Thanks for replying.
We're not using VLANs and everything is on the v4 same subnet, and v6 prefix, so any firewall rule that blocked only the printer would have to contain address-specific parameters, right? There's nothing like that.
Further tests:
I can't take Dnsmasq down for any extended period until I have a decent maintenance window, but everything I've seen points to it, so far.
Doesn't 'floating' allow DNS requests from the WAN side? I don't want that, it would obviate the point of having overrides for private addresses on our domain. I already have a similar rule to immediately allow all DNS on the LAN interface, as recommended by the WAN failover guide, because we have a 5G backup connection.
Can you see anything in the packet captures? They're very small.
We're not using VLANs and everything is on the v4 same subnet, and v6 prefix, so any firewall rule that blocked only the printer would have to contain address-specific parameters, right? There's nothing like that.
Further tests:
- I gave my own PC static IPs by cloning the printer's reservation in Dnsmasq's Hosts page, one off of the printer's IPs, outside the normal DHCP offer ranges, and my PC still got replies from the OPNsense device.
- Set the resolver address on the printer and PC to a separate server, on the LAN, running BIND9. Both received usable DNS responses.
I can't take Dnsmasq down for any extended period until I have a decent maintenance window, but everything I've seen points to it, so far.
Quote from: meyergru on January 14, 2026, 10:56:30 AMI always create an "allow DNS on this firewall" as a floating rule.
Doesn't 'floating' allow DNS requests from the WAN side? I don't want that, it would obviate the point of having overrides for private addresses on our domain. I already have a similar rule to immediately allow all DNS on the LAN interface, as recommended by the WAN failover guide, because we have a 5G backup connection.
Can you see anything in the packet captures? They're very small.
"