Quote from: gspannu on May 21, 2025, 07:35:09 PMAnyone who uses OPNsense belongs here... let no one make you think otherwise !Thank you, brother.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: gspannu on May 21, 2025, 07:35:09 PMAnyone who uses OPNsense belongs here... let no one make you think otherwise !Thank you, brother.
Quote from: meyergru on May 21, 2025, 12:44:57 PMOpnSense does not "recognize" those in that they do anything special with them, Deciso just follows the standards in their recommendations.Thank you, this is very clear to me now.
The DNS software underlying OpnSense will do so as well. So, if you follow these recommendations, it will most probably work.
The .arpa TLD explicitely has in-addr.arpa defined for the purpose of reverse lookups (just google it). Thus, this is a standard. However, which sub-domain you delegate is mainly dependend on what RFC1918 subnets you use. You can also delegate to 168.192.in-addr.arpa if you use multiple /24 subnets or 2.168.192.in-addr.arpa if you use only 192.168.2.0/24.
QuoteThe ".internal" TLD is an DNS TLD that has been recommended by IANA, but is not yet approved, so you can use it for your own VLAN subdomains. Formerly, .home.arpa was often used for such purposes.Ok, I find myself confused about this, again.
Quote from: meyergru on May 20, 2025, 02:13:13 PMBy doing it like so:Here's a stupid question (from a not-so-smart-person).
This includes the reverse domains, say "168.192.in-addr.arpa".
Quote from: Drinyth on May 17, 2025, 09:30:14 PMQuote from: Ground_0 on May 17, 2025, 02:28:20 PMFollowing the DHCPv4 with DNS registration example in the documentation, I have migrated from ISC IPv4 to DNSmasq on a test system.
I have unbound on port 53 pointing to DNSmasq on 53053 for local name resolution, as instructed.
It does work, however, resolving and pinging hosts by hostname lags for a long time.
The ping time from one host to another is in the .250 ms range, but it sits there for about 10 seconds thinking about it before spitting out the results.
Opening a browser and navigating to cockpit using machine-hostname.localdomain:9090 is equally as laggy.
Anyone else experiencing this sort of behavior?
For now, ISC with Unbound is working perfectly for me on the main router, so I suppose I will keep it that way for a while.
However, if Unbound pointing to DNSmasq for local domain name resolution is the future, I hope to figure it out.
Do you have any servers defined in "System -> Settings -> General -> DNS servers" ? I noticed that I had a similar issue if I didn't have server explicitly defined there.
For me, this ended up being resolved by applying the patch at:
https://github.com/opnsense/core/issues/8614#issuecomment-2866675332
After applying the patch, I did not need explicit DNS servers defined and I no longer had any timeouts doing lookups through dnsmasq.
Quote from: TeeJayD on May 17, 2025, 05:51:17 PMQuote from: Ground_0 on May 17, 2025, 02:28:20 PMFollowing the DHCPv4 with DNS registration example in the documentation, I have migrated from ISC IPv4 to DNSmasq on a test system.Unbound is not going anywhere as far as i know, so why not migrate to Kea for DHCP ?
I have unbound on port 53 pointing to DNSmasq on 53053 for local name resolution, as instructed.
It does work, however, resolving and pinging hosts by hostname lags for a long time.
The ping time from one host to another is in the .250 ms range, but it sits there for about 10 seconds thinking about it before spitting out the results.
Opening a browser and navigating to cockpit using machine-hostname.localdomain:9090 is equally as laggy.
Anyone else experiencing this sort of behavior?
For now, ISC with Unbound is working perfectly for me on the main router, so I suppose I will keep it that way for a while.
However, if Unbound pointing to DNSmasq for local domain name resolution is the future, I hope to figure it out.
Quote from: poningru on April 18, 2025, 08:28:09 AMFigured out the bios password:Kilimanjaro1
as per this reference page from STH
Changes I made:
* Disabled the watchdog
* Disabled the virtualization options (intel virtd, VT-d)
* Enabled EIST
* Changed console to 115200
Quote from: WarpConduit on April 12, 2025, 01:40:11 AMThank you Ground_0, I purchased two new units off eBay and am working to set them up now for purposes of Internet firewall, routing and site-to-site WireGuard VPN between two locations. I have installed OPNsense onto an ORICO 128GB NVMe M.2 drive from Amazon. So far so good.
Regarding the port identification:
OPNsense Device → Label on Unit
igb0 → mgmt0
igb1 → mgmt1
ix0 → lan0
ix1 → wan0
ix2 → lan1
ix3 → wan1
Edit: I now see you listed the port mapping in your initial post, I just glazed over them. Thanks again!
Quote from: poningru on March 21, 2025, 07:05:14 PMThanks so much! It looks like that M.2 is indeed an pcie 3.0 x4 (currently populated by a samsung ssd?)Indeed, yes. It's a spare SSD I swapped into it.
Quote from: poningru on March 21, 2025, 07:18:53 AMThis looks amazing! Thank you so much!You are absolutely correct! Updated. Thanks.
Are you sure this is a B+M M.2 slot? it looks like an M key slot.
QuoteCan you do me another favor and runDone!pciconf -lcv
to see how many pcie lanes that M.2 slot has?
Quote from: poningru on March 19, 2025, 11:23:22 PMCan I request a picture of the board? This device looks very interesting!
Any idea if how many lanes the M.2 PCIe has? Would love to throw some sfp ports on it.
Thanks
Quote from: patient0 on March 18, 2025, 03:53:03 PMOn it.Quote from: Ground_0 on March 18, 2025, 01:54:06 PMCPU with AES-NI Crypto Capability, (2) USB3 ports, (1) Console port (6) Intel Ethernet Ports; lan0, wan0, lan1, wan1 use the ix Intel 10Gb Ethernet driver.Excellent, I hope a lot of people see it and get one them, hopefully cheap :)
You could mention the order and the naming of the network ports, in relation to how they are labeled at the front. So that when installing one knows which igb?? or ix?? is referring to which port at the front.
And regarding the CPU crypto, you must mention that the CPU supports QAT :) ... QAT will help accelerate IPsec and OpenVPN when using DCO.
root@EventHorizon:~ # uptime
9:53AM up 1 day, 1 min, 1 user, load averages: 0.35, 0.36, 0.31