GPUs & CPUs & Enthusiast hardware: Questions, Discussion and fanboy slap-fights - Nvidia & AMD & Intel - Separe but Equal. Intel rides in the back of the bus.

Talk of an 8000G refresh which would suck and be booooring.
eh, shit is so stagnated lately that it be easy bet they will just make it work with pcie 5.0 and touchup a little from 8700G, the vram and L3 cache being absolute shit doesn't make it any appealing, i mean, the 5500 X3D wasn't appealing for me here but it didn't stop retards from forking out nearly 80% of a monkeyzillian minimum wage to buy that piece of shit since they still fell for the 5700X3D meme instead of picking the non-cucked 5800X3D.
 
Mike Hawk point?
Careful where you point that thing.
eh, shit is so stagnated lately that it be easy bet they will just make it work with pcie 5.0 and touchup a little from 8700G, the vram and L3 cache being absolute shit doesn't make it any appealing, i mean, the 5500 X3D wasn't appealing for me here but it didn't stop retards from forking out nearly 80% of a monkeyzillian minimum wage to buy that piece of shit since they still fell for the 5700X3D meme instead of picking the non-cucked 5800X3D.
I bet a 5500X3D games 85-90% as fast as 5800X3D.
 
An addendum to the Mikrotik configuration discussion, turns out the trick to making the explicit forward chain firewall filter working is simply adding a action=accept in-interface-list=LAN rule right before "drop everything else", then all the LAN devices can communicate with each other but everything else will be thrown out. However drop everything else alone won't be enough to block WAN access by default so an extra set of filters needs to be made to block WAN connections on all interfaces, and then allow them on LAN.
Code:
add action=drop chain=forward comment="Drop invalid" connection-state=invalid
add action=fasttrack-connection chain=forward comment="FastTrack established,related" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="Accept established,related" connection-state=established,related
add action=drop chain=forward comment="Block addresses from Internet" out-interface-list=WAN src-address-list=blocked_internet
add action=accept chain=forward comment="Allow LAN Internet access" in-interface-list=LAN out-interface-list=WAN
add action=drop chain=forward comment="Block Internet access for everything else" out-interface-list=WAN
add action=accept chain=forward comment="Accept LAN traffic" in-interface-list=LAN
add action=drop chain=forward comment="Drop everything else"
This way it's easier to set up isolated networks as everything not defined in the firewall will by default be blocked from communicating with the Internet or with each other/other networks. You want a guest network? Just explicitly allow WAN connections and that's all they'll get. You want an IoT network that can only be looked into from the outside but not the other way around? Just define a one way rule, though I'm yet to figure that one out properly.

Also, I've made a Networking General thread eons ago so maybe it's time to reactivate it given that there's networking talk happening here and there.
 
Back