How to Properly Install a Windows 11 Virtual Machine on KVM
After you have downloaded a Win 11 ISO image just follow the wizard as far as auto detecting OS and whatever you decide to do with the disk and stuff
After going through the wizard you might not be able to boot it on the first attempt. Try add manually mount a 2nd CDROM with the same Win 11 image and it might just work.
Smart to install it without network so you get a local user easier.
You might get stuck on "let's connect to a network"
W11 install, stuck in "let's connect to a network" but there are no networks
Hit shift + F10 > then type/write OOBE\BYPASSNRO and hit enter.
It'll restart and you have to select language and country again, then you should be able to select "I don't have internet"
Downlod virtio-win.iso
wget https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/latest-virtio/virtio-win.iso
Mount it to CD-ROM
Then open virtio-win-guest-tools inside Windows 11
After this have been installed you should be able to Auto scale
On the top menu of the guest window
View -> Scale Display -> Auto resize VM with window
When using nftables you need to apply this
#!/usr/sbin/nft -f
flush ruleset
table inet filter {
chain input {
type filter hook input priority 0;
# accept any localhost traffic
iif lo accept
# accept traffic originated from us
ct state established,related accept
#
So just a guide based on explanations from Google Gemini
The following would be a set of commands and expected responses
sudo apt install openvpn easy-rsa -y
Recommended: Create and secure a new directory for your CA
make-cadir ~/openvpn-pki
cd ~/openvpn-pki
# Initialize the PKI environment
./easyrsa init-pki
Response
init-pki' complete; you may now create a CA or requests.
Your newly created PKI dir is:
* /home/atle/openvpn-pki/pki
Using Easy-RSA configuration:
* /home/atle/openvpn-pki/vars
Build the CA. You will be prompted to enter a CA Passphrase. Make this secure and write it down.
./easyrsa build-ca
Response
CA creation complete. Your new CA certificate is at:
* /home/atle/openvpn-pki/pki/ca.crt
Generate the server key and CSR. 'server' is the Common Name (CN). ./easyrsa gen-req server nopass
Private-Key and Public-Certificate-Request files created.
Your files are:
* req: /home/atle/openvpn-pki/pki/reqs/server.req
* key: /home/atle/openvpn-pki/pki/private/server.ke
Sign the server certificate using the CA. You will be prompted for the CA Passphrase.
./easyrsa sign-req server server
Response
* /home/atle/openvpn-pki/vars
Please check over the details shown below for accuracy. Note that this request
has not been cryptographically verified. Please be sure it came from a trusted
source or that you have verified the request checksum with the sender.
You are about to sign the following certificate:
Requested CN: 'small'
Requested type: 'server'
Valid for: '825' days
subject=
commonName = small
Type the word 'yes' to continue, or any other input to abort.
Confirm requested details: yes
Using configuration from /home/atle/openvpn-pki/pki/1fa12698/temp.1.1
Enter pass phrase for /home/atle/openvpn-pki/pki/private/ca.key:
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName :ASN.1 12:'small'
Certificate is to be certified until Dec 30 21:42:44 2027 GMT (825 days)
Write out database with 1 new entries
Database updated
Notice
How to leverage a Raspberry PI and a MIDI keyboard