Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - dudeman2009

#1
I'm just going to go start to finish, to bear with me if I am just going on about things you already know or have setup. I see a lot of confusion on various subreddits about VLANs and their setup.

The interface assignments look fine, rules are applied on the interface they sit as they enter the interface, inbound. So a device on your LAN will be filtered by rules on the LAN interface. For your VLANs you allow or block traffic from the net and into the firewall interface on their respective tabs. To allow the server VLAN access to the internet but not say seccam, you would put allow/block rules on the server VLAN only. No need to put rules anywhere else for the server VLAN, the only exception being floating rules but they aren't needed for a basic setup.

As for the VLANs, I assume you are using a switch, not just a bunch of interfaces on the firewall. You need to setup vlans on the switch. The attached picture for example is my main switch, I have VLANs setup for those I am actually using currently. I am in the process of reconfiguring my network and in order to add another vlan on the firewall I must login to the switch and add it here. Otherwise the switch will not tag anything and you will only see untagged traffic entering the firewall and it will also allow traffic between untagged ports on the switch, or trunk ports where untagged traffic is allowed. Some switches also have the ability to route VLANs internally, you'll not want to enable this. It should be disabled by default, but it will completely bypass the firewall if enabled.

I think you mentioned this already being setup, which prevents interVLAN routing on the switch itself, it must traverse the firewall. It doesn't have to exit and enter the WAN, just enter the VLAN interface and travel to the next. As far as default VLAN for LAN. I don't use VLAN1 for anything, but I have never seen outside a testing lab where VLAN hopping has happened.
#2
I had a similar issue with Metronet after they switched me to CGNAT. Their DHCP relay does not accept unicast renewal requests, it will only accept broadcast requests. What was happening to me was every 24 hours or so my WAN IP was up for renewal, so the gateway would send requests at specified intervals that were ignored by the DHCP relay. So sometimes a broadcast request was made before the lease was up and things would be good, more often than not the lease expired before the broadcast request was sent. The solution is twofold, change the timing for requests, and change how opnsense makes those requests.

On the WAN interface select the advanced client configuration for DHCP, on Presets choose "freebsd default". This may not be necessary depending on how old your install is. In my case the config is over 10 years old and the timings were not the current default. Second, under option modifiers add the following supersede dhcp-server-identifier 255.255.255.255 This will force the DHCP renewal to be sent as a broadcast, which should be picked up by their servers. Why metronet cannot respond to a unicast request like every other ISP out there, I have no idea.