Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - abraxxa

#1
I've switched from the native netmap driver to the emulated one which fixed the problem.
#2
I have the same problem on 22.7.11_1.
#3
21.7 Legacy Series / Re: PPPoE & forwarding rules
August 21, 2021, 01:41:57 AM
Do you have the NAT port forwarding configured as well as the rules on the PPPoE interface?
#4
Quote from: allebone on July 28, 2021, 11:08:36 PM
Quote from: abraxxa on July 28, 2021, 10:04:52 PM
Mine showed an update to 21.1.9_1, not 21.1.8_2. Is the upgrade fix included in that version as well?

Try my steps on the bottom of page 2. This procedure worked fine for me when it wanted to update to an older version from the gui.

Thanks, but as I'm running Sensei I'll wait until they announce that a 21.7 compatible version is available or the current one already is.
#5
Mine showed an update to 21.1.9_1, not 21.1.8_2. Is the upgrade fix included in that version as well?
#6
Upgraded my Gigabyte GA-J3455N-D3H based firewall successfully, took about 80 seconds until it was pingable again.
#7
20.7 Legacy Series / Re: 20.7.4 - Port Forwarding issues
November 13, 2020, 09:40:10 PM
Don't guess, troubleshoot!
Install tcpdump, tshark or Wireshark depending on the OS on the destination host and capture to find out what's coming in.
The same on the opnsense firewall, just connect using ssh (Windows 10 >= 1809 has an openssh client that can be installed as free additional feature) and use tcpdump -i $interfacename host $targetip -vvnn for example.
#8
Thanks for your replies!

Using a custom fqdn for just the single administration IPv4/6 address is a workaround I already thought of but hoped to avoid.

@schnipp: thanks for the alternate hostname config option pointer!

@Mks: the help text says that the unbound custom options will be removed in a future version so that' s nothing I want to use if possible.
#9
Same issue as this user had with 20.1 still exists in 20.7: https://forum.opnsense.org/index.php?topic=17190.msg78161

Interestingly the IPv6 address of each interface is returned but only the IPv4 interface of one  ???

Is there a config option to control the automatic DNS entry generation for the firewall itself?
#10
I don't have this issue.
Which Sensei version are you running? 1.6.1 here.
#11
Just migrated my printer to its own vlan and started to use this package successfully to forward MDNS for Bonjour/AirPrint discovery.  :)

There seems to be only IPv4 support, do you plan adding IPv6 support?
#12
OPNSense 20.7 based on HardenedBSD 12 finally solves the issue with the RTC.
#13
I don't know the FreeBSD specifics of the reply-to feature but the OPNSense docs description reads like if it remembers the layer 2 address a packet is received from and sends the reply to the same layer 2 address regardless of the layer 3 routing table.
Can someone from the OPNSense team comment on this which more knowledge?
#14
Just the tcpdump you already did before but write it to a file using -w filename.pcap and then copy it to your PC and load it in Wireshark.
Alternatively you can use the -e flag.
#15
Compare the destination mac address of IPv6 packets from your network to the Internet with syn-ack response packets when accessing a service on the firewall.