Quote from: franco on March 23, 2026, 02:01:05 PMCan you add a plugin ticket on GitHub?
Will do, thank you for the link. I'll wait for it to do it again, and see about getting a log. It was doing it regularly. Perhaps it's fixed (fingers crossed)
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: franco on March 23, 2026, 02:01:05 PMCan you add a plugin ticket on GitHub?
Quote from: dseven on November 11, 2024, 02:29:07 PM
Speaking of lightbulbs ;D - https://docs.opnsense.org/manual/hacarp.html
QuoteTwo or more firewalls can be configured as a failover group.
Quote from: meyergru on November 11, 2024, 10:21:02 AM
Yes. See documentation. If you are on fiber, you could even use two redundant ONTs on the same fiber.
Quote from: dseven on November 11, 2024, 10:59:25 AM
I think it might be important to remind what the in/out direction for rules means - i.e. the direction of the traffic with respect to the firewall at the point where it's being inspected (on the given interface). An attempted connection from IOT_VLAN to KID_VLAN will arrive at the firewall (*inbound*) on the IOT_VLAN interface. If there was a rule that allows it (an *inbound* rule on the IOT_VLAN interface), it would pass through the firewall and then be sent *outbound* (from the firwall) on the KID_VLAN interface. In this case, it would have been blocked before it got that far, so there's really no point in having another rule to block it outbound.
Rules to allow/block are usually done on the inbound interface because it's more efficient to make those decisions as early as possible, rather than waste time processing the traffic only to decide to block it later.
Outbound rules are generally used to apply some policy to traffic originating from the firewall itself.