I had it working and then i woke up the next day and the connection was down. 🤷�♂️
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: Greg_E on June 20, 2025, 03:13:20 PMQuote from: fakebizprez on June 19, 2025, 05:08:57 PMQuote from: Greg_E on June 18, 2025, 03:25:23 PMThat's seems like a lot of power for OPNsense, not sure I would use an MS-A2 for this function unless I had a lot of clients and a lot of filtering setup. Maybe if I had a lot of VPN users I would want that much CPU, but that's a powerful computer for what most of us are doing.👀
And how much power does that consume? My little Xeon (similar to an older i3) shows mostly the same CPU use, but I only have 16GB of ram. It's TDP is much lower as well.
The HP T740 showed very similar results when I was using it, and that would be at around 40 watts during use.
But again, depends on how many things you are trying to do with a firewall, if you have a lot of VPN, that extra power would certainly be justified over an n150.
Quote from: meyergru on June 19, 2025, 06:58:04 PMI think the official CN for Cloudflare DNS is "cloudflare-dns.com", not "dns.cloudflare.com", see: https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-tls/. Thus, your certificate verification could fail, although IDK if Cloudflare uses multi-domain certificates.they have so many it gets confusing but this is from the link you sent me:
Quotekdig -d @1.1.1.1 +tls-ca +tls-host=one.one.one.one example.com
[services.unbound.dns_over_tls]
use_system_nameservers = false
[[services.unbound.dns_over_tls.forwarding]]
enabled = true
domain = ""
server_ip = "1.1.1.1"
server_port = 853
forward_first = false
verify_cn = "dns.cloudflare.com"
description = "IPv4 DoT"
[[services.unbound.dns_over_tls.forwarding]]
enabled = true
domain = ""
server_ip = "1.0.0.1"
server_port = 853
forward_first = false
verify_cn = "dns.cloudflare.com"
description = "IPv4 DoT Backup"
[[services.unbound.dns_over_tls.forwarding]]
enabled = true
domain = ""
server_ip = "2606:4700:4700::1111"
server_port = 853
forward_first = false
verify_cn = "dns.cloudflare.com"
description = "IPv6 DoT"
[[services.unbound.dns_over_tls.forwarding]]
enabled = true
domain = ""
server_ip = "2606:4700:4700::1001"
server_port = 853
forward_first = false
verify_cn = "dns.cloudflare.com"
description = "IPv6 DoT Backup"
Quote from: Greg_E on June 18, 2025, 03:25:23 PMThat's seems like a lot of power for OPNsense, not sure I would use an MS-A2 for this function unless I had a lot of clients and a lot of filtering setup. Maybe if I had a lot of VPN users I would want that much CPU, but that's a powerful computer for what most of us are doing.👀
Quote from: vincente on January 12, 2025, 05:52:01 PMOPNsense installs fine and works with various USB NICs, and it even recognizes the WiFi NIC; however, it does not see the built-in NICs.
Quote from: EricPerl on June 01, 2025, 09:31:41 PMThe /60 appears to only be used to satisfy some UI validation:
https://forum.netgate.com/post/962817 (post from deet)
The workaround in these threads is to request up to 8 /64 and manually assign them to interfaces...
The original thread started 5 years ago. AT&T has not "fixed" any of this yet???
This is definitely not following deployment recommendations...
My ISP is late deploying IPv6 (imminent according to some of their feeds) but at least they are doing it by the book.