thanks for the hints @malhal . I'll revisit the thread when ready to have another go. Had to abandon it for the time being.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: coffeecup25 on December 15, 2025, 04:15:29 PMA 'Firewall' is more a marketing term than anything else. A firewall, by my definition, is a router with extra layers of software that does this and that to protect the network. 'This and that' being technical terms. 99.5% of everyone or more only needs one router active at any given time at a location.Firewall is not just marketing. It is a different type of functionality to a router and not router+extra software. They perform different purposes. For instance you can have a firewall doing no routing, only firewall duties. Yes most of the time a firewall will be ABLE to perform routing duties since the funcitonality is often included but is not just marketing.
Quote from: coffeecup25 on December 15, 2025, 04:15:29 PMIn the network world you have routers and switches. Only. Retail routers are a combo router and switch, often with a wifi component. The Chinese router / pc with 4 or 6 ports becomes a router with a WAN and LAN port when you load OPNsense. The remaining ports are just sitting there until configured to do something. I've read that the extra ports are best for subnetting and not as VLANs because these boxes make poor switches compared to dedicated switches. The ports may look the same but they are not the same. Each subnet is a separate network and needs to go to its own dedicated switch and / or wireless access point.Regarding the extra ports. Why would be best for subnetting? Subnetting is about altering the network mask to partition the network in a way different to the default mask like making a class C /24 into a /25 one. Then "not as VLANs.." a VLAN is about using tags in frames to carry that traffic over a link. I can't see the relation you are making to unused ports on the appliance.
QuoteEach subnet is a separate network and needs to go to its own dedicated switch and / or wireless access point.yes a subnet is a separate network but it doesn't need a separate switch. That's where the managed switch comes into play, because it is what will tag/untag traffic. Unless you are in your description calling a network a subnet. Network =! subnet. Exception would be default-independent ports converted to switched ports.
Quote from: coffeecup25 on December 15, 2025, 04:15:29 PMRouters carry traffic between networks. Switches carry traffic on a network and they are designed for heavy traffic. Most of what happens on a network is confined to the switch and only goes to the router if it needs to jump to another network or possibly to renew a lease.Not only to renew a lease. Pretty much all other networking services need to be managed somewhere, typically the router: DHCP yes, but NATing, DNS, etc.
Quote from: coffeecup25 on December 15, 2025, 04:15:29 PMVLANs segment a broadcast domain on a smart / managed switch so one subnet can create privacy zones. Normally, everything on the switch can access everything in the same broadcast domain. VLANs break it up. The managed / smart switch manages the VLAN entirely. It has always been this way. The VLAN capability in OPNsense, pfSense, and whatever is clever but more confusing than helpful as the extra ports are said to make bad switches as they are not designed for traffic that heavy. Unlike a retail router that is a deliberate mix of router and switch. You do not need to create a VLAN on the router to use a VLAN on a smart switch. Even a used retail router with wifi from a thrift shop can work with the VLAN on the smart switch properly as soon as you plug it in and configure it as a router.Again VLAN != subnet. Privacy is a benefit but not really the main purpose of either.
QuoteThe managed / smart switch manages the VLAN entirelyI'd say not entirely. Something has to route between VLANs. That is normally the router's job hence the trunk goes to OPN. Unless of course another device or even the said managed switch can (not all do).
QuoteEven a used retail router with wifi from a thrift shop can work with the VLAN on the smart switch properly as soon as you plug it in and configure it as a routerReally? This router needs to be VLAN-aware. Rarely basic like the ISP-provided routers/wifi devices are VLAN-aware.
"2025-12-06T12:42:00 Error firewall alias resolve error IP_PublicDNS (error fetching alias url https://raw.githubusercontent.com/jpgpi250/piholemanual/master/DOHipv4.txt)"So I had missed that alias failing to update and I can see why.Quoteyes I'm keeping the list in remote server. Firewall Aliases has a rules ( URL IP's tabele) who is checking every 60 sec for update the remote black list. from this rule i got Floating who does actual restriction to the network.It is impossible to tell why "this does not work anymore", your mechanism to fetch the list I imagine is the Alias automation on OPN. But the content might not be "correct".
Before the update if I want restrict an IP, just have to add it to the remote server black list. And Firewall Aliases fetching this list automatic and blocking the new ip's.
Now this doesn't work anymore , to do so i need to go to Firewall: Diagnostics: States: find were is the new ip or IP's and manual drop it. And then the actual block comes in force.