On 2020-02-04 16:00, M E wrote:
> *APL external email warning: *Verify sender
>
qubes-users+bncBDZMB4GY...@googlegroups.com before
> clicking links or attachments
> <mailto:
annee...@gmail.com>>:
> <mailto:
q5wrm...@snkmail.com>>:
>> <
q5wrm...@snkmail.com <mailto:
q5wrm...@snkmail.com>>:
>> <
http://www.draisberghof.de>”:
> <mailto:
qubes-users...@googlegroups.com>.
> <
https://groups.google.com/d/msgid/qubes-users/17122-1580772359-818194%40sneakemail.com?utm_medium=email&utm_source=footer>.
The only relevant information on that wiki is below the "Better
solution: create a USB qube" heading, which is not much. Yes, you do
need a USB Qube, but one that is properly created as a NetVM or you will
not get any networking out of it.
What you want to do is to find a USB controller in your system that is
not currently being used, and assign that pci device to an AppVM that
you created and labeled as a "NetVM". Then, when you insert your USB
device into that PCI/USB controller that you attached to that AppVM you
should then see the disk device suddenly show up in that VM. The USB nic
will be attached also, but until the drivers are working you may not see
it show up anywhere. That part you will have to experiment with.
How to test this controller?
Insert the USB device and Dom0 will show that the USB drive device is
showing up in the new NetVM properly.
dom0]$ qvm-usb
BACKEND:DEVID
my-net-vm:<##-#> <name of USB device>
Note that the "my-net-vm" above is the name of your new NetVM, not dom0,
not sys-net, not sys-firewall, or anything else. It must be the VM you
created and labeled as a NetVM or that device will not be providing any
networking to any other vm on your system.
You should also be able to see your USB disk device from within that
NetVM itself.
my-net-vm]$ lspci
00:00.N my-device-info
...
my-net-vm]$ lsusb
Bus 00n ... my-device-info
...
If you don't see a new pci/usb device then go back and figure out why.
After achieving that much, you can then try and to configure and test
the pci/usb network device to provide a proper network connection, and
then once you can ping something on the external network from within
that VM, you can configure one or more AppVM's to use that NetVM as a
network provider instead of sys-firewall. Or have sys-firewall instead
point to that NetVM, instead of sys-net. Perhaps that is a better choice
if that is your only network provider on the machine. You will have to
decide what configuration works best for you.
You may also need to test that the system proxies such as NTP time and
software updates just to be sure all that is working.
https://www.qubes-os.org/doc/pci-devices/
https://theinvisiblethings.blogspot.com/2011/09/playing-with-qubes-networking-for-fun.html
> --
> You received this message because you are subscribed to the Google
> Groups "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to
qubes-users...@googlegroups.com
> <mailto:
qubes-users...@googlegroups.com>.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/qubes-users/CABRRaUHpbZcXxzFZZxx3EAWmKDiKLdgCCBcqMxKpNUWN2JY3%2BA%40mail.gmail.com
> <
https://groups.google.com/d/msgid/qubes-users/CABRRaUHpbZcXxzFZZxx3EAWmKDiKLdgCCBcqMxKpNUWN2JY3%2BA%40mail.gmail.com?utm_medium=email&utm_source=footer>.