Quote from: pfry on August 07, 2025, 06:52:21 PMI have to ask, you understand: Did you apply the changes? If so, you got me.
hehe, fair question, but yes.. i did save and apply.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: pfry on August 07, 2025, 06:52:21 PMI have to ask, you understand: Did you apply the changes? If so, you got me.
Quote from: pfry on August 06, 2025, 03:00:30 PMI don't know if you're missing it, but it would be "Statistics" under the alias config. Stats gathering from pf is a bit wonky, so there will be limitations. (I haven't examined them fully, but block rules don't appear to count, for instance.)
Name
Version Size Tier Repository Comment
os-wireguard (missing) N/A N/A N/A N/A N/A
***GOT REQUEST TO INSTALL***
Currently running OPNsense 24.7.2 at Tue Aug 27 21:19:10 CEST 2024
Updating OPNsense repository catalogue...
OPNsense repository is up to date.
All repositories are up to date.
pkg: No packages available to install matching 'os-wireguard' have been found in the repositories
Checking integrity... done (0 conflicting)
Nothing to do.
***DONE***
Quote from: nerd on March 25, 2024, 07:10:57 PM
Sorry if IU am being a bit dense here somewhere, but I'd love to actually understand this now.
Quote from: Patrick M. Hausen on March 25, 2024, 06:16:10 PM
Nope. The "allow all out" rule is for traffic that did never come in anywhere. Like outbound DNS requests or NTP requests originating on the firewall itself. Download of updates. ICMP echo requests from gateway monitoring. These.
Hence the description: "let out anything from firewall host itself"
Quote from: jp0469 on March 25, 2024, 05:34:02 PM
What exactly is concerning you about those rules? I believe it's required for NAT functionality. Also, did you happen to notice the rule direction?
Protocol Source Port Destination Port Gateway # Schedule Description
IPv4+6* * * * * * * * let out anything from firewall host itself