specific security vulnerabilities in cloud-based password managers, such as those published by ETH Zurich in February 2026 for three cloud solutions,&amp;lt;ref&amp;gt;[https://ethz.ch/de/news-und-veranstaltungen/eth-news/ news/2026/02/passwortmanager-offer-less-protection-than-promised.html Password managers offer less protection than promised] (ethz.ch, February 16, 2026)&amp;lt;/ref&amp;gt; cannot occur due to the architecture.&lt;br /&gt;
&lt;br /&gt;
Furthermore, the BSI also provides more information on the safety of passwort managers.&amp;lt;ref&amp;gt;[https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Cyber-Sicherheitsempfehlungen/Accountschutz/Sichere-Passwoerter-erstellen/Passwort-Manager/passwort-manager_node.html Administrate passwords with a password manager]  (www.bsi.bund.de)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
KeePassXC is available for download on the KeePassXC website.&amp;lt;ref&amp;gt;[https://keepassxc.org/download/ Download KeePassXC] (keepassxc.org)&amp;lt;/ref&amp;gt; The installation is recommended via Flatpak package under Linux.&lt;br /&gt;
&lt;br /&gt;
Under [[Linux Mint]], KeePassXC can be installed via software manager (select Flatpak (Flathub) as source):&lt;br /&gt;
:[[File:KeePassXC-Installation.png|300px]]&lt;br /&gt;
&lt;br /&gt;
== Setup ==&lt;br /&gt;
The following screenshots show the setup of KeePassXC:&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:KeePassXC-01-Welcome-to-KeePassXC.png|Click on &amp;quot;Create Database&amp;quot;.&lt;br /&gt;
File:KeePassXC-02-Create-new-database.png|Enter the database name and, optionally, a description.&lt;br /&gt;
File:KeePassXC-03-Encryption-settings.png|Leave the default database format as KDBX 4.&lt;br /&gt;
File:KeePassXC-04-Encryption-settings-advanced.png|Under &amp;quot;Advanced&amp;quot;, you can change the encryption settings.&lt;br /&gt;
File:KeePassXC-05-Database-credentials.png|Set master password.&lt;br /&gt;
File:KeePassXC-05-Database-credentials-additional-protection.png|After clicking “Add additional protection...”, you can optionally configure a key file and a challenge-response mechanism.&lt;br /&gt;
File:KeePassXC-07-Save-database-as.png|Specify the file name and folder for the database file.&lt;br /&gt;
File:KeePassXC-08.png|The database has been created.&lt;br /&gt;
File:KeePassXC-09-Add-new-entry.png|Click the &amp;quot;+&amp;quot; button to create a new password entry.&lt;br /&gt;
File:KeePassXC-10-Entry.png|Entry&lt;br /&gt;
File:KeePassXC-11-Advanced.png|Advanced&lt;br /&gt;
File:KeePassXC-12-Icon.png|Icon&lt;br /&gt;
File:KeePassXC-13-Auto-Type.png|Auto-Type&lt;br /&gt;
File:KeePassXC-14-Properties.png|Properties&lt;br /&gt;
File:KeePassXC-15-Entry-OK.png|After setting all parameters, click &amp;quot;OK&amp;quot;.&lt;br /&gt;
File:KeePassXC-16.png|The entry (for Mastodon in this example) has now been created.&lt;br /&gt;
File:KeePassXC-17-right-click.png|Right-clicking on the entry displays available actions&lt;br /&gt;
File:KeePassXC-18-unlock.png|When KeePassXC is closed and restarted, you must enter the master password.&lt;br /&gt;
File:KeePassXC-19.png|Once you enter the master password, the entries you created will be visible again.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://keepassxc.org/ KeePassXC Password Manager] (keepassxc.org)&lt;br /&gt;
* [https://www.freiburg.linux.de/vortraege/FLUG-2025-Passkeys-With-KeePassXC.pdf Passkeys With KeePassXC - An Introduction] (www.freiburg.linux.de, 17.09.2025) Lecture by Janek Bevendorff (KeePassXC Maintainer) at the Freiburger Linux User Group.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Wfischer}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Linux]]&lt;br /&gt;
[[de:KeePassXC Passwortmanager]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Supplement_to_safety_instructions_for_Intel_products_2026.1_IPU</id>
		<title>Supplement to safety instructions for Intel products 2026.1 IPU</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Supplement_to_safety_instructions_for_Intel_products_2026.1_IPU"/>
		<updated>2026-03-13T08:09:07Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;In March &amp;#039;&amp;#039;&amp;#039;2026&amp;#039;&amp;#039;&amp;#039;, Intel published new security advisories for different Intel products with regard to IPU 2026. Some of these safety instructions require &amp;#039;&amp;#039;&amp;#039;firmware updates&amp;#039;&amp;#039;&amp;#039;.   In this article, you will find an excerpt and hints on these security advisories as well as information on where to find updates for products from Thomas-Krenn.   == Security advisories == In the following, you will find safety instructions on the firmware published by Intel.  {| class=&amp;quot;wiki...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In March &amp;#039;&amp;#039;&amp;#039;2026&amp;#039;&amp;#039;&amp;#039;, Intel published new security advisories for different Intel products with regard to IPU 2026. Some of these safety instructions require &amp;#039;&amp;#039;&amp;#039;firmware updates&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
In this article, you will find an excerpt and hints on these security advisories as well as information on where to find updates for products from Thomas-Krenn. &lt;br /&gt;
&lt;br /&gt;
== Security advisories ==&lt;br /&gt;
In the following, you will find safety instructions on the firmware published by Intel.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background-color: #EFEFEF; font-weight: bold;&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |Intel security advisory&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |title&lt;br /&gt;
! align=&amp;quot;center&amp;quot; |affected systems&lt;br /&gt;
|-&lt;br /&gt;
|align=center | [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01393.html INTEL-SA-01393]&lt;br /&gt;
|align=center | 2026.1 IPU, UEFI Reference Firmware Advisory&lt;br /&gt;
| rowspan=&amp;quot;35&amp;quot; align=&amp;quot;left&amp;quot; | (see Intel-SA)&lt;br /&gt;
|-&lt;br /&gt;
|align=center | [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01234.html INTEL-SA-01234]&lt;br /&gt;
|align=center | 2025.3 IPU, UEFI Reference Firmware Advisory&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Updates for Thomas-Krenn products ==&lt;br /&gt;
Updates on the corresponding system can be found in the &amp;lt;tklink type=&amp;quot;sitex&amp;quot; id=&amp;quot;440&amp;quot;&amp;gt; download area from Thomas-Krenn&amp;lt;/tklink&amp;gt;.&lt;br /&gt;
The updates in the download area have been tested by us to guarantee the stability and compatibility of our systems.&lt;br /&gt;
&lt;br /&gt;
If you require the latest version for your system and it is not yet available in our download area, you can get it at [https://www.asus.com/de/support/download-center/ Asus] , [https://www.supermicro.com/en/support/resources/downloadcenter/swdownload Supermicro] or [https://www.gigabyte.com/de/Support/Consumer/Download Gigabyte].&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://www.intel.com/content/www/us/en/security-center/default.html Security Center] (www.intel.com)&lt;br /&gt;
&lt;br /&gt;
{{Thomas-Krenn.AG}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Intel Safety Information]]&lt;br /&gt;
[[de:Ergänzung zu Sicherheitshinweise Intel Produkten 2026.1 IPU]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Monitoring_of_a_Proxmox_cluster_with_checkmk</id>
		<title>Monitoring of a Proxmox cluster with checkmk</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Monitoring_of_a_Proxmox_cluster_with_checkmk"/>
		<updated>2026-03-12T08:57:44Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;This article explains how to monitor a Proxmox Ceph HCI cluster (3 nodes) and how to make the configuration. For the configuration of the Ceph-checks, please see the following article: Monitoring of a Proxmox VE Ceph Hosts with checkmk.  &amp;lt;/br&amp;gt; &amp;#039;&amp;#039;&amp;#039;Attention&amp;#039;&amp;#039;&amp;#039;: These instructions only function if you have a valid SSL-certificate and if the Proxmox nodes are soluble via DNS. For all other setups, there is the point &amp;quot;Monitoring without DNS and SSL&amp;quot;.  == Requirements ==...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article explains how to monitor a Proxmox Ceph HCI cluster (3 nodes) and how to make the configuration. For the configuration of the Ceph-checks, please see the following article: [[Monitoring of a Proxmox VE Ceph Hosts with checkmk]]. &lt;br /&gt;
&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Attention&amp;#039;&amp;#039;&amp;#039;: These instructions only function if you have a valid SSL-certificate and if the Proxmox nodes are soluble via DNS. For all other setups, there is the point &amp;quot;Monitoring without DNS and SSL&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
To monitor a Proxmox VE cluster, the following components are needed with checkmk:&lt;br /&gt;
&lt;br /&gt;
* an installed Linux server (Debian 12 preferred)&lt;br /&gt;
* a complete installation of the docker&lt;br /&gt;
* an operation-ready, functional checkMD-RAW container (free of charge)&lt;br /&gt;
* Proxmox nodes must be soluble via DNS &lt;br /&gt;
* Proxmox nodes need a valid SSL-certificate &lt;br /&gt;
&lt;br /&gt;
== Proxmox configuration ==&lt;br /&gt;
So that checkmk can call up the data from Proxmox VE, a group and an associated user must be created and justified on &amp;lt;code&amp;gt;Datacenter&amp;lt;/code&amp;gt;-level.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
file:04 Permissions definieren checkmk.png|Create read-only group &lt;br /&gt;
file:04 Permissions definieren checkmk.png|Set group rights &lt;br /&gt;
file:03 checkmk user anlage.png|Create and assign user &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== checkmk agent installation ==&lt;br /&gt;
This step must be performed for every host. So that the agent can registrate in checkmk, you first have to create the host in checkmk. Log in to the Web-UI in checkmk under &amp;lt;code&amp;gt;Setup -&amp;gt; Agents -&amp;gt; Linux&amp;lt;/code&amp;gt;. You need the packaged-agent:&amp;lt;code&amp;gt;check-mk-agent_2.2.0p8-1_all.deb&amp;lt;/code&amp;gt;. On the Proxmox host, you can install it as follows:&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
root@PMX4:~# wget http://10.2.1.180:8006/cmk/check_mk/agents/check-mk-agent_2.2.0p8-1_all.deb&lt;br /&gt;
root@PMX4:~# dpkg -i check-mk-agent_2.2.0p8-1_all.deb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Configuration in checkmk ==&lt;br /&gt;
&lt;br /&gt;
=== Create Proxmox hosts ===&lt;br /&gt;
This step must be made for every host. In order for the agent to register in checkmk, we first need to create the host in checkmk. Log in to the Web-UI and you can add the Proxmox host under &amp;lt;code&amp;gt;Setup -&amp;gt; Hosts -&amp;gt; Add Host&amp;lt;/code&amp;gt;. The following must be filled out:&lt;br /&gt;
&lt;br /&gt;
* Basic settings -&amp;gt; Hostname: name or IP of the Proxmox host&lt;br /&gt;
* Monitoring agents -&amp;gt; Checkmk agent / API integrations: (API integrations if configured, else Checkmk agent)&lt;br /&gt;
* After saving with &amp;quot;Save &amp;amp; view folder&amp;quot;, we configure the API integration using the special agent for Proxmox VE.&lt;br /&gt;
&lt;br /&gt;
=== Deposit Proxmox user === &lt;br /&gt;
Under setup, you can type in &amp;quot;Proxmox&amp;quot; and select &amp;quot;VM, Cloud, Container&amp;quot;  with the sub-item Proxmox VE. With Add-Rule, you can create a rule. Here, it is important, that the following data is deposited:&lt;br /&gt;
&lt;br /&gt;
* Username: deposit checkmk@pve &lt;br /&gt;
* Password: deposit relation &lt;br /&gt;
* Conditions -&amp;gt; select Explicit Conditions &lt;br /&gt;
* Explicit Hosts: All Proxmox nodes of the cluster created in checkmk must be selected here.&lt;br /&gt;
&lt;br /&gt;
=== Deposit Proxmox cluster ===&lt;br /&gt;
* Setup -&amp;gt; Host -&amp;gt; Hosts &amp;gt; Add cluster&lt;br /&gt;
* Basic settings: host name: pve-cluster-01 (name of cluster) and node: add host to cluster&lt;br /&gt;
* Network address: IP address family: No IP&lt;br /&gt;
* Monitoring agents: Checkmk agent / API integrations: API integrations if configured, else Checkmk agent&lt;br /&gt;
* Safe&lt;br /&gt;
&lt;br /&gt;
=== Configure clustered services ===&lt;br /&gt;
* Setup -&amp;gt; search for clustered -&amp;gt; Clusterd services&lt;br /&gt;
* Add Rule&lt;br /&gt;
* Conditions -&amp;gt; Explicit Hosts -&amp;gt; select nodes of PVE-cluster &lt;br /&gt;
* Services: Enter Interface fw in the first field and Interface tap in the second field.&lt;br /&gt;
&lt;br /&gt;
== Registrate host at checkmk ==&lt;br /&gt;
If the agent is installed on the Proxmox core, you have to registrate the host in checkmk first. This must be performed for every server. &lt;br /&gt;
Please adapt the following parameters on the environment. Attention: We have changed the default port of the agent-receivers from 8000 to 8007.&lt;br /&gt;
&lt;br /&gt;
* -- hostname &amp;lt;Name or IP of Proxmox Hosts&amp;gt;&lt;br /&gt;
* -- server &amp;lt;Name or IP + Port of checkmk-server&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@PMX4:/etc/check_mk# cmk-agent-ctl register --trust-cert --hostname hostname --server checkmkserver:8007 --site cmk --user cmkadmin&lt;br /&gt;
&lt;br /&gt;
Please enter password for &amp;#039;cmkadmin&amp;#039;&lt;br /&gt;
Registration complete.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Monitoring without DNS and SSL ==&lt;br /&gt;
[[File:01_Proxmox_Checks_(Without_Ceph).png|alt=Proxmox Cluster Checks without Ceph|thumb|Proxmox cluster checks without Ceph]]&lt;br /&gt;
These instructions only function if all hosts are reachable via DNS and if the SSL-certificates are valid! If you only want to have the checks with IP and without valid SSL-certificate, you have to do the following:&lt;br /&gt;
&lt;br /&gt;
* create host in checkmk&lt;br /&gt;
* checkmk agent on Proxmox host&lt;br /&gt;
* registrate hosts with cmk-agent-ctl on checkmk-server&lt;br /&gt;
* service discovery in checkmk&lt;br /&gt;
&lt;br /&gt;
If this is done, the basic checks are available. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Source ==&lt;br /&gt;
* https://checkmk.com/de/blog/proxmox-monitoring&lt;br /&gt;
&lt;br /&gt;
{{jsterr}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Monitoring]]&lt;br /&gt;
[[Category:Monitoring (PVE)]]&lt;br /&gt;
[[de:Monitoring eines Proxmox Clusters mit checkmk]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Windows_installation_on_a_RAID-compound</id>
		<title>Windows installation on a RAID-compound</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Windows_installation_on_a_RAID-compound"/>
		<updated>2026-03-09T12:07:58Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;In this article, you will find information on what to note when &amp;#039;&amp;#039;&amp;#039;installing&amp;#039;&amp;#039;&amp;#039; &amp;#039;&amp;#039;&amp;#039;Windows desktop versions&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Windows Server&amp;#039;&amp;#039;&amp;#039; on a &amp;#039;&amp;#039;&amp;#039;RAID&amp;#039;&amp;#039;&amp;#039; to guarantee a smooth installation.   ==Hardware and software== The following hardware and software is used as test environment:  *Operating system: Windows Server 2022 Standard (desktop version) *Mainboard: Supermicro X12DPi-NT6 *CPU: Dual Intel Xeon Silver 4316 *RAM: 2x...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In this article, you will find information on what to note when &amp;#039;&amp;#039;&amp;#039;installing&amp;#039;&amp;#039;&amp;#039; &amp;#039;&amp;#039;&amp;#039;Windows desktop versions&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Windows Server&amp;#039;&amp;#039;&amp;#039; on a &amp;#039;&amp;#039;&amp;#039;[[RAID]]&amp;#039;&amp;#039;&amp;#039; to guarantee a smooth installation. &lt;br /&gt;
&lt;br /&gt;
==Hardware and software==&lt;br /&gt;
The following hardware and software is used as test environment:&lt;br /&gt;
&lt;br /&gt;
*Operating system: [[Windows Server 2022 Editionsunterschiede|Windows Server 2022 Standard]] (desktop version)&lt;br /&gt;
*Mainboard: Supermicro X12DPi-NT6&lt;br /&gt;
*CPU: Dual Intel Xeon Silver 4316&lt;br /&gt;
*RAM: 2x 64 GB ECC Registered (RDIMM) DDR4 2666 RAM 4 Rank&lt;br /&gt;
*[[RAID Controller]]&lt;br /&gt;
**[[MegaRAID 9500 Series Tri-Mode Storage Adapters|Broadcom MegaRAID 9560-8i SAS-SATA-NVMe]]&lt;br /&gt;
**[[Adaptec SmartRAID 3100 Controller|Microchip SmartRAID 3102-8i SAS-SATA]]&lt;br /&gt;
**[[Intel VROC (VMD NVMe RAID)]] Key (Raid 0,1,5,10)&lt;br /&gt;
&lt;br /&gt;
==Installation preparation==&lt;br /&gt;
In the following, the preparations for the installation of a Windows operating system on a RAID compound are described. &lt;br /&gt;
&lt;br /&gt;
===RAID creation and initialization===&lt;br /&gt;
First, a properly configured RAID is important. When creating the RAID, it should also be initialized.&lt;br /&gt;
&lt;br /&gt;
Initializing a RAID overwrites several sectors of the virtual hard disk with zeros. If no initialization is performed, among other things, background tasks such as the consistency check, which checks the parities in RAID 5, 6, 50, and 60, cannot be performed later. For RAID 0, 1 and 10, a &amp;#039;&amp;#039;Fast Initialization&amp;#039;&amp;#039; is enough, where only the first and last sectors are overwritten. For RAID 5, 6, 50 and 60 is, however, a &amp;#039;&amp;#039;Full Initialization&amp;#039;&amp;#039; recommended, which overwrites all sectors with zeros and can therefore take several hours to days on larger hard drives (see also:[[MegaRAID Glossar|MegaRAID glossary]]).&lt;br /&gt;
&lt;br /&gt;
In the following screenshots, the process for deleting, creating and initializing of a RAID for Broadcom, Adaptec and Intel VROC in UEFI-controller-BIOS is explained. If the RAID controller is not displayed in the BIOS, it is operated via [[#Legacy RAID|Legacy]]. Before you create a new RAID, you can delete the hard drive. This also deletes the existing RAID metadata on the hard disks and ensures smooth RAID creation. &lt;br /&gt;
&lt;br /&gt;
====Broadcom MegaRAID====&lt;br /&gt;
In the following, the process for deleting, creating and initializing a Broadcom RAID under UEFI is explained. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200&amp;quot; heights=&amp;quot;180&amp;quot;&amp;gt;&lt;br /&gt;
file:MegaRAID delete.jpg|Deleting a Broadcom RAID: In the mainboard BIOS under Advanced, you will find the controller BIOS. In this window, you must select the appropriate RAID under Virtual Drive Management in the Main Menu. The RAID can then be deleted under Operation in &amp;#039;&amp;#039;Delete Virtual Drive&amp;#039;&amp;#039;.&lt;br /&gt;
file:MegaRAID Default Initialisierung.jpg|Creating a Broadcom RAID: In the &amp;#039;&amp;#039;Configuration Management&amp;#039;&amp;#039;, which is also reachable under &amp;#039;&amp;#039;Main Menu, a new RAID can be created under&amp;#039;&amp;#039;  &amp;#039;&amp;#039;Create Virtual Drive.&amp;#039;&amp;#039; After this, you have to select the hard drives, determine a RAID level and assign a name. With Broadcom controllers, you also have the option of performing a fast (almost) or complete (&amp;#039;&amp;#039;full&amp;#039;&amp;#039;) initialization under Default Initialization.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Adaptec====&lt;br /&gt;
In the following gallery, it is explained how an Adaptec RAID is deleted and recreated under UEFI.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200&amp;quot; heights=&amp;quot;180&amp;quot;&amp;gt;&lt;br /&gt;
file:Delete Logical Drives.jpg|Deleting an Adaptec RAIDS: First, open the controller BIOS in the mainboard BIOS under Advanced. Then delete the RAID by following these steps: Array Configuration --&amp;gt; Manage Arrays --&amp;gt; Array X --&amp;gt; List Logical Drives --&amp;gt; Logical Drive X --&amp;gt; Delete Logical Drive&lt;br /&gt;
file:Adaptec Array Config.jpg|Creating an Adaptec RAID: Array Configuration --&amp;gt; Create RAID --&amp;gt; Select hard drives --&amp;gt; RAID Level --&amp;gt; assign names and create RAID &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====VROC====&lt;br /&gt;
In this gallery, the same process of deleting and recreating a VROC-RAID is explained. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200&amp;quot; heights=&amp;quot;180&amp;quot;&amp;gt;&lt;br /&gt;
file:VROC Delete.jpg|Delete VROC RAID: To delete your RAID, you have to select the VROC-Controller under &amp;#039;&amp;#039;Advanced&amp;#039;&amp;#039; in the BIOS. After this, the RAID can be selected and deleted via &amp;#039;&amp;#039;Delete.&amp;#039;&amp;#039;&lt;br /&gt;
file:VROC RAID erstellen.jpg|Creating a VROC RAID: You can create a VROC-RAID via &amp;#039;&amp;#039;Create RAID&amp;#039;&amp;#039; in the Controller BIOS. After this, the hard disk must be selected, a name and the RAID-level must be assigned. &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Boot mode===&lt;br /&gt;
Before the installation of the operating system can be started, the correct booting mode for the installation medium must be determined. There are two booting modes: &amp;#039;&amp;#039;&amp;#039;UEFI&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Legacy&amp;#039;&amp;#039;&amp;#039;. The installation medium must be started in the same booting mode as for the RAID, as there may be complications with the installations.&lt;br /&gt;
&lt;br /&gt;
The following table describes how to determine the mode of the controller:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!UEFI&lt;br /&gt;
!Legacy&lt;br /&gt;
|-&lt;br /&gt;
|If the controller is operated with UEFI firmware, the controller BIOS can be found in the motherboard BIOS under &amp;#039;&amp;#039;Advanced&amp;#039;&amp;#039;.&lt;br /&gt;
This is the case for both hardware RAIDs and onboard RAIDs (VROC). If the RAID has been configured here, it is a UEFI RAID.&lt;br /&gt;
|If the controller is addressed via legacy, the controller BIOS is not displayed in the mainboard BIOS.&lt;br /&gt;
The controller BIOS is now displayed when the server boots up and can be opened with a key combination. If the RAID was configured here, it is a legacy RAID.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The following table shows the Legacy BIOS key combination:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!&lt;br /&gt;
!Broadcom&lt;br /&gt;
!Adaptec&lt;br /&gt;
!VROC/RST&lt;br /&gt;
|-&lt;br /&gt;
!&amp;#039;&amp;#039;&amp;#039;Shortcut&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
|CTRL + R&lt;br /&gt;
|CTRL +A&lt;br /&gt;
|CTRL + I&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Change of Legacy/UEFI====&lt;br /&gt;
The BIOS options specify whether each PCI slot on the motherboard is operated in legacy or UEFI mode. The mode can also be changed there.&lt;br /&gt;
&lt;br /&gt;
In the case of Supermicro motherboards, this can be changed under the &amp;#039;&amp;#039;Advanced&amp;#039;&amp;#039; tab in the &amp;#039;&amp;#039;PCIe/PCI/PnP Configuration&amp;#039;&amp;#039; menu. All PCI slots are listed here in the format &amp;#039;&amp;#039;CPU SLOTX PCI-E ...&amp;#039;&amp;#039; and can be set individually to Legacy or EFI.&lt;br /&gt;
&lt;br /&gt;
====Installationmedium Legace/UEFI====&lt;br /&gt;
If you have determined, in which mode the RAID has been created, the installation medium must be started in the same mode. If you get a notification after starting the installation medium, that it was started in the wrong mode, you have to recreate the medium with the right partition scheme (&amp;#039;&amp;#039;&amp;#039;MBR for Legacy&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;GPT for UEFI&amp;#039;&amp;#039;&amp;#039;): [[#Installationsmedium_mit_Rufus_erstellen|Create installation medium with Rufus.]] &lt;br /&gt;
&lt;br /&gt;
In the BIOS under &amp;#039;&amp;#039;Save &amp;amp; Exit&amp;#039;&amp;#039;, all possible boot media are displayed under &amp;#039;&amp;#039;Boot Override&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
[[file:BIOS Boot Override.jpg|frameless|400x400px]]&lt;br /&gt;
&lt;br /&gt;
You can tell by the intention if the installation medium now starts via UEFI or Legacy.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UEFI:&amp;#039;&amp;#039;&amp;#039; USB, Partition 2 (USB) - medium is started via UEFI.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;No intention&amp;#039;&amp;#039;&amp;#039;: medium is started via Legacy.&lt;br /&gt;
&lt;br /&gt;
If no UEFI or Legacy boot media is displayed, the &amp;#039;&amp;#039;Boot Mode&amp;#039;&amp;#039; can be changed to &amp;#039;&amp;#039;Legacy&amp;#039;&amp;#039;, &amp;#039;&amp;#039;UEFI&amp;#039;&amp;#039; or &amp;#039;&amp;#039;Dual&amp;#039;&amp;#039; in the BIOS under &amp;#039;&amp;#039;Boot&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
===Use different ISO and medium===&lt;br /&gt;
Please make sure that an intact Windows ISO is used on an intact medium to guarantee a proper installation. It may come to installation cancellation or that the installation routine does not start when using corrupt Windows ISO-files. &lt;br /&gt;
&lt;br /&gt;
If the installation does not start or if there are cancellations, the ISO should be downloaded or another ISO-file should be started. If problems still occur, the medium must be verified or changed. &lt;br /&gt;
&lt;br /&gt;
===Create installation medium with Rufus===&lt;br /&gt;
Another source of errors during installation is the application used to create the installation medium. We recommend Rufus&amp;lt;ref&amp;gt;[https://rufus.ie/de/ Offizielle Homepage zum Programm Rufus]&amp;lt;/ref&amp;gt;, as it is a small program and easy to understand. Currently, Rufus can only be used to create installation media for Windows, but according to the manufacturer, support for other operating systems is planned for the future.&lt;br /&gt;
&lt;br /&gt;
You can download Rufus here: [https://rufus.ie/de/]&lt;br /&gt;
&lt;br /&gt;
If you have started Rufus, select your USB stick under &amp;#039;&amp;#039;drive&amp;#039;&amp;#039;. After this, you can add the desired ISO under &amp;#039;&amp;#039;choice&amp;#039;&amp;#039;. Now, you have to select the &amp;#039;&amp;#039;partition scheme&amp;#039;&amp;#039;. For a Legacy installation, you need MBR.&lt;br /&gt;
&lt;br /&gt;
In this [[Windows UEFI Boot-Stick unter Windows erstellen|Wiki article]], it is explained, how to create an UEFI boot stick for Windows.&lt;br /&gt;
&lt;br /&gt;
==Include driver during installation==&lt;br /&gt;
The respective drivers are needed for the installation of Windows for the used RAID controllers. If the created RAID is not displayed as a free drive in Windows Installer or if an error message is generated when attempting to install on it, these drivers may still be missing.&lt;br /&gt;
&lt;br /&gt;
In this case, the respective drivers must be downloaded and included for the RAID controller. You will find the driver on our [https://www.thomas-krenn.com/de/download.html download page] or you can download it on the page of the manufacturer. After downloading, the archive, in which the driver is located, must be unpacked, copied to a USB stick and plugged into the server. &lt;br /&gt;
&lt;br /&gt;
The following screenshots explain how to include the driver.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200&amp;quot; heights=&amp;quot;180&amp;quot;&amp;gt;&lt;br /&gt;
file:Windowsinstaller Festplattenauswahl .jpg|First, open the window for selecting the driver via Load Driver.&lt;br /&gt;
file:Windowsinstaller Treiber suchen.jpg|In this window, you can open Explorer via Explorer. In Explorer, select the subfolder containing the driver on the USB stick and confirm.&lt;br /&gt;
file:Windows Treiber auswählen.jpg|Finally, the subfolder is searched for suitable drivers. When the driver is displayed, simply select it and confirm.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The RAID can then be selected as the installation location and the installation can be started then.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Slankl}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[de:Windows Installation auf einem RAID-Verbund]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Qemu_drive_cache_option</id>
		<title>Qemu drive cache option</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Qemu_drive_cache_option"/>
		<updated>2026-03-06T08:06:46Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Quick Emulator&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;QEMU&amp;#039;&amp;#039;&amp;#039;) is an Open Source emulator that emulates virtual hardware. QEMU can be used in combination with KVM and is used in this way in Proxmox. In this article, the QEMU drive option &amp;quot;cache&amp;quot; will be explained. The configuration of a QEMU drive contains the generation of a block driver node (backend) as well as a guest device.&lt;br /&gt;
&lt;br /&gt;
== cache option ==&lt;br /&gt;
The option &amp;quot;cache&amp;quot; controls how the host cache is used for the access on block data.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;cache&amp;quot; connection is a connection that determines the three options &amp;#039;&amp;#039;&amp;#039;cache.direct&amp;#039;&amp;#039;&amp;#039;, &amp;#039;&amp;#039;&amp;#039;cache.no-flush&amp;#039;&amp;#039;&amp;#039; (both as in -blockdev) as well as &amp;#039;&amp;#039;&amp;#039;cache.writeback&amp;#039;&amp;#039;&amp;#039; (-device). The five cache modes writeback, none, writethrough, directsync and unsafe correspond to the following settings:&amp;lt;ref&amp;gt;[https://www.qemu.org/docs/master/system/qemu-manpage.html#hxtool-1 QEMU User Documentation (Manpage) - Block device options] (www.qemu.org/docs) &amp;lt;cite&amp;gt;cache is “none”, “writeback”, “unsafe”, “directsync” or “writethrough” and controls how the host cache is used to access block data. This is a shortcut that sets the cache.direct and cache.no-flush options (as in -blockdev), and additionally cache.writeback, which provides a default for the write-cache option of block guest devices (as in -device).&amp;lt;/cite&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; |Cache&lt;br /&gt;
!-device options&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; |-blockdev options&lt;br /&gt;
! colspan=&amp;quot;3&amp;quot; |Notes&amp;lt;ref&amp;gt;[https://opendev.org/openstack/nova/commit/b9dc86d8d646472195070022ff7ae4c372bef4ca libvirt: Use &amp;#039;writeback&amp;#039; QEMU cache mode when &amp;#039;none&amp;#039; is not viable] (opendev.org/openstack/nova, 04.05.2019) &amp;lt;cite&amp;gt;The thing that makes &amp;#039;writethrough&amp;#039; so safe against host crashes is that it never keeps data in a &amp;quot;write cache&amp;quot;, but it calls fsync() after _every_ write. This is also what makes it horribly slow. But &amp;#039;cache=none&amp;#039; doesn&amp;#039;t do this and therefore doesn&amp;#039;t provide this kind of safety.  The guest OS must explicitly flush the cache in the right places to make sure data is safe on the disk. And OSes do that.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So if &amp;#039;cache=none&amp;#039; is safe enough for you, then &amp;#039;cache=writeback&amp;#039; should be safe enough for you, too -- because both of them have the boolean &amp;#039;cache.writeback=on&amp;#039;. The difference is only in &amp;#039;cache.direct&amp;#039;, but &amp;#039;cache.direct=on&amp;#039; only bypasses the host kernel page cache and data could still sit in other caches that could be present between QEMU and the disk (such as commonly a volatile write cache on the disk itself).&amp;lt;/cite&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
!Name QEMU&lt;br /&gt;
!Name Proxmox VE GUI&lt;br /&gt;
!cache.writeback&lt;br /&gt;
!cache.direct&lt;br /&gt;
!cache.no-flush&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; |Ensuring data integrity after a sudden host failure&lt;br /&gt;
!Writing performance&lt;br /&gt;
|-&lt;br /&gt;
|writeback&lt;br /&gt;
|Write back&lt;br /&gt;
! style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot; |&amp;amp;#x2714; (on)&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |High, if the guest operating system/file system writes regularly the cache-content on the disk (flush). This is normally performed automatically by modern file systems. See also [[Ext4 Write Barriers]].&lt;br /&gt;
|Pagecache of host is used. &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |high&lt;br /&gt;
|-&lt;br /&gt;
|none&lt;br /&gt;
|No cache&lt;br /&gt;
! style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot; |&amp;amp;#x2714; (on)&lt;br /&gt;
! style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot; |&amp;amp;#x2714; (on)&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
|Pagecache of host is not used. However, data may still be stored in other caches (e.g., HDD cache). Therefore, the guest operating system must still perform regular flushes.&lt;br /&gt;
|-&lt;br /&gt;
|writethrough&lt;br /&gt;
|Write through&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Very high, since QEMU with &amp;quot;writethrough&amp;quot; cache mode never stores data in a &amp;quot;write cache&amp;quot;, but &amp;#039;&amp;#039;&amp;#039;calls the fsync() function after each write operation&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
|Pagecache of the host is used. &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |low,  as the fsync() function is called up after every writing process. &lt;br /&gt;
|-&lt;br /&gt;
|directsync&lt;br /&gt;
|Direct sync&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
! style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot; |&amp;amp;#x2714; (on)&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
|Pagecache des Hosts wird nicht verwendet.&lt;br /&gt;
|-&lt;br /&gt;
|unsafe&lt;br /&gt;
|Write back (unsafe)&lt;br /&gt;
! style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot; |&amp;amp;#x2714; (on)&lt;br /&gt;
! style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot; |-&lt;br /&gt;
! style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot; |&amp;amp;#x2714; (on)&lt;br /&gt;
| style=&amp;quot;background-color:#FFCCCC;&amp;quot; |No guarantee of data integrity! High risk of data loss! &lt;br /&gt;
&lt;br /&gt;
This caching mode should only be used for temporary data, where data loss is not a problem. This mode can only be helpful for accelerating the guest installation. However, it should be absolutely switched to another caching mode in production environments.&amp;lt;ref&amp;gt;https://opendev.org/openstack/nova/src/commit/18a7dcb6e816e26e405259e981498f6a7bc71608/nova/conf/libvirt.py#L724&amp;lt;/ref&amp;gt;&lt;br /&gt;
|Pagecache of host is used. &lt;br /&gt;
|highest&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The standard mode in QEMU is cache=writeback. In Proxmox VE, none (no cache) is used as standard. &lt;br /&gt;
&lt;br /&gt;
=== cache.writeback ===&lt;br /&gt;
The mode &amp;#039;&amp;#039;&amp;#039;cache.writeback=on&amp;#039;&amp;#039;&amp;#039; is used by default. Data write operations are reported as completed as soon as the data is available in host pagecache. This is safe as long as your guest operating system ensures that the hard disk caches are emptied correctly if necessary. If your guest operating system does not proceed volatile hard disk writing caches correctly, your host or the power supply fails, it may come to data damages in your guest operating system.&lt;br /&gt;
&lt;br /&gt;
For such guests, the use of cache.writeback=off should be taken into consideration. This means that the host pagecache is used for reading and writing data, but the writing notification is only then sent to the guest after QEMU made sure that every writing process has been emptied on the hard disk. Please note that this has a significant impact on the performance.&amp;lt;ref&amp;gt;[https://www.qemu.org/docs/master/system/qemu-manpage.html#hxtool-1 QEMU User Documentation (Manpage) - Block device options] (www.qemu.org/docs) &amp;lt;cite&amp;gt;By default, the cache.writeback=on mode is used. It will report data writes as completed as soon as the data is present in the host page cache. This is safe as long as your guest OS makes sure to correctly flush disk caches where needed. If your guest OS does not handle volatile disk write caches correctly and your host crashes or loses power, then the guest may experience data corruption.&amp;lt;BR&amp;gt;&lt;br /&gt;
For such guests, you should consider using cache.writeback=off. This means that the host page cache will be used to read and write data, but write notification will be sent to the guest only after QEMU has made sure to flush each write to the disk. Be aware that this has a major impact on performance.&amp;lt;/cite&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Disk (settings Proxmox VE GUI)&lt;br /&gt;
!Request cache via &lt;br /&gt;
!Result at cache.writeback=on&lt;br /&gt;
!Result at cache.writeback=off&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|IDE&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |&amp;lt;nowiki&amp;gt;hdparm -I /dev/sdc | grep &amp;quot;Write cache&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |* Write cache&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |Write cache (no asterisk in front of it)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; |hdparm executes a ATA IDENTIFY DEVICE command, to request settings. &lt;br /&gt;
|-&lt;br /&gt;
|SATA&lt;br /&gt;
|-&lt;br /&gt;
|VirtIO Block&lt;br /&gt;
|cat /sys/block/vda/queue/write_cache&lt;br /&gt;
|write back&lt;br /&gt;
|write through&lt;br /&gt;
|The VirtIO block driver provides the information via sysfs.&lt;br /&gt;
|-&lt;br /&gt;
|SCSI&lt;br /&gt;
|sdparm --get=WCE /dev/sda&lt;br /&gt;
|WCE = 1&lt;br /&gt;
|WCE = 0&lt;br /&gt;
|sdparm performs a SCSI MODE SENSE command, to request settings. WCE stands for &amp;quot;Writeback Cache Enable&amp;quot;.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== chache.direct ===&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;cache.direct=on&amp;#039;&amp;#039;&amp;#039; bypasses the host pagecache. This is an attempt to execute the disk-I/O directly in the memory of the guest. QEMU may continue to perform a internal copy of the data.&lt;br /&gt;
&lt;br /&gt;
=== cache.no-flush ===&lt;br /&gt;
QEMU announces that &amp;#039;&amp;#039;&amp;#039;cache.no-flush&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;Attention - risk of data loss! - only use when data integrity is not important, for example in pure tests) never has to write data on the hard disk, but to safe everything in the cache. If something goes wrong, for example if your host does not have any power, the hard disk was accidentally disconnected or else, your image is likely to get useless.&lt;br /&gt;
&lt;br /&gt;
== Tests ==&lt;br /&gt;
The following tests have been performed on a lvmthin volume. These only support raw (no qcow2).&amp;lt;ref&amp;gt;https://forum.proxmox.com/threads/proxmox-disks-changed-from-qcow-to-raw-after-migration.96007/#post-417101&amp;lt;/ref&amp;gt; For background information on cache=none with qcow2, please refer to the article &amp;quot;Understanding QCOW2 Risks with QEMU cache=none in Proxmox&amp;quot;.&amp;lt;ref&amp;gt;[https://kb.blockbridge.com/technote/proxmox-qemu-cache-none-qcow2/ Understanding QCOW2 Risks with QEMU cache=none in Proxmox] (kb.blockbridge.com)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With the [https://gist.github.com/3172656 diskchecker.pl Perl Skript], we have tested, if data gets lost during a power outage. You will find information on this script here:&lt;br /&gt;
http://brad.livejournal.com/2116715.html&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Debian 13 VM with raw&lt;br /&gt;
!Cache settings&lt;br /&gt;
!diskchecker.pl results&lt;br /&gt;
|-&lt;br /&gt;
|Default (no cache)&lt;br /&gt;
|Total errors: 0&lt;br /&gt;
|-&lt;br /&gt;
|Write back (unsafe)&lt;br /&gt;
|Total errors: 2786&lt;br /&gt;
|-&lt;br /&gt;
|Write through&lt;br /&gt;
|Total errors: 0&lt;br /&gt;
|-&lt;br /&gt;
|Write back&lt;br /&gt;
|Total errors: 0&lt;br /&gt;
|-&lt;br /&gt;
|Direct sync&lt;br /&gt;
|Total errors: 0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Default (No cache) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 create test_file 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.46% coverage of 1000 MB (293 writes; 293/s)&lt;br /&gt;
  diskchecker: running 2 sec, 1.06% coverage of 1000 MB (684 writes; 342/s)&lt;br /&gt;
  diskchecker: running 3 sec, 1.70% coverage of 1000 MB (1099 writes; 366/s)&lt;br /&gt;
  diskchecker: running 4 sec, 2.33% coverage of 1000 MB (1507 writes; 376/s)&lt;br /&gt;
  diskchecker: running 5 sec, 2.93% coverage of 1000 MB (1907 writes; 381/s)&lt;br /&gt;
  diskchecker: running 6 sec, 3.58% coverage of 1000 MB (2326 writes; 387/s)&lt;br /&gt;
  diskchecker: running 7 sec, 4.20% coverage of 1000 MB (2739 writes; 391/s)&lt;br /&gt;
  diskchecker: running 8 sec, 4.81% coverage of 1000 MB (3152 writes; 394/s)&lt;br /&gt;
  diskchecker: running 9 sec, 5.40% coverage of 1000 MB (3553 writes; 394/s)&lt;br /&gt;
  diskchecker: running 10 sec, 6.03% coverage of 1000 MB (3976 writes; 397/s)&lt;br /&gt;
[...]&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 verify test_file &lt;br /&gt;
 verifying: 0.03%&lt;br /&gt;
 verifying: 46.22%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
tk@debian13-1:~$&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Write back (unsafe) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 create test_file_unsafe 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.45% coverage of 1000 MB (286 writes; 286/s)&lt;br /&gt;
  diskchecker: running 2 sec, 1.22% coverage of 1000 MB (782 writes; 391/s)&lt;br /&gt;
  diskchecker: running 3 sec, 2.06% coverage of 1000 MB (1328 writes; 442/s)&lt;br /&gt;
  diskchecker: running 4 sec, 2.81% coverage of 1000 MB (1820 writes; 455/s)&lt;br /&gt;
  diskchecker: running 5 sec, 3.55% coverage of 1000 MB (2306 writes; 461/s)&lt;br /&gt;
  diskchecker: running 6 sec, 4.25% coverage of 1000 MB (2778 writes; 463/s)&lt;br /&gt;
  diskchecker: running 7 sec, 5.04% coverage of 1000 MB (3302 writes; 471/s)&lt;br /&gt;
  diskchecker: running 8 sec, 5.85% coverage of 1000 MB (3863 writes; 482/s)&lt;br /&gt;
  diskchecker: running 9 sec, 6.73% coverage of 1000 MB (4466 writes; 496/s)&lt;br /&gt;
  diskchecker: running 10 sec, 7.50% coverage of 1000 MB (4984 writes; 498/s)&lt;br /&gt;
[...]&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 verify test_file_unsafe &lt;br /&gt;
 verifying: 0.02%&lt;br /&gt;
  Error at page 26, 4 seconds before end.&lt;br /&gt;
  Error at page 34, 6 seconds before end.&lt;br /&gt;
  Error at page 49, 3 seconds before end.&lt;br /&gt;
  Error at page 123, 0 seconds before end.&lt;br /&gt;
  Error at page 166, 0 seconds before end.&lt;br /&gt;
  Error at page 167, 6 seconds before end.&lt;br /&gt;
  Error at page 169, 1 seconds before end.&lt;br /&gt;
  Error at page 199, 1 seconds before end.&lt;br /&gt;
  Error at page 200, 2 seconds before end.&lt;br /&gt;
  Error at page 214, 4 seconds before end.&lt;br /&gt;
[...]&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 2786&lt;br /&gt;
Histogram of seconds before end:&lt;br /&gt;
     0  420&lt;br /&gt;
     1  478&lt;br /&gt;
     2  339&lt;br /&gt;
     3  285&lt;br /&gt;
     4  303&lt;br /&gt;
     5  351&lt;br /&gt;
     6  354&lt;br /&gt;
     7  256&lt;br /&gt;
tk@debian13-1:~$&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Write through ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 create test_file_writethrough 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.36% coverage of 1000 MB (234 writes; 234/s)&lt;br /&gt;
  diskchecker: running 2 sec, 0.92% coverage of 1000 MB (587 writes; 293/s)&lt;br /&gt;
  diskchecker: running 3 sec, 1.45% coverage of 1000 MB (929 writes; 309/s)&lt;br /&gt;
  diskchecker: running 4 sec, 1.97% coverage of 1000 MB (1268 writes; 317/s)&lt;br /&gt;
  diskchecker: running 5 sec, 2.49% coverage of 1000 MB (1612 writes; 322/s)&lt;br /&gt;
  diskchecker: running 6 sec, 3.02% coverage of 1000 MB (1957 writes; 326/s)&lt;br /&gt;
  diskchecker: running 7 sec, 3.53% coverage of 1000 MB (2295 writes; 327/s)&lt;br /&gt;
  diskchecker: running 8 sec, 4.07% coverage of 1000 MB (2650 writes; 331/s)&lt;br /&gt;
  diskchecker: running 9 sec, 4.57% coverage of 1000 MB (2989 writes; 332/s)&lt;br /&gt;
  diskchecker: running 10 sec, 5.07% coverage of 1000 MB (3327 writes; 332/s)&lt;br /&gt;
[...]&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 verify test_file_writethrough &lt;br /&gt;
 verifying: 0.02%&lt;br /&gt;
 verifying: 56.67%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
tk@debian13-1:~$ &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Write back ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 create test_file_writeback 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.45% coverage of 1000 MB (289 writes; 289/s)&lt;br /&gt;
  diskchecker: running 2 sec, 1.03% coverage of 1000 MB (671 writes; 335/s)&lt;br /&gt;
  diskchecker: running 3 sec, 1.62% coverage of 1000 MB (1051 writes; 350/s)&lt;br /&gt;
  diskchecker: running 4 sec, 2.21% coverage of 1000 MB (1438 writes; 359/s)&lt;br /&gt;
  diskchecker: running 5 sec, 2.82% coverage of 1000 MB (1831 writes; 366/s)&lt;br /&gt;
  diskchecker: running 6 sec, 3.40% coverage of 1000 MB (2224 writes; 370/s)&lt;br /&gt;
  diskchecker: running 7 sec, 3.98% coverage of 1000 MB (2611 writes; 373/s)&lt;br /&gt;
  diskchecker: running 8 sec, 4.56% coverage of 1000 MB (3005 writes; 375/s)&lt;br /&gt;
  diskchecker: running 9 sec, 5.15% coverage of 1000 MB (3397 writes; 377/s)&lt;br /&gt;
  diskchecker: running 10 sec, 5.73% coverage of 1000 MB (3788 writes; 378/s)&lt;br /&gt;
[...]&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 verify test_file_writeback &lt;br /&gt;
 verifying: 0.03%&lt;br /&gt;
 verifying: 47.70%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
tk@debian13-1:~$ &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Direct sync ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 create test_file_directsync 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.38% coverage of 1000 MB (246 writes; 246/s)&lt;br /&gt;
  diskchecker: running 2 sec, 0.90% coverage of 1000 MB (579 writes; 289/s)&lt;br /&gt;
  diskchecker: running 3 sec, 1.49% coverage of 1000 MB (960 writes; 320/s)&lt;br /&gt;
  diskchecker: running 4 sec, 2.01% coverage of 1000 MB (1302 writes; 325/s)&lt;br /&gt;
  diskchecker: running 5 sec, 2.53% coverage of 1000 MB (1643 writes; 328/s)&lt;br /&gt;
  diskchecker: running 6 sec, 3.08% coverage of 1000 MB (2006 writes; 334/s)&lt;br /&gt;
  diskchecker: running 7 sec, 3.61% coverage of 1000 MB (2363 writes; 337/s)&lt;br /&gt;
  diskchecker: running 8 sec, 4.16% coverage of 1000 MB (2721 writes; 340/s)&lt;br /&gt;
  diskchecker: running 9 sec, 4.74% coverage of 1000 MB (3108 writes; 345/s)&lt;br /&gt;
  diskchecker: running 10 sec, 5.26% coverage of 1000 MB (3463 writes; 346/s)&lt;br /&gt;
[...]&lt;br /&gt;
tk@debian13-1:~$ ./diskchecker.pl -s 172.16.0.112 verify test_file_directsync &lt;br /&gt;
 verifying: 0.01%&lt;br /&gt;
 verifying: 57.56%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
tk@debian13-1:~$ &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://events19.lfasiallc.com/wp-content/uploads/2017/11/Storage-Performance-Tuning-for-FAST-Virtual-Machines_Fam-Zheng.pdf Storage Performance Tuning for FAST! Virtual Machines]&lt;br /&gt;
* [https://documentation.suse.com/de-de/sles/12-SP5/html/SLES-all/cha-cachemodes.html Disk Cache Modes] (documentation.suse.com)&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Wfischer}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Proxmox]]&lt;br /&gt;
[[de:Qemu drive cache Option]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/Ext4_Write_Barriers</id>
		<title>Ext4 Write Barriers</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/Ext4_Write_Barriers"/>
		<updated>2026-03-05T13:18:38Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039; Write barriers &amp;#039;&amp;#039;&amp;#039;are used in the Linux  kernel to ensure that data that has been written is actually written to a data carrier &amp;#039;&amp;#039;&amp;#039;permanently &amp;#039;&amp;#039;&amp;#039;before further new data is written. The use of write barriers ensures that even in the event of a sudden power failure,&amp;#039;&amp;#039;&amp;#039; no data written via fsync() is lost. &amp;#039;&amp;#039;&amp;#039;Write barriers force the&amp;#039;&amp;#039;&amp;#039; correct sequence of journal-commits&amp;#039;&amp;#039;&amp;#039; of the file system on the data carrier which allows volatile write caches to be used safely...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;#039;&amp;#039;&amp;#039; Write barriers &amp;#039;&amp;#039;&amp;#039;are used in the [[Linux]]  kernel to ensure that data that has been written is actually written to a data carrier &amp;#039;&amp;#039;&amp;#039;permanently &amp;#039;&amp;#039;&amp;#039;before further new data is written. The use of write barriers ensures that even in the event of a sudden power failure,&amp;#039;&amp;#039;&amp;#039; no data written via fsync() is lost. &amp;#039;&amp;#039;&amp;#039;Write barriers force the&amp;#039;&amp;#039;&amp;#039; correct sequence of journal-commits&amp;#039;&amp;#039;&amp;#039; of the file system on the data carrier which allows volatile write caches to be used safely (but with some loss of performance).&lt;br /&gt;
&lt;br /&gt;
== Function of write barriers == &lt;br /&gt;
Write barriers are implemented via flushing the storage writing case &amp;#039;&amp;#039;&amp;#039;before&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;after&amp;#039;&amp;#039;&amp;#039; I/O operation. After &amp;#039;&amp;#039;&amp;#039;writing a transaction&amp;#039;&amp;#039;&amp;#039;, the &amp;#039;&amp;#039;&amp;#039;storage-cache is flushed&amp;#039;&amp;#039;&amp;#039;, the &amp;#039;&amp;#039;&amp;#039;commit-block of the file system is written&amp;#039;&amp;#039;&amp;#039; and the &amp;#039;&amp;#039;&amp;#039;cache is emptied again&amp;#039;&amp;#039;&amp;#039;. Therefore, it is ensured that:&lt;br /&gt;
* the data carrier (hard disk or SSD) contains all data&lt;br /&gt;
* no re-ordering of individual accesses has taken place&lt;br /&gt;
&lt;br /&gt;
If barriers are activated, a fsync() call also triggers a storage-cache-flush. This guarantees that the file data is stored permanently on the hard disk even if a power failure occurs shortly after the return of fsync().&lt;br /&gt;
&lt;br /&gt;
== Ext4 file system as example ==&lt;br /&gt;
The [[Ext4]] file system has been using write barriers since May 2008.&amp;lt;ref&amp;gt;[https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=571640cad3fda6475da45d91cf86076f1f86bd9b ext4: enable barriers by default] (git.kernel.org, 26.05.2008)&amp;lt;/ref&amp;gt; This ensures that even with data carriers with volatile caches—e.g., hard disks with RAM caches—no data written using fsync() is lost, even in the event of a sudden power failure.&lt;br /&gt;
&lt;br /&gt;
The activation of write barriers can lead to significant performance losses in some applications. In particular, applications that use fsync() intensively or that create or delete a lot of small files sometimes run significantly slower. &amp;lt;ref&amp;gt;[https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/7/html/storage_administration_guide/ch-writebarriers Chapter 22. Write Barriers] (docs.redhat.com, Storage Administration Guide RHEL 7) &amp;lt;cite&amp;gt;Enabling write barriers incurs a substantial performance penalty for some applications. Specifically, applications that use fsync() heavily or create and delete many small files will likely run much slower.&amp;lt;/cite&amp;gt;&amp;lt;/ref&amp;gt; IF RAID-controllers with battery-backed cache or for example SSDs with [[SSD Power Loss Protection]] are used, the performance can be increased by deactivating write barriers without increasing the risk of data loss. &amp;lt;ref&amp;gt;[https://kb.techtaco.org/linux/postgresql/postgresql_file_system_tuning/#write-barrier-tuning PostgreSQL File System Tuning - Write Barrier Tuning] (kb.techtaco.org)&amp;lt;/ref&amp;gt;However, this only applies if effective power loss protection is actually in place.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Test case&lt;br /&gt;
!HDD Western Digital WD5003ABYX&lt;br /&gt;
!Intel SSD with PLP&lt;br /&gt;
!Samsung SSD without PLP&lt;br /&gt;
|-&lt;br /&gt;
|barriers=1 (activated)&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|no data loss&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|no data loss&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|no data loss&lt;br /&gt;
|-&lt;br /&gt;
|barriers=0 (deactivated)&lt;br /&gt;
!style=&amp;quot;background-color:#FFCCCC;&amp;quot; align=&amp;quot;center&amp;quot;|data loss&lt;br /&gt;
!style=&amp;quot;background-color:#CCFFCC;&amp;quot; align=&amp;quot;center&amp;quot;|no data loss&lt;br /&gt;
|no data loss (Attention: data loss still possible!) &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Ext4 file system tests with diskchecker.pl ==&lt;br /&gt;
The following test has been performed with the [https://gist.github.com/3172656 diskchecker.pl Perl Script]. The test script uses two computers to check whether data can be lost in the event of a power failure. To do this, the script runs on two computers:&lt;br /&gt;
# On a logging computer: The script is in server mode.&lt;br /&gt;
# On the system to be tested: After the script has been started, the power supply is interrupted&lt;br /&gt;
&lt;br /&gt;
The system to be tested is then infected again and restarted. The script is now executed again for verification purposes. Further background information on this script can be found here: http://brad.livejournal.com/2116715.html&lt;br /&gt;
&lt;br /&gt;
=== Test with WD 500 GByte HDD ===&lt;br /&gt;
[[File:Western-Digital-WD5003ABYX-500GB-SATA-64MB-Cache.jpg|300px|thumb|right|Western Digital WD5003ABYX 500GB SATA HDD with 64MB Cache]]In this test, a Western Digital WD5003ABYX 500GB SATA HDD with 64MB cache is used.&lt;br /&gt;
&lt;br /&gt;
==== barrier=1 (default) ====&lt;br /&gt;
&amp;lt;pre&amp;gt;root@pve:~# mount | grep sdc&lt;br /&gt;
/dev/sdc1 on /mnt/sdc-hdd type ext4 (rw,relatime)&lt;br /&gt;
root@pve:~# uname -a&lt;br /&gt;
Linux pve 6.17.2-1-pve #1 SMP PREEMPT_DYNAMIC PMX 6.17.2-1 (2025-10-21T11:55Z) x86_64 GNU/Linux&lt;br /&gt;
root@pve:/mnt/sdc-hdd# ./diskchecker.pl -s 172.16.0.112 create test-hdd-ext4-default 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.02% coverage of 1000 MB (11 writes; 11/s)&lt;br /&gt;
  diskchecker: running 2 sec, 0.05% coverage of 1000 MB (35 writes; 17/s)&lt;br /&gt;
  diskchecker: running 3 sec, 0.09% coverage of 1000 MB (59 writes; 19/s)&lt;br /&gt;
  diskchecker: running 4 sec, 0.13% coverage of 1000 MB (83 writes; 20/s)&lt;br /&gt;
  diskchecker: running 5 sec, 0.17% coverage of 1000 MB (107 writes; 21/s)&lt;br /&gt;
  diskchecker: running 6 sec, 0.20% coverage of 1000 MB (132 writes; 22/s)&lt;br /&gt;
  diskchecker: running 7 sec, 0.24% coverage of 1000 MB (155 writes; 22/s)&lt;br /&gt;
  diskchecker: running 8 sec, 0.28% coverage of 1000 MB (180 writes; 22/s)&lt;br /&gt;
  diskchecker: running 9 sec, 0.32% coverage of 1000 MB (204 writes; 22/s)&lt;br /&gt;
  diskchecker: running 10 sec, 0.36% coverage of 1000 MB (229 writes; 22/s)&lt;br /&gt;
  diskchecker: running 11 sec, 0.39% coverage of 1000 MB (252 writes; 22/s)&lt;br /&gt;
  diskchecker: running 12 sec, 0.43% coverage of 1000 MB (276 writes; 23/s)&lt;br /&gt;
  diskchecker: running 13 sec, 0.47% coverage of 1000 MB (300 writes; 23/s)&lt;br /&gt;
  diskchecker: running 14 sec, 0.50% coverage of 1000 MB (323 writes; 23/s)&lt;br /&gt;
  diskchecker: running 15 sec, 0.54% coverage of 1000 MB (347 writes; 23/s)&lt;br /&gt;
  diskchecker: running 16 sec, 0.58% coverage of 1000 MB (371 writes; 23/s)&lt;br /&gt;
  diskchecker: running 17 sec, 0.62% coverage of 1000 MB (396 writes; 23/s)&lt;br /&gt;
  diskchecker: running 18 sec, 0.66% coverage of 1000 MB (421 writes; 23/s)&lt;br /&gt;
  diskchecker: running 19 sec, 0.69% coverage of 1000 MB (445 writes; 23/s)&lt;br /&gt;
client_loop: send disconnect: Broken pipe&lt;br /&gt;
werner@x390:~/bin$ &lt;br /&gt;
werner@x390:~/bin$ ssh root@172.16.10.1&lt;br /&gt;
root@172.16.10.1&amp;#039;s password: &lt;br /&gt;
Linux pve 6.17.2-1-pve #1 SMP PREEMPT_DYNAMIC PMX 6.17.2-1 (2025-10-21T11:55Z) x86_64&lt;br /&gt;
[...]&lt;br /&gt;
root@pve:~# mount /dev/sdc1 /mnt/sdc-hdd&lt;br /&gt;
root@pve:~# dmesg | tail -4&lt;br /&gt;
[   38.545085] vmbr0: port 1(nic1) entered blocking state&lt;br /&gt;
[   38.545091] vmbr0: port 1(nic1) entered forwarding state&lt;br /&gt;
[  207.082732] EXT4-fs (sdc1): recovery complete&lt;br /&gt;
[  207.101678] EXT4-fs (sdc1): mounted filesystem 8ac821f6-c372-415c-addd-855c3161ded9 r/w with ordered data mode. Quota mode: none.&lt;br /&gt;
root@pve:~# cd /mnt/sdc-hdd/&lt;br /&gt;
root@pve:/mnt/sdc-hdd# ./diskchecker.pl -s 172.16.0.112 verify test-hdd-ext4-default &lt;br /&gt;
 verifying: 0.36%&lt;br /&gt;
 verifying: 19.26%&lt;br /&gt;
 verifying: 59.26%&lt;br /&gt;
 verifying: 94.18%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
root@pve:/mnt/sdc-hdd#&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== barrier=0 ====&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve:~# mount -t ext4 -o barrier=0 /dev/sdc1 /mnt/sdc-hdd&lt;br /&gt;
root@pve:~# mount | grep sdc&lt;br /&gt;
/dev/sdc1 on /mnt/sdc-hdd type ext4 (rw,relatime,nobarrier)&lt;br /&gt;
root@pve:~# cd /mnt/sdc-hdd&lt;br /&gt;
root@pve:/mnt/sdc-hdd# ./diskchecker.pl -s 172.16.0.112 create test-hdd-ext4-nobarrier 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.20% coverage of 1000 MB (129 writes; 129/s)&lt;br /&gt;
  diskchecker: running 2 sec, 0.62% coverage of 1000 MB (394 writes; 197/s)&lt;br /&gt;
  diskchecker: running 3 sec, 0.95% coverage of 1000 MB (608 writes; 202/s)&lt;br /&gt;
  diskchecker: running 4 sec, 1.22% coverage of 1000 MB (782 writes; 195/s)&lt;br /&gt;
  diskchecker: running 5 sec, 1.55% coverage of 1000 MB (998 writes; 199/s)&lt;br /&gt;
  diskchecker: running 6 sec, 1.89% coverage of 1000 MB (1213 writes; 202/s)&lt;br /&gt;
  diskchecker: running 7 sec, 2.13% coverage of 1000 MB (1377 writes; 196/s)&lt;br /&gt;
  diskchecker: running 8 sec, 2.41% coverage of 1000 MB (1556 writes; 194/s)&lt;br /&gt;
  diskchecker: running 9 sec, 2.74% coverage of 1000 MB (1774 writes; 197/s)&lt;br /&gt;
  diskchecker: running 10 sec, 3.00% coverage of 1000 MB (1945 writes; 194/s)&lt;br /&gt;
  diskchecker: running 11 sec, 3.31% coverage of 1000 MB (2146 writes; 195/s)&lt;br /&gt;
  diskchecker: running 12 sec, 3.61% coverage of 1000 MB (2347 writes; 195/s)&lt;br /&gt;
  diskchecker: running 13 sec, 3.90% coverage of 1000 MB (2542 writes; 195/s)&lt;br /&gt;
  diskchecker: running 14 sec, 4.21% coverage of 1000 MB (2750 writes; 196/s)&lt;br /&gt;
  diskchecker: running 15 sec, 4.54% coverage of 1000 MB (2967 writes; 197/s)&lt;br /&gt;
  diskchecker: running 16 sec, 4.80% coverage of 1000 MB (3142 writes; 196/s)&lt;br /&gt;
  diskchecker: running 17 sec, 5.09% coverage of 1000 MB (3336 writes; 196/s)&lt;br /&gt;
  diskchecker: running 18 sec, 5.35% coverage of 1000 MB (3513 writes; 195/s)&lt;br /&gt;
  diskchecker: running 19 sec, 5.65% coverage of 1000 MB (3713 writes; 195/s)&lt;br /&gt;
  diskchecker: running 20 sec, 5.91% coverage of 1000 MB (3890 writes; 194/s)&lt;br /&gt;
  diskchecker: running 21 sec, 6.21% coverage of 1000 MB (4091 writes; 194/s)&lt;br /&gt;
  diskchecker: running 22 sec, 6.48% coverage of 1000 MB (4281 writes; 194/s)&lt;br /&gt;
  diskchecker: running 23 sec, 6.72% coverage of 1000 MB (4449 writes; 193/s)&lt;br /&gt;
  diskchecker: running 24 sec, 7.01% coverage of 1000 MB (4645 writes; 193/s)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
client_loop: send disconnect: Broken pipe&lt;br /&gt;
werner@x390:~/bin$ ssh root@172.16.10.1&lt;br /&gt;
root@172.16.10.1&amp;#039;s password: &lt;br /&gt;
Linux pve 6.17.2-1-pve #1 SMP PREEMPT_DYNAMIC PMX 6.17.2-1 (2025-10-21T11:55Z) x86_64&lt;br /&gt;
[...]&lt;br /&gt;
root@pve:~# mount -t ext4 -o barrier=0 /dev/sdc1 /mnt/sdc-hdd&lt;br /&gt;
root@pve:~# dmesg | tail -n 4&lt;br /&gt;
[   38.535100] vmbr0: port 1(nic1) entered forwarding state&lt;br /&gt;
[  324.430790] EXT4-fs (sdc1): barriers disabled&lt;br /&gt;
[  327.063895] EXT4-fs (sdc1): recovery complete&lt;br /&gt;
[  327.064076] EXT4-fs (sdc1): mounted filesystem 8ac821f6-c372-415c-addd-855c3161ded9 r/w with ordered data mode. Quota mode: none.&lt;br /&gt;
root@pve:~# cd /mnt/sdc-hdd&lt;br /&gt;
root@pve:/mnt/sdc-hdd# ./diskchecker.pl -s 172.16.0.112 verify test-hdd-ext4-nobarrier &lt;br /&gt;
 verifying: 0.02%&lt;br /&gt;
  Error at page 19, 2 seconds before end.&lt;br /&gt;
  Error at page 303, 1 seconds before end.&lt;br /&gt;
  Error at page 339, 0 seconds before end.&lt;br /&gt;
  Error at page 511, 1 seconds before end.&lt;br /&gt;
  Error at page 544, 0 seconds before end.&lt;br /&gt;
  Error at page 681, 0 seconds before end.&lt;br /&gt;
  Error at page 708, 2 seconds before end.&lt;br /&gt;
  Error at page 1108, 1 seconds before end.&lt;br /&gt;
  Error at page 1337, 0 seconds before end.&lt;br /&gt;
  Error at page 1388, 0 seconds before end.&lt;br /&gt;
 verifying: 2.22%&lt;br /&gt;
  Error at page 1487, 0 seconds before end.&lt;br /&gt;
  Error at page 1492, 0 seconds before end.&lt;br /&gt;
[...]&lt;br /&gt;
  Error at page 63758, 0 seconds before end.&lt;br /&gt;
  Error at page 63990, 1 seconds before end.&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 545&lt;br /&gt;
Histogram of seconds before end:&lt;br /&gt;
     0  178&lt;br /&gt;
     1  187&lt;br /&gt;
     2  142&lt;br /&gt;
     3    1&lt;br /&gt;
     4    1&lt;br /&gt;
     6    2&lt;br /&gt;
     7    3&lt;br /&gt;
     8    3&lt;br /&gt;
     9    2&lt;br /&gt;
    10    5&lt;br /&gt;
    11    1&lt;br /&gt;
    14    4&lt;br /&gt;
    15    1&lt;br /&gt;
    16    2&lt;br /&gt;
    17    1&lt;br /&gt;
    18    1&lt;br /&gt;
    19    2&lt;br /&gt;
    20    3&lt;br /&gt;
    22    3&lt;br /&gt;
    23    2&lt;br /&gt;
    24    1&lt;br /&gt;
root@pve:/mnt/sdc-hdd# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Test with SSD with PLP ===&lt;br /&gt;
In this example, a 80 GByte [[Intel DC S3500 Series SSD]] with [[SSD Power Loss Protection]] is used.&lt;br /&gt;
&lt;br /&gt;
==== barrier=1 (default) ====&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve:/mnt/sdc-ssd-with-plp# mount | grep sdc&lt;br /&gt;
/dev/sdc1 on /mnt/sdc-ssd-with-plp type ext4 (rw,relatime)&lt;br /&gt;
root@pve:/mnt/sdc-ssd-with-plp# ./diskchecker.pl -s 172.16.0.112 create test-ssd-ext4 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.04% coverage of 1000 MB (28 writes; 28/s)&lt;br /&gt;
  diskchecker: running 2 sec, 0.67% coverage of 1000 MB (427 writes; 213/s)&lt;br /&gt;
  diskchecker: running 3 sec, 1.34% coverage of 1000 MB (859 writes; 286/s)&lt;br /&gt;
  diskchecker: running 4 sec, 2.05% coverage of 1000 MB (1324 writes; 331/s)&lt;br /&gt;
  diskchecker: running 5 sec, 2.71% coverage of 1000 MB (1758 writes; 351/s)&lt;br /&gt;
  diskchecker: running 6 sec, 3.48% coverage of 1000 MB (2266 writes; 377/s)&lt;br /&gt;
  diskchecker: running 7 sec, 4.24% coverage of 1000 MB (2775 writes; 396/s)&lt;br /&gt;
  diskchecker: running 8 sec, 4.88% coverage of 1000 MB (3207 writes; 400/s)&lt;br /&gt;
  diskchecker: running 9 sec, 5.53% coverage of 1000 MB (3652 writes; 405/s)&lt;br /&gt;
  diskchecker: running 10 sec, 6.14% coverage of 1000 MB (4073 writes; 407/s)&lt;br /&gt;
  diskchecker: running 11 sec, 6.76% coverage of 1000 MB (4492 writes; 408/s)&lt;br /&gt;
  diskchecker: running 12 sec, 7.38% coverage of 1000 MB (4922 writes; 410/s)&lt;br /&gt;
  diskchecker: running 13 sec, 7.98% coverage of 1000 MB (5344 writes; 411/s)&lt;br /&gt;
  diskchecker: running 14 sec, 8.65% coverage of 1000 MB (5799 writes; 414/s)&lt;br /&gt;
  diskchecker: running 15 sec, 9.25% coverage of 1000 MB (6229 writes; 415/s)&lt;br /&gt;
  diskchecker: running 16 sec, 9.84% coverage of 1000 MB (6652 writes; 415/s)&lt;br /&gt;
  diskchecker: running 17 sec, 10.47% coverage of 1000 MB (7103 writes; 417/s)&lt;br /&gt;
  diskchecker: running 18 sec, 11.11% coverage of 1000 MB (7556 writes; 419/s)&lt;br /&gt;
  diskchecker: running 19 sec, 11.71% coverage of 1000 MB (7974 writes; 419/s)&lt;br /&gt;
  diskchecker: running 20 sec, 12.31% coverage of 1000 MB (8405 writes; 420/s)&lt;br /&gt;
  diskchecker: running 21 sec, 12.91% coverage of 1000 MB (8847 writes; 421/s)&lt;br /&gt;
  diskchecker: running 22 sec, 13.57% coverage of 1000 MB (9328 writes; 424/s)&lt;br /&gt;
  diskchecker: running 23 sec, 14.18% coverage of 1000 MB (9767 writes; 424/s)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
werner@x390:~/bin$ ssh root@172.16.10.1&lt;br /&gt;
root@172.16.10.1&amp;#039;s password: &lt;br /&gt;
Linux pve 6.17.2-1-pve #1 SMP PREEMPT_DYNAMIC PMX 6.17.2-1 (2025-10-21T11:55Z) x86_64&lt;br /&gt;
[...]&lt;br /&gt;
root@pve:~# mount /dev/sdc1 /mnt/sdc-ssd-with-plp&lt;br /&gt;
root@pve:~# dmesg | tail -n 4&lt;br /&gt;
[   38.515045] vmbr0: port 1(nic1) entered blocking state&lt;br /&gt;
[   38.515052] vmbr0: port 1(nic1) entered forwarding state&lt;br /&gt;
[  175.603062] EXT4-fs (sdc1): recovery complete&lt;br /&gt;
[  175.603218] EXT4-fs (sdc1): mounted filesystem 2847a7c0-0a1e-4ab8-8a4b-7c2856dcf0a3 r/w with ordered data mode. Quota mode: none.&lt;br /&gt;
root@pve:~# cd /mnt/sdc-ssd-with-plp/&lt;br /&gt;
root@pve:/mnt/sdc-ssd-with-plp# ./diskchecker.pl -s 172.16.0.112 verify test-ssd-ext4 &lt;br /&gt;
 verifying: 0.00%&lt;br /&gt;
 verifying: 28.12%&lt;br /&gt;
 verifying: 85.80%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
root@pve:/mnt/sdc-ssd-with-plp# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== barrier=0 ====&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve:~# mount -t ext4 -o barrier=0 /dev/sdc1 /mnt/sdc-ssd-with-plp&lt;br /&gt;
root@pve:~# mount | grep sdc&lt;br /&gt;
/dev/sdc1 on /mnt/sdc-ssd-with-plp type ext4 (rw,relatime,nobarrier)&lt;br /&gt;
root@pve:~# cd /mnt/sdc-ssd-with-plp/&lt;br /&gt;
root@pve:/mnt/sdc-ssd-with-plp# ./diskchecker.pl -s 172.16.0.112 create test-ssd-ext4-nobarrier 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.45% coverage of 1000 MB (289 writes; 289/s)&lt;br /&gt;
  diskchecker: running 2 sec, 1.19% coverage of 1000 MB (768 writes; 384/s)&lt;br /&gt;
  diskchecker: running 3 sec, 1.90% coverage of 1000 MB (1230 writes; 410/s)&lt;br /&gt;
  diskchecker: running 4 sec, 2.65% coverage of 1000 MB (1721 writes; 430/s)&lt;br /&gt;
  diskchecker: running 5 sec, 3.47% coverage of 1000 MB (2258 writes; 451/s)&lt;br /&gt;
  diskchecker: running 6 sec, 4.20% coverage of 1000 MB (2743 writes; 457/s)&lt;br /&gt;
  diskchecker: running 7 sec, 4.92% coverage of 1000 MB (3246 writes; 463/s)&lt;br /&gt;
  diskchecker: running 8 sec, 5.72% coverage of 1000 MB (3783 writes; 472/s)&lt;br /&gt;
  diskchecker: running 9 sec, 6.43% coverage of 1000 MB (4266 writes; 474/s)&lt;br /&gt;
  diskchecker: running 10 sec, 7.15% coverage of 1000 MB (4756 writes; 475/s)&lt;br /&gt;
  diskchecker: running 11 sec, 7.90% coverage of 1000 MB (5270 writes; 479/s)&lt;br /&gt;
  diskchecker: running 12 sec, 8.60% coverage of 1000 MB (5758 writes; 479/s)&lt;br /&gt;
  diskchecker: running 13 sec, 9.43% coverage of 1000 MB (6325 writes; 486/s)&lt;br /&gt;
  diskchecker: running 14 sec, 10.17% coverage of 1000 MB (6862 writes; 490/s)&lt;br /&gt;
  diskchecker: running 15 sec, 10.86% coverage of 1000 MB (7354 writes; 490/s)&lt;br /&gt;
  diskchecker: running 16 sec, 11.57% coverage of 1000 MB (7870 writes; 491/s)&lt;br /&gt;
  diskchecker: running 17 sec, 12.21% coverage of 1000 MB (8337 writes; 490/s)&lt;br /&gt;
  diskchecker: running 18 sec, 12.88% coverage of 1000 MB (8821 writes; 490/s)&lt;br /&gt;
  diskchecker: running 19 sec, 13.50% coverage of 1000 MB (9288 writes; 488/s)&lt;br /&gt;
  diskchecker: running 20 sec, 14.15% coverage of 1000 MB (9755 writes; 487/s)&lt;br /&gt;
  diskchecker: running 21 sec, 14.76% coverage of 1000 MB (10213 writes; 486/s)&lt;br /&gt;
  diskchecker: running 22 sec, 15.45% coverage of 1000 MB (10719 writes; 487/s)&lt;br /&gt;
  diskchecker: running 23 sec, 16.09% coverage of 1000 MB (11199 writes; 486/s)&lt;br /&gt;
  diskchecker: running 24 sec, 16.71% coverage of 1000 MB (11681 writes; 486/s)&lt;br /&gt;
  diskchecker: running 25 sec, 17.52% coverage of 1000 MB (12301 writes; 492/s)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve:~# mount -t ext4 -o barrier=0 /dev/sdc1 /mnt/sdc-ssd-with-plp&lt;br /&gt;
root@pve:~# dmesg | tail -n 4&lt;br /&gt;
[   38.503206] vmbr0: port 1(nic1) entered forwarding state&lt;br /&gt;
[  128.406477] EXT4-fs (sdc1): barriers disabled&lt;br /&gt;
[  129.953659] EXT4-fs (sdc1): recovery complete&lt;br /&gt;
[  129.953789] EXT4-fs (sdc1): mounted filesystem 2847a7c0-0a1e-4ab8-8a4b-7c2856dcf0a3 r/w with ordered data mode. Quota mode: none.&lt;br /&gt;
root@pve:~# cd /mnt/sdc-ssd-with-plp&lt;br /&gt;
root@pve:/mnt/sdc-ssd-with-plp# ./diskchecker.pl -s 172.16.0.112 verify test-ssd-ext4-nobarrier &lt;br /&gt;
 verifying: 0.00%&lt;br /&gt;
 verifying: 29.52%&lt;br /&gt;
 verifying: 77.96%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
root@pve:/mnt/sdc-ssd-with-plp# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Test with SSD without PLP ===&lt;br /&gt;
In this test, a 512 GByte Samsung 850 PRO SATA SSD is used.&lt;br /&gt;
&lt;br /&gt;
==== barrier=1 (default) ====&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve:~# mkfs.ext4 /dev/sdc1 &lt;br /&gt;
mke2fs 1.47.2 (1-Jan-2025)&lt;br /&gt;
Discarding device blocks: done                            &lt;br /&gt;
Creating filesystem with 125026646 4k blocks and 31260672 inodes&lt;br /&gt;
Filesystem UUID: b1721738-9749-4b86-9d05-d380b0337316&lt;br /&gt;
Superblock backups stored on blocks: &lt;br /&gt;
	32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632, 2654208, &lt;br /&gt;
	4096000, 7962624, 11239424, 20480000, 23887872, 71663616, 78675968, &lt;br /&gt;
	102400000&lt;br /&gt;
&lt;br /&gt;
Allocating group tables: done                            &lt;br /&gt;
Writing inode tables: done                            &lt;br /&gt;
Creating journal (262144 blocks): done&lt;br /&gt;
Writing superblocks and filesystem accounting information: done     &lt;br /&gt;
&lt;br /&gt;
root@pve:~# mkdir /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:~# mount /dev/sdc1 /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:~# cd /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# wget https://gist.githubusercontent.com/bradfitz/3172656/raw/301f516a4719b48cc9c133c4ba9c864ff8eaf056/diskchecker.pl&lt;br /&gt;
[...]&lt;br /&gt;
2026-02-27 11:34:15 (140 MB/s) - &amp;#039;diskchecker.pl&amp;#039; saved [6702/6702]&lt;br /&gt;
&lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# chmod +x diskchecker.pl &lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# sync&lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# ./diskchecker.pl -s 172.16.0.112 create test-ssd-noplp-ext4 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.03% coverage of 1000 MB (22 writes; 22/s)&lt;br /&gt;
  diskchecker: running 2 sec, 0.33% coverage of 1000 MB (214 writes; 107/s)&lt;br /&gt;
  diskchecker: running 3 sec, 0.64% coverage of 1000 MB (408 writes; 136/s)&lt;br /&gt;
  diskchecker: running 4 sec, 0.94% coverage of 1000 MB (603 writes; 150/s)&lt;br /&gt;
  diskchecker: running 5 sec, 1.24% coverage of 1000 MB (803 writes; 160/s)&lt;br /&gt;
  diskchecker: running 6 sec, 1.54% coverage of 1000 MB (993 writes; 165/s)&lt;br /&gt;
  diskchecker: running 7 sec, 1.86% coverage of 1000 MB (1205 writes; 172/s)&lt;br /&gt;
  diskchecker: running 8 sec, 2.16% coverage of 1000 MB (1399 writes; 174/s)&lt;br /&gt;
  diskchecker: running 9 sec, 2.48% coverage of 1000 MB (1607 writes; 178/s)&lt;br /&gt;
  diskchecker: running 10 sec, 2.79% coverage of 1000 MB (1810 writes; 181/s)&lt;br /&gt;
  diskchecker: running 11 sec, 3.09% coverage of 1000 MB (2012 writes; 182/s)&lt;br /&gt;
  diskchecker: running 12 sec, 3.40% coverage of 1000 MB (2216 writes; 184/s)&lt;br /&gt;
  diskchecker: running 13 sec, 3.69% coverage of 1000 MB (2412 writes; 185/s)&lt;br /&gt;
  diskchecker: running 14 sec, 3.99% coverage of 1000 MB (2615 writes; 186/s)&lt;br /&gt;
  diskchecker: running 15 sec, 4.29% coverage of 1000 MB (2814 writes; 187/s)&lt;br /&gt;
  diskchecker: running 16 sec, 4.60% coverage of 1000 MB (3018 writes; 188/s)&lt;br /&gt;
  diskchecker: running 17 sec, 4.90% coverage of 1000 MB (3218 writes; 189/s)&lt;br /&gt;
  diskchecker: running 18 sec, 5.20% coverage of 1000 MB (3425 writes; 190/s)&lt;br /&gt;
  diskchecker: running 19 sec, 5.50% coverage of 1000 MB (3626 writes; 190/s)&lt;br /&gt;
  diskchecker: running 20 sec, 5.79% coverage of 1000 MB (3828 writes; 191/s)&lt;br /&gt;
  diskchecker: running 21 sec, 6.08% coverage of 1000 MB (4028 writes; 191/s)&lt;br /&gt;
  diskchecker: running 22 sec, 6.36% coverage of 1000 MB (4214 writes; 191/s)&lt;br /&gt;
  diskchecker: running 23 sec, 6.65% coverage of 1000 MB (4414 writes; 191/s)&lt;br /&gt;
  diskchecker: running 24 sec, 6.94% coverage of 1000 MB (4617 writes; 192/s)&lt;br /&gt;
  diskchecker: running 25 sec, 7.23% coverage of 1000 MB (4816 writes; 192/s)&lt;br /&gt;
  diskchecker: running 26 sec, 7.52% coverage of 1000 MB (5020 writes; 193/s)&lt;br /&gt;
client_loop: send disconnect: Broken pipe&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
werner@x390:~/bin$ ssh root@172.16.10.1&lt;br /&gt;
root@172.16.10.1&amp;#039;s password: &lt;br /&gt;
Linux pve 6.17.2-1-pve #1 SMP PREEMPT_DYNAMIC PMX 6.17.2-1 (2025-10-21T11:55Z) x86_64&lt;br /&gt;
&lt;br /&gt;
The programs included with the Debian GNU/Linux system are free software;&lt;br /&gt;
the exact distribution terms for each program are described in the&lt;br /&gt;
individual files in /usr/share/doc/*/copyright.&lt;br /&gt;
&lt;br /&gt;
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent&lt;br /&gt;
permitted by applicable law.&lt;br /&gt;
Last login: Fri Feb 27 11:32:14 2026 from 172.16.0.112&lt;br /&gt;
root@pve:~# mount /dev/sdc1 /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:~# dme&lt;br /&gt;
dmesg     dmeventd  &lt;br /&gt;
root@pve:~# dmesg | tail -n 4&lt;br /&gt;
[   38.593080] vmbr0: port 1(nic1) entered blocking state&lt;br /&gt;
[   38.593084] vmbr0: port 1(nic1) entered forwarding state&lt;br /&gt;
[   88.513484] EXT4-fs (sdc1): recovery complete&lt;br /&gt;
[   88.514141] EXT4-fs (sdc1): mounted filesystem b1721738-9749-4b86-9d05-d380b0337316 r/w with ordered data mode. Quota mode: none.&lt;br /&gt;
root@pve:~# cd /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# ./diskchecker.pl -s 172.16.0.112 verify test-ssd-noplp-ext4 &lt;br /&gt;
 verifying: 0.02%&lt;br /&gt;
 verifying: 3.74%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== barrier=0 ====&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pve:~# mount -t ext4 -o barrier=0 /dev/sdc1 /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:~# mount | grep sdc&lt;br /&gt;
/dev/sdc1 on /mnt/sdc-ssd-without-plp type ext4 (rw,relatime,nobarrier)&lt;br /&gt;
root@pve:~# cd /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# ./diskchecker.pl -s 172.16.0.112 create test-ssd-noplp-ext4-nobarrier 1000&lt;br /&gt;
  diskchecker: running 1 sec, 0.47% coverage of 1000 MB (303 writes; 303/s)&lt;br /&gt;
  diskchecker: running 2 sec, 1.26% coverage of 1000 MB (814 writes; 407/s)&lt;br /&gt;
  diskchecker: running 3 sec, 1.97% coverage of 1000 MB (1274 writes; 424/s)&lt;br /&gt;
  diskchecker: running 4 sec, 2.75% coverage of 1000 MB (1783 writes; 445/s)&lt;br /&gt;
  diskchecker: running 5 sec, 3.51% coverage of 1000 MB (2285 writes; 457/s)&lt;br /&gt;
  diskchecker: running 6 sec, 4.34% coverage of 1000 MB (2835 writes; 472/s)&lt;br /&gt;
  diskchecker: running 7 sec, 5.14% coverage of 1000 MB (3371 writes; 481/s)&lt;br /&gt;
  diskchecker: running 8 sec, 5.90% coverage of 1000 MB (3883 writes; 485/s)&lt;br /&gt;
  diskchecker: running 9 sec, 6.59% coverage of 1000 MB (4348 writes; 483/s)&lt;br /&gt;
  diskchecker: running 10 sec, 7.26% coverage of 1000 MB (4809 writes; 480/s)&lt;br /&gt;
  diskchecker: running 11 sec, 8.02% coverage of 1000 MB (5333 writes; 484/s)&lt;br /&gt;
  diskchecker: running 12 sec, 8.75% coverage of 1000 MB (5843 writes; 486/s)&lt;br /&gt;
  diskchecker: running 13 sec, 9.43% coverage of 1000 MB (6317 writes; 485/s)&lt;br /&gt;
  diskchecker: running 14 sec, 10.12% coverage of 1000 MB (6805 writes; 486/s)&lt;br /&gt;
  diskchecker: running 15 sec, 11.05% coverage of 1000 MB (7450 writes; 496/s)&lt;br /&gt;
  diskchecker: running 16 sec, 11.70% coverage of 1000 MB (7912 writes; 494/s)&lt;br /&gt;
  diskchecker: running 17 sec, 12.38% coverage of 1000 MB (8401 writes; 494/s)&lt;br /&gt;
  diskchecker: running 18 sec, 12.99% coverage of 1000 MB (8862 writes; 492/s)&lt;br /&gt;
  diskchecker: running 19 sec, 13.65% coverage of 1000 MB (9352 writes; 492/s)&lt;br /&gt;
  diskchecker: running 20 sec, 14.29% coverage of 1000 MB (9822 writes; 491/s)&lt;br /&gt;
  diskchecker: running 21 sec, 14.92% coverage of 1000 MB (10294 writes; 490/s)&lt;br /&gt;
  diskchecker: running 22 sec, 15.55% coverage of 1000 MB (10761 writes; 489/s)&lt;br /&gt;
  diskchecker: running 23 sec, 16.21% coverage of 1000 MB (11261 writes; 489/s)&lt;br /&gt;
  diskchecker: running 24 sec, 16.82% coverage of 1000 MB (11741 writes; 489/s)&lt;br /&gt;
client_loop: send disconnect: Broken pipe&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
werner@x390:~/bin$ ssh root@172.16.10.1&lt;br /&gt;
root@172.16.10.1&amp;#039;s password: &lt;br /&gt;
Linux pve 6.17.2-1-pve #1 SMP PREEMPT_DYNAMIC PMX 6.17.2-1 (2025-10-21T11:55Z) x86_64&lt;br /&gt;
[...]&lt;br /&gt;
root@pve:~# mount -t ext4 -o barrier=0 /dev/sdc1 /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:~# dmesg | tail -n 4&lt;br /&gt;
[   38.959022] vmbr0: port 1(nic1) entered forwarding state&lt;br /&gt;
[  322.860448] EXT4-fs (sdc1): barriers disabled&lt;br /&gt;
[  323.915454] EXT4-fs (sdc1): recovery complete&lt;br /&gt;
[  323.915513] EXT4-fs (sdc1): mounted filesystem b1721738-9749-4b86-9d05-d380b0337316 r/w with ordered data mode. Quota mode: none.&lt;br /&gt;
root@pve:~# cd /mnt/sdc-ssd-with&lt;br /&gt;
sdc-ssd-without-plp/ sdc-ssd-with-plp/    &lt;br /&gt;
root@pve:~# cd /mnt/sdc-ssd-without-plp&lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# ./diskchecker.pl -s 172.16.0.112 verify test-ssd-noplp-ext4&lt;br /&gt;
test-ssd-noplp-ext4            test-ssd-noplp-ext4-nobarrier  &lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# ./diskchecker.pl -s 172.16.0.112 verify test-ssd-noplp-ext4-nobarrier &lt;br /&gt;
 verifying: 0.01%&lt;br /&gt;
 verifying: 49.87%&lt;br /&gt;
 verifying: 100.00%&lt;br /&gt;
Total errors: 0&lt;br /&gt;
root@pve:/mnt/sdc-ssd-without-plp# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [https://lwn.net/Articles/283161/ Barriers and journaling filesystems] (lwn.net, 21.05.2008)&lt;br /&gt;
* [https://docs.kernel.org/admin-guide/ext4.html ext4 General Information] (docs.kernel.org/admin-guide)&lt;br /&gt;
* https://web.archive.org/web/20200227164936/https://www.fibrevillage.com/storage/565-what-s-barriers-how-to-enable-disable-it-on-linux&lt;br /&gt;
* [https://www.linux-magazine.com/content/download/63318/487772/file/Write_Barriers.pdf IMPOSING ORDER: Working with write barriers and journaling filesystems] (Linux-Magazine Issue 78, May 2007)&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Wfischer}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Linux]]&lt;br /&gt;
[[de:Ext4 Write Barriers]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
	<entry>
		<id>https://www.thomas-krenn.com/en/wiki/TKMI_Logs_%26_Reports</id>
		<title>TKMI Logs &amp; Reports</title>
		<link rel="alternate" type="text/html" href="https://www.thomas-krenn.com/en/wiki/TKMI_Logs_%26_Reports"/>
		<updated>2026-03-03T11:22:10Z</updated>

		<summary type="html">&lt;p&gt;Aranzinger: Created page with &amp;quot;The TKMI records different &amp;#039;&amp;#039;&amp;#039;system reports&amp;#039;&amp;#039;&amp;#039;. Every report is geared to a certain use. In the following, the reports are presented individually.  == IPMI Event Log == TKMI IPMI &amp;amp; Event Log This report lists all recorded events chronologically in the &amp;#039;&amp;#039;Intelligent Platform Management Interface (IPMI)&amp;#039;&amp;#039;.  With the help of the filter settings, specific entries can be...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [[Overview TKMI|TKMI]] records different &amp;#039;&amp;#039;&amp;#039;system reports&amp;#039;&amp;#039;&amp;#039;. Every report is geared to a certain use. In the following, the reports are presented individually.&lt;br /&gt;
&lt;br /&gt;
== IPMI Event Log ==&lt;br /&gt;
[[File:TKMI_Logs-Reports_IPMI-Event-Log.png|alt=TKMI IPMI &amp;amp; Event Log|thumb|153x153px|TKMI IPMI &amp;amp; Event Log]]&lt;br /&gt;
This report lists all recorded events chronologically in the &amp;#039;&amp;#039;Intelligent Platform Management Interface (IPMI)&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
With the help of the filter settings, specific entries can be searched:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Filter by Date&amp;#039;&amp;#039;&amp;#039;: The displayed events are limited to a determined period.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Filter by type&amp;#039;&amp;#039;&amp;#039;: The displayed events are determined to a specific event or sensors.&lt;br /&gt;
&lt;br /&gt;
With the help of the &amp;#039;&amp;#039;Clear Event Logs&amp;#039;&amp;#039; button , the events recorded so far can be deleted.&lt;br /&gt;
&lt;br /&gt;
With the help of the &amp;#039;&amp;#039;Download Event Logs&amp;#039;&amp;#039; button, the recorded events can be exported. &lt;br /&gt;
&lt;br /&gt;
Furthermore, you will receive statistics on the number of monthly recorded events as a bar chart. &lt;br /&gt;
== Operation Log ==&lt;br /&gt;
[[File:TKMI_Logs-Reports_Operation-Log.png|alt=TKMI Operation Log|thumb|157x157px|TKMI Operation Log]]&lt;br /&gt;
This report lists all events, that concern the host-system, in chronological order.&lt;br /&gt;
&lt;br /&gt;
The following options are available for presentation:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Filter by Date&amp;#039;&amp;#039;&amp;#039;: Start and end times of the listed operations can be determined and enables restriction to specific time periods. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Event Category&amp;#039;&amp;#039;&amp;#039;: Either &amp;#039;&amp;#039;Information&amp;#039;&amp;#039; or &amp;#039;&amp;#039;Warning&amp;#039;&amp;#039; logs can be displayed. The former contain simple status events, while the latter only list events associated with warnings.&lt;br /&gt;
&lt;br /&gt;
With the help of the &amp;#039;&amp;#039;Clear Logs&amp;#039;&amp;#039; button, all available log entries will be deleted.&lt;br /&gt;
&lt;br /&gt;
With the help of the &amp;#039;&amp;#039;Download Logs&amp;#039;&amp;#039; button, all available log entries can be downloaded. The entries are stored in &amp;lt;code&amp;gt;log&amp;lt;/code&amp;gt; file format and packaged in a &amp;lt;code&amp;gt;tgz&amp;lt;/code&amp;gt; archive.&lt;br /&gt;
&lt;br /&gt;
== Audit Log ==&lt;br /&gt;
[[File:TKMI_Logs-Reports_Audit-Log.png|alt=TKMI Audit Log|thumb|154x154px|TKMI Audit Log]]&lt;br /&gt;
This report lists all events about the host system, which serve to ensure compliance, security, and problem solving. &lt;br /&gt;
&lt;br /&gt;
In particular, the system reports contain the user ID and IP address of the actions performed.&lt;br /&gt;
&lt;br /&gt;
The following options are available for display:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Filter by Date&amp;#039;&amp;#039;&amp;#039;: Start and end time of the listed operations can be determined and enables restriction to specific time periods. &lt;br /&gt;
&lt;br /&gt;
With the help of the &amp;#039;&amp;#039;Clear Logs&amp;#039;&amp;#039; button, all available log entries will be deleted. &lt;br /&gt;
&lt;br /&gt;
With the help of the &amp;#039;&amp;#039;Download Logs&amp;#039;&amp;#039; button, all available log entries can be downloaded. The entries are stored in &amp;lt;code&amp;gt;log&amp;lt;/code&amp;gt; file format and packaged in a &amp;lt;code&amp;gt;tgz&amp;lt;/code&amp;gt;-archive.&lt;br /&gt;
&lt;br /&gt;
== Video Log ==&lt;br /&gt;
[[File:TKMI_Logs-Reports_Video-Log.png|alt=TKMI Video Log|thumb|153x153px|TKMI Video Log]]&lt;br /&gt;
This report lists videos recorded by the host system. Settings for video triggers, recording quality, and storage location can be configured in [[TKMI Settings]].&lt;br /&gt;
&lt;br /&gt;
The following options are available for display:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Filter by Date&amp;#039;&amp;#039;&amp;#039;: Start and end time of listed operations can be determined and enables restriction to specific time periods.&lt;br /&gt;
&lt;br /&gt;
With the help of the &amp;#039;&amp;#039;Clear Logs&amp;#039;&amp;#039; buttons, all available log entries will be deleted. &lt;br /&gt;
&lt;br /&gt;
== SOL Video Log ==&lt;br /&gt;
[[File:TKMI_Logs-Reports_SOL-Video-Log.png|alt=TKMI Serial on LAN (SOL) Log|thumb|154x154px|TKMI Serial on LAN (SOL) Log]]&lt;br /&gt;
This report lists a video-file recorded via &amp;#039;&amp;#039;Serial over LAN&amp;#039;&amp;#039;. Settings for video triggers, recording quality, and storage location can be configured in [[TKMI Settings]].&lt;br /&gt;
&lt;br /&gt;
The following options are available for display:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Filter by Date&amp;#039;&amp;#039;&amp;#039;: Start- and end time of listed operations can be determined and enables restriction to specific time periods.&lt;br /&gt;
&lt;br /&gt;
With the help of the &amp;#039;&amp;#039;Clear Logs&amp;#039;&amp;#039; button, all available log entries will be deleted.&lt;br /&gt;
&lt;br /&gt;
{{Sbohn}}&lt;br /&gt;
{{Aranzinger}}&lt;br /&gt;
[[Category:Thomas-Krenn Management Interface]]&lt;br /&gt;
[[de:TKMI Logs &amp;amp; Reports]]&lt;/div&gt;</summary>
		<author><name>Aranzinger</name></author>
	</entry>
</feed>