Yes, they were setup correctly by dhcp
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: emwe on November 03, 2018, 05:19:00 AM
For the gateway part of the discussion - you should not need to set any gateway in your opnsense. According to your picture the WAN side is configured via DHCP from the ISP/Cable modem it will get the default gateway from there. The LAN side does not need any gateway set as long as you have no other router in the LAN.
Just for my understanding:
You stated you can ping by name and ip internal AND external instances from your internal machines. So DNS and routing cannot be the problem. You also mentioned curl from CLI from the opnsense server works.
In your last reply you wrote something about wpad. Does this mean you have set up a web proxy? If I assume right please provide details for your proxy configuration.
As ping is icmp it is bypassing the proxy so it will work even when something is wrong with the proxy. Curl from the opnsense cli works it is probably not using the proxy.
Quote from: hutiucip on October 29, 2018, 09:57:44 AM
Hi!
Try setting the "Enable Forwarding Mode" to Yes (Checked) in Unbound DNS (Services: Unbound DNS: General).
If not enough, disable Harden DNSSEC data (Services: Unbound DNS: Advanced).
If still not enough, disable DNSSEC completely (Services: Unbound DNS: General).
Logic behind setting Forwarding Mode to ON: during the wizard, you get asked which DNS servers you want to use, so you set something there, maybe your provider's DNS, or Google's, or OpenDNS's etc.
By default, Unbound is set without Forwarding Mode (Disabled), and so it should directly resolve using root DNS servers. For unknown reasons, this doesn't work, so enabling Forwarding Mode would force Unbound to resolve using your previously set public DNS.
Logic behind Hardened DNSSEC settings: Depending on your chosen DNS forwarding servers, many of these DNS forwarding services don't cope well with DNSSEC, so try disabling Hardened DNSSEC at first, and then, if needed, DNSSEC completely.
Hope it helps.
Cheers!
Quote from: Fatmouse69 on October 27, 2018, 10:33:59 AM
Although this states that a GW needs to be created it also states that this configuration point needs to be set to auto-detect in your case (single WAN interface). As I mentioned, I only got it working without an explicit Gateway configured though.
Hopefully you will finally get it up and running ;)
Quote from: emwe on October 25, 2018, 04:12:43 AM
you can also do a very basic check at the opnsense firewall itself. Ssh into it, go to the shell and entercurl https://google.com
. When you get that response:<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
the Wan side of your firewall is working. The next step then should be to eliminate all other hardware between the firewall and your test device as already suggested.
<TITLE>301 Moved</TITLE></HEAD><BODY>
<H1>301 Moved</H1>
The document has moved
<A HREF="https://www.google.com/">here</A>.
</BODY></HTML>
Quote from: bringha on October 25, 2018, 08:01:23 AMQuoteJust to be clear: The WAN Port of your opnsense gets an address out of one of these networks?
WAN DHCP gets various addresses e.g., 24.x.x.x, 69.x.x.x 75.x.x.x so can't give you a specific one
Br br
Quote from: bringha on October 25, 2018, 08:01:23 AMQuoteJust to be clear: The WAN Port of your opnsense gets an address out of one of these networks?
WAN DHCP gets various addresses e.g., 24.x.x.x, 69.x.x.x 75.x.x.x so can't give you a specific one
Br br
Quote from: bringha on October 24, 2018, 07:47:14 PM
... and before: What is the network address in the WAN DHCP network ....
Br br
Quote from: bringha on October 23, 2018, 06:30:21 PM
I think we need start one step back ....
Can you provide a drawing of your network config, what is connected to what and IP network addresses you have used on your interfaces, modem, client, ....
Br br
Quote from: Evil_Sense on October 22, 2018, 04:25:57 PM
Since it's a statefull firewall the default configuration allows to access anything from LAN (like browsing etc.).
Think of it like a normal Consumer NAT router.
To be able to access a web or mail server from outside (WAN) that resides behind the Firewall, you would need the respective ports to be forwarded (NAT forwarding).
Quote from: bringha on October 20, 2018, 08:33:42 PM
https://forum.opnsense.org/index.php?topic=4436.0
Its in German, hope you can read it ....
BR br
Quote from: Fatmouse69 on October 21, 2018, 08:07:35 PM
As I mentioned check you logs. Any denied traffic should be listed there (requires logging of your firewall rules -> enable this option for each rule if any doubt which one to take).
Second, list your rules here for further help.
Third, you do not have any further services running (e.g. Proxy)?