<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>FritzBox Archive - Pixelfriedhof</title>
	<atom:link href="https://pixelfriedhof.com/en/tag/fritzbox-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://pixelfriedhof.com/en/tag/fritzbox-en/</link>
	<description>IT-Blog, Fotoblog, Travelblog, Nerdstuff</description>
	<lastBuildDate>Fri, 06 Jan 2023 11:05:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://pixelfriedhof.com/wp-content/uploads/2022/02/cropped-My-project-3-32x32.png</url>
	<title>FritzBox Archive - Pixelfriedhof</title>
	<link>https://pixelfriedhof.com/en/tag/fritzbox-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mount Fritzbox in rack with Fritzbox Rackmount bracket</title>
		<link>https://pixelfriedhof.com/en/mount-fritzbox-in-rack-with-fritzbox-rackmount-bracket/</link>
					<comments>https://pixelfriedhof.com/en/mount-fritzbox-in-rack-with-fritzbox-rackmount-bracket/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Fri, 06 Jan 2023 10:22:31 +0000</pubDate>
				<category><![CDATA[IT relevant topics]]></category>
		<category><![CDATA[FritzBox]]></category>
		<guid isPermaLink="false">https://pixelfriedhof.com/?p=6940</guid>

					<description><![CDATA[<p>The Fritzbox should no longer stand around in an untidy way? Here are mounting brackets for the server cabinet and patch cabinet?</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/mount-fritzbox-in-rack-with-fritzbox-rackmount-bracket/">Mount Fritzbox in rack with Fritzbox Rackmount bracket</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Fritzbox should no longer stand around in an untidy way? Here are mounting brackets for the server cabinet and patch cabinet!</p>



<p>From &#8220;GrabbeIT&#8221; there is a perfect <a href="https://geni.us/fritzmount" target="_blank" rel="noreferrer noopener sponsored nofollow">Fritzbox mounting option for 19&#8243; server and network cabinets</a> * made of 1.5mm thick powder-coated sheet steel. Thanks to laser-cut openings on the bottom side, the cooling of the Fritzbox is also guaranteed. On the front side of the bracket there are cutouts for Keystone patch connectors, thus the connections of the Fritzbox can be routed to the front.</p>



<p>This mount is a universal mount for the following models:</p>



<ul class="wp-block-list">
<li>AVM Fritzbox 3490</li>



<li>AVM Fritzbox 5490 FIBER</li>



<li>AVM Fritzbox 5491 FIBER</li>



<li>AVM Frittzbox 6490 Cable</li>



<li>AVM Fritzbox 6660 Cable</li>



<li>AVM Fritzbox 6890 LTE</li>



<li>AVM Fritzbox 7490</li>



<li>AVM Fritzbox 7590</li>
</ul>








<div class="aawp">

            
            
<div class="aawp-product aawp-product--horizontal"  data-aawp-product-asin="B07NCWMV3M" data-aawp-product-id="10675" data-aawp-tracking-id="daniel-net-21" data-aawp-product-title="GrabbeIT V2 Rackhalterung AVM Fritz!Box 7690 7590 5590 Fiber 6890 LTE Black Edition">

    
    <div class="aawp-product__thumb">
        <a class="aawp-product__image-link"
           href="https://www.amazon.de/dp/B07NCWMV3M?tag=daniel-net-21&linkCode=ogi&th=1&psc=1" title="GrabbeIT V2 Rackhalterung AVM Fritz!Box 7690, 7590, 5590 Fiber, 6890 LTE Black Edition" rel="nofollow noopener sponsored" target="_blank">
            <img decoding="async" class="aawp-product__image" src="https://pixelfriedhof.com/wp-content/plugins/aawp/public/image.php?url=YUhSMGNITTZMeTl0TG0xbFpHbGhMV0Z0WVhwdmJpNWpiMjB2YVcxaFoyVnpMMGt2TWpFemRYQlVaVTVIZDB3dVgxTk1NVFl3WHk1cWNHYz18MTc2MzkxNzMzMw=" alt="GrabbeIT V2 Rackhalterung AVM Fritz!Box 7690, 7590, 5590 Fiber, 6890 LTE Black Edition"  />
        </a>

            </div>

    <div class="aawp-product__content">
        <a class="aawp-product__title" href="https://www.amazon.de/dp/B07NCWMV3M?tag=daniel-net-21&linkCode=ogi&th=1&psc=1" title="GrabbeIT V2 Rackhalterung AVM Fritz!Box 7690, 7590, 5590 Fiber, 6890 LTE Black Edition" rel="nofollow noopener sponsored" target="_blank">
            GrabbeIT V2 Rackhalterung AVM Fritz!Box 7690, 7590, 5590 Fiber, 6890 LTE Black Edition*        </a>
        <div class="aawp-product__description">
            <ul><li>Wie verbessern unsere Produkte auf Kundenanregungen. Daher haben wir der neuen Halterung KeyStone kompatible Löcher gegeben, welche es...</li><li>Passend ind Standard 19" Netzwerkschränke</li></ul>        </div>
    </div>

    <div class="aawp-product__footer">

        <div class="aawp-product__pricing">
            
                            <span class="aawp-product__price aawp-product__price--current"></span>
            
                    </div>

                <a class="aawp-button aawp-button--buy aawp-button aawp-button--amazon aawp-button--icon aawp-button--icon-black" href="https://www.amazon.de/dp/B07NCWMV3M?tag=daniel-net-21&#038;linkCode=ogi&#038;th=1&#038;psc=1" title="Amazon" target="_blank" rel="nofollow noopener sponsored">Amazon</a>
            </div>

</div>

    
</div>




<p class="has-small-font-size">* All links marked with an asterisk are Amazon affiliate links. We receive a percentage of the purchases made through them. Nevertheless, our recommendations are honest and sincere.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/mount-fritzbox-in-rack-with-fritzbox-rackmount-bracket/">Mount Fritzbox in rack with Fritzbox Rackmount bracket</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/mount-fritzbox-in-rack-with-fritzbox-rackmount-bracket/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>iPhone: Force VPN connection when connected to foreign WiFi</title>
		<link>https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/</link>
					<comments>https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Sat, 25 Aug 2018 12:45:43 +0000</pubDate>
				<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Configurator]]></category>
		<category><![CDATA[FritzBox]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[IPSec]]></category>
		<category><![CDATA[Profile]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">http://pixelfriedhof.com/?p=167</guid>

					<description><![CDATA[<p>By using profile files for device configuration, iPhone can be set up to automatically establish a secure VPN connection when connecting public unsafe wireless networks. This article contains an explanation and an easily customizable template.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/">iPhone: Force VPN connection when connected to foreign WiFi</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>By using profile files for device configuration, iPhone can be set up to automatically establish a secure VPN connection when connecting public unsafe wireless networks. This article contains an explanation and an easily customizable template.</p>
<p>&nbsp;</p>
<p>Scenario: You connect your <a href="https://amzn.to/2oaKZxY" target="_blank" rel="noopener noreferrer">iPhone</a> to the public hotspot of your choice, say in some café at the airport. Your iPhone connects and immediately starts sending account information, such as your email access data over the unknown WiFi, to retrieve the latest emails for you. Your actually secret access data will now be readable for everyone in this public WiFi and anyone who is technically able to read your passwords can now also log into your e-mail inbox. Of course, this is not a desirable state of affairs.</p>
<p>&nbsp;</p>
<p>The remedy here is the use of a so-called VPN tunnel. The secure VPN tunnel is set up from your device&nbsp;to your home (or another secure endpoint) and all custom data traffic such as mail accounts, chats, eg. only reaches the Internet from the endpoint of the tunnel. The VPN tunnel thus enables secure surfing as if you were at home.</p>
<p>If you have ever tried to protect your iPhone data traffic through a VPN, you will have noticed that after some time of the active VPN connection the iPhone simply terminates the tunnel, for example if no data has flowed for a long time. Also, it is quite annoying to have to switch off the VPN tunnel manually at home again. But there is a more serious problem: To switch on the VPN manually, you must first be connected to the WiFi. Before you could connect the VPN manually, the <a href="https://amzn.to/2oaKZxY" target="_blank" rel="noopener noreferrer">iPhone</a> would have sent data via a possibly insecure WiFi network in seconds in the background.</p>
<p>&nbsp;</p>
<p>To prevent this from happening in the future, we instruct our iPhone to establish a VPN connection in every unknown WiFi before it sends data. We realize this via so-called profiles. Profiles are basically files with (XML-)structured content that tell the iPhone how to behave under certain conditions. Usually these configuration files are used in the company environment, so that you do not have to configure thousands of mobile phones manually and manually by employees. Instead, you distribute a single profile and distribute it to the employee devices with a single click. The profile configuration sometimes allows deeper interventions in the settings of our iPhone than the settings menu allows. And that&#8217;s what we&#8217;re taking advantage of.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>Enrich the template with your VPN data</h2>
<p>The following code is a template for exactly the use case described above. In this profile a VPN of the type IPsec is used, as provided by the <a href="https://amzn.to/2P5TXYH" target="_blank" rel="noopener noreferrer">FritzBox</a>.</p>
<p>Just search for &#8220;CHANGETHIS&#8221; and replace the data in these sections with your own VPN access data.</p>
<p>You need the following data:</p>
<ul>
<li>Your hostname</li>
<li>username</li>
<li>password</li>
<li>shared secret</li>
<li>List of WiFi networks you trust and which do not require a VPN connection (your trusted network at work or at home)</li>
</ul>
<p>&nbsp;</p>
<p>Simply enter all data except for the shared secret as plain text in the XML file.<br />
Paste your Shared Secret into this generator (https://www.base64decode.org) and encode the Shared Secret to&nbsp;BASE64, then enter the converted Shared Secret in the appropriate place in the file.</p>
<p>&nbsp;</p>
<h2>Do I also have to adjust the payload data in the template?</h2>
<p>You may ask yourself if you also have to adjust the payload data contained in the template like the PayloadUUUID. I will also deal briefly with this question and explain the background a little in this section.<br />
Actually, Apple provides an application that can be used to create profiles for iOS devices. The tool is called <a href="https://itunes.apple.com/de/app/apple-configurator-2/id1037126344?mt=12" target="_blank" rel="noopener noreferrer">Apple Configurator 2</a> and enables the creation of profile files via a graphical interface. When a profile is generated with this tool, the payload data is generated automatically. It is more or less a random number, or rather a checksum, generated from various variables of the created profile.</p>
<p>This random number is very probably unique, i.e. it will hardly happen that two profiles with exactly the same PayloadUUID are installed on one device. And this should be the case, because this unique UUID allows us to adapt the profile file later and send it modified to the end device again without the profile being created twice. If a profile with the same UUID is already installed on the mobile device, it is only updated. If you send a profile with a different UUID to the iPhone, it would be installed in addition to the already existing one, i.e. you might have installed duplicate profiles.</p>
<p><strong>TLDR:</strong> No, you don&#8217;t have to adjust the payload sections of the profile.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>Save the mobileconfig file and send it to the iPhone</h2>
<p>You can save the complete file as vpn.mobileconfig. The file extension&#8221;.mobileconfig&#8221; is particularly important.<br />
After editing and saving, send this file to your iPhone via AirDrop or e-mail and install the created profile. Done.</p>
<p>&nbsp;</p>
<h2>mobileconfig file to customize:</h2>
<p>&nbsp;</p>
<pre xml:lang="xml">[code]&lt;?xml version="1.0" encoding="UTF-8"?&gt;
&lt;!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"&gt;
&lt;plist version="1.0"&gt;
&lt;dict&gt;
&lt;key&gt;PayloadContent&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;IPSec&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;AuthenticationMethod&lt;/key&gt;
&lt;string&gt;SharedSecret&lt;/string&gt;
&lt;key&gt;LocalIdentifier&lt;/key&gt;
&lt;string&gt;CHANGETHISusername&lt;/string&gt;
&lt;key&gt;LocalIdentifierType&lt;/key&gt;
&lt;string&gt;KeyID&lt;/string&gt;
&lt;key&gt;RemoteAddress&lt;/key&gt;
&lt;string&gt;CHANGETHISmy.hostname.de&lt;/string&gt;
&lt;key&gt;SharedSecret&lt;/key&gt;
&lt;data&gt;
CHANGETHISBUTBEFORECONVERTTOBASE64
&lt;/data&gt;
&lt;key&gt;XAuthEnabled&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;XAuthName&lt;/key&gt;
&lt;string&gt;CHANGETHISusername&lt;/string&gt;
&lt;key&gt;XAuthPassword&lt;/key&gt;
&lt;string&gt;CHANGETHISpassword&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;IPv4&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;OverridePrimary&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;/dict&gt;
&lt;key&gt;OverridePrimary&lt;/key&gt;
&lt;true/&gt;
&lt;key&gt;PayloadDisplayName&lt;/key&gt;
&lt;string&gt;Manual connection to home network&lt;/string&gt;
&lt;key&gt;PayloadIdentifier&lt;/key&gt;
&lt;string&gt;com.apple.vpn.managed.D58846D4-51B5-437E-9147-199C811ABA1C&lt;/string&gt;
&lt;key&gt;PayloadType&lt;/key&gt;
&lt;string&gt;com.apple.vpn.managed&lt;/string&gt;
&lt;key&gt;PayloadUUID&lt;/key&gt;
&lt;string&gt;D58846D4-51B5-437E-9147-199C811ABA1C&lt;/string&gt;
&lt;key&gt;PayloadVersion&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;UserDefinedName&lt;/key&gt;
&lt;string&gt;Manual connection to home network&lt;/string&gt;
&lt;key&gt;VPNType&lt;/key&gt;
&lt;string&gt;IPSec&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;IPSec&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;AuthenticationMethod&lt;/key&gt;
&lt;string&gt;SharedSecret&lt;/string&gt;
&lt;key&gt;LocalIdentifier&lt;/key&gt;
&lt;string&gt;CHANGETHISusername&lt;/string&gt;
&lt;key&gt;LocalIdentifierType&lt;/key&gt;
&lt;string&gt;KeyID&lt;/string&gt;
&lt;key&gt;RemoteAddress&lt;/key&gt;
&lt;string&gt;CHANGETHISmy.hostname.de&lt;/string&gt;
&lt;key&gt;SharedSecret&lt;/key&gt;
&lt;data&gt;
CHANGETHISBUTBEFORECONVERTTOBASE64
&lt;/data&gt;
&lt;key&gt;XAuthEnabled&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;XAuthName&lt;/key&gt;
&lt;string&gt;CHANGETHISusername&lt;/string&gt;
&lt;key&gt;XAuthPassword&lt;/key&gt;
&lt;string&gt;CHANGETHISpassword&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;IPv4&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;OverridePrimary&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;/dict&gt;
&lt;key&gt;OnDemandEnabled&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;OnDemandRules&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;Action&lt;/key&gt;
&lt;string&gt;Disconnect&lt;/string&gt;
&lt;key&gt;InterfaceTypeMatch&lt;/key&gt;
&lt;string&gt;WiFi&lt;/string&gt;
&lt;key&gt;SSIDMatch&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;CHANGETHISTrustedHomenetworkname(SSID)&lt;/string&gt;
&lt;string&gt;CHANGETHISTrustedWorknetworkname(SSID)&lt;/string&gt;
&lt;/array&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;Action&lt;/key&gt;
&lt;string&gt;Connect&lt;/string&gt;
&lt;key&gt;InterfaceTypeMatch&lt;/key&gt;
&lt;string&gt;WiFi&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;Action&lt;/key&gt;
&lt;string&gt;Disconnect&lt;/string&gt;
&lt;/dict&gt;
&lt;/array&gt;
&lt;key&gt;OverridePrimary&lt;/key&gt;
&lt;true/&gt;
&lt;key&gt;PayloadDisplayName&lt;/key&gt;
&lt;string&gt;Autoconnect via VPN in foreign WiFi&lt;/string&gt;
&lt;key&gt;PayloadIdentifier&lt;/key&gt;
&lt;string&gt;com.apple.vpn.managed.85284094-A9F5-47D7-A1CD-6F831B2FFAC0&lt;/string&gt;
&lt;key&gt;PayloadType&lt;/key&gt;
&lt;string&gt;com.apple.vpn.managed&lt;/string&gt;
&lt;key&gt;PayloadUUID&lt;/key&gt;
&lt;string&gt;85284094-A9F5-47D7-A1CD-6F831B2FFAC0&lt;/string&gt;
&lt;key&gt;PayloadVersion&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;UserDefinedName&lt;/key&gt;
&lt;string&gt;Autoconnect via VPN in foreign WiFi&lt;/string&gt;
&lt;key&gt;VPNType&lt;/key&gt;
&lt;string&gt;IPSec&lt;/string&gt;
&lt;/dict&gt;
&lt;/array&gt;
&lt;key&gt;PayloadDescription&lt;/key&gt;
&lt;string&gt;Allows to connect to your home-network to tunnel all traffic through unsecure, public WiFi-networks.&lt;/string&gt;
&lt;key&gt;PayloadDisplayName&lt;/key&gt;
&lt;string&gt;CHANGETHIS VPN Configurations for organization (for example company name)&lt;/string&gt;
&lt;key&gt;PayloadIdentifier&lt;/key&gt;
&lt;string&gt;DB.BAB78424-28FB-4654-915D-93D0CB87CC7B&lt;/string&gt;
&lt;key&gt;PayloadOrganization&lt;/key&gt;
&lt;string&gt;CAHNGETHIS Optional: Givenname Birthname for name of organzization (for example company name)&lt;/string&gt;
&lt;key&gt;PayloadRemovalDisallowed&lt;/key&gt;
&lt;false/&gt;
&lt;key&gt;PayloadType&lt;/key&gt;
&lt;string&gt;Configuration&lt;/string&gt;
&lt;key&gt;PayloadUUID&lt;/key&gt;
&lt;string&gt;8CADFABC-C196-4784-948E-FB5345714B22&lt;/string&gt;
&lt;key&gt;PayloadVersion&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;/dict&gt;
&lt;/plist&gt;[/code]</pre>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><span style="font-size: 8pt;">All the links in this text are Amazon Affiliate Links, and by clicking on an affiliate link I will earn a percentage of your subsequent Amazon purchases. However, this circumstance does not influence the background of my product recommendation. This product recommendation is independent, honest and sincere.&nbsp;</span></p>
<p><span style="font-size: 8pt;">Bei allen genannten Links handelt es sich um Amazon-Affiliate-Links. Durch einen Klick auf einen Affiliate-Link werde ich prozentual an Euren darauf folgenden Amazon-Einkäufen beteiligt. Dieser Umstand beeinflusst aber nicht die Hintergründe meiner Produktempfehlung. Diese Produktempfehlung erfolgt unabhängig, ehrlich und aufrichtig.</span></p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/">iPhone: Force VPN connection when connected to foreign WiFi</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
