Quote from: Patrick M. Hausen on March 31, 2026, 09:32:18 AMWeren't you offered that option?Maybe I overlooked something .
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: Patrick M. Hausen on March 31, 2026, 09:32:18 AMWeren't you offered that option?Maybe I overlooked something .
curl -k -s -v -u $key:$secret $URL/dhcpv4/leases/searchLease -H 'content-type: application/json;charset=UTF-8'
--data-raw '{"current":1,"rowCount":-1,"sort":{"starts":"desc"},"searchPhrase":"","inactive":true,"selected_interfaces":[]}'
export key=txxxxxxF
export secret=ddkkkkkkkkkkkkkkkkkkkkkkkkkk
##
export URL=https://opnsense.fm174.intern/api
echo "dhcp"
curl -k -s -u $key:$secret $URL/dhcpv4/leases/searchLease | \
jq '.rows |.[] |= del (.starts, .ends, .status, .cltt) |[.[] | to_entries | sort_by (.key) | from_entries] | sort_by(.mac)' \
> ${OUTDIR}/opnsense/dhcp/v4_leases.json
# erst einmal die exports wie im shell-script ...
# dann
curl -k -vv -u $key:$secret $URL/core/firmware/status
* Trying [2a00:6020:4023:8c80:6662:66ff:fe22:6ed0]:443...
* Connected to opnsense.fm174.intern (2a00:6020:4023:8c80:6662:66ff:fe22:6ed0) port 443 (#0)
* ALPN: offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256
* ALPN: server accepted h2
* Server certificate:
* subject: C=DE; ST=NRW; L=Erftstadt; O=Klamann IT-Beratung; CN=*.fm174.intern
* start date: Nov 29 14:19:15 2024 GMT
* expire date: Dec 31 14:19:15 2025 GMT
* issuer: C=DE; ST=NRW; L=Erftstadt; O=Klamann IT-Beratung; CN=Klamann-Root-CA 202411
* SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
* using HTTP/2
* Server auth using Basic with user 'txxxxxx'
* h2h3 [:method: GET]
* h2h3 [:path: /api/core/firmware/status]
* h2h3 [:scheme: https]
* h2h3 [:authority: opnsense.fm174.intern]
* h2h3 [authorization: Basic xxxxxxxx
* h2h3 [user-agent: curl/7.88.1]
* h2h3 [accept: */*]
* Using Stream ID: 1 (easy handle 0x564b18e83780)
> GET /api/core/firmware/status HTTP/2
> Host: opnsense.fm174.intern
> authorization: Basic xxxxxxxx
> user-agent: curl/7.88.1
> accept: */*
>
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
< HTTP/2 200
< server: Caddy
< content-length: 0
< date: Thu, 15 May 2025 07:22:59 GMT
<
* Connection #0 to host opnsense.fm174.intern left intact
Quote from: Monviech (Cedrik) on November 28, 2024, 02:53:14 PM
Just use the docs:
https://docs.opnsense.org/troubleshooting/webgui.html
Quote from: dseven on November 28, 2024, 01:00:35 PM
Login with ssh or on the console and select option 13 (Restore a backup)?
configctl webgui restart renew
/tmp/rules.debug zu parsen.
./opnsense_sideload.sh <packagename>