Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - pfry

#1
Do you have some constraint that would not allow you to apply or copy (depending on your version and rule architecture) your management interface ruleset to an additional interface?
#2
Quote from: Nullman on May 11, 2026, 06:36:34 PM[...]Opnsense appliances should always be passive machines with no moving parts.[...]

Opinions are like... (There's a "one size fits all" joke in there somewhere.)

There's nothing wrong with a good passive system. It just costs money. (Note the "good".) (And, going off-topic a bit, it's particularly hard to passively cool a 100+W CPU in an 86+F (30+C) environment.)

Quote[...]I dont want to think about this. I want to setup my firewall and forget that its there.

Understandable. A tradeoff I wasn't willing to make. My firewall is not my loudest device, but even if it was, I'd still make the same choice.

Speaking of thermal testing, mprime is generally more appropriate than memtest, but I don't know of a bootable package that contains a newer version (the UBCD's is a bit old). It's easy enough to fire up a live Linux or FreeBSD image and execute it - it just takes a bit more effort than a bootable package.
#3
Quote from: BrandyWine on May 08, 2026, 10:23:02 PMHelp me understand that. Atom based mobo? Vendor-locked NVM?[...]

I could have been more clear. Atom-based integrated system.

As far as the vendor lock, some (most) of my discrete Intel (Intel branded, not OEM) NICs (specifically x710 and e810) only support Intel-branded (in firmware) optics. It's not a driver issue; it appears to be built into the NVM. There is no vendor lock for DAC cables; I haven't tried a UTP SFP+ (I only have one, which sits in a drawer because it's a burning weenie roaster). (Shouldn't be an issue for the original poster.)
#4
Quote from: BrandyWine on May 07, 2026, 08:00:26 PMIIRC, the ix in kernel tree lists specific models of hardware, much of it being Intel stuff.[...]

I wouldn't expect third-party Atom-based devices to have network interfaces with a vendor-locked NVM... but you never can tell. My one actual Intel 82599 (= x520) is not, but most (but not all) of my x710s are. So as you pointed out, a recommended device is a safe bet. Before Patrick chimes in, there's always fs.com for compatibles.
#5
Have you checked the console?
#6
Quote from: patient0 on May 04, 2026, 07:08:35 AM[...]If you access the GUI by HTTP you will be redirected to HTTPS automatically.[...]

On the same or a different port? With the redirect option "Disabilita la regola di reindirizzamento..." checked and port 443 specified I would expect port 80 to be unavailable. On my own system, "netstat -a" shows no HTTP port listening. HTTP to my HTTPS port gets no response. (I can't conveniently test port 80 because it's blocked by pf, but with no agent listening, I would expect a closed port response, as I have that enabled.)
#7
Quote from: VRBitman on May 01, 2026, 05:13:27 PM[...]My CPU is an i9[...]

If you don't mind saying, what hardware precisely (I believe the first "i9" was a Kaby Lake and the last a Raptor Lake)? Also, NIC and RAM.
#8
Quote from: VRBitman on May 01, 2026, 05:13:27 PM[...]
I live alone and I generally use only one device to surf the Internet.

At 25Gb/s? That's some surfing.
#9
Something the Fortinets had that was rather nice was "session-helper" (ALG or protocol parsing) control - you could enable specific ALGs by protocol and port. (Interestingly, I don't see SCTP in my old config template.) Killing the SCTP ALG might be of limited use, though.
#10
Quote from: Patrick M. Hausen on April 29, 2026, 06:28:23 PMIn which way? The devices connecting through the firewall to the other default gateway don't notice the FW.[...]

Just being pedantic. I suppose if well-filtered and on a switched network, it's effectively transparent. ARP requests don't count as discovery, and replies can be filtered if so desired.
#11
...which makes it a bit less transparent. Of course, the utility of transparency in a bridging firewall is questionable, particularly in a private address scheme.
#12
That's a very odd pair of rules. They may be outside of my experience, as I don't use any static NAT. As is, they do not appear to match the marked flows in your logs (source and destination ports and destination address do not match). For more info (e.g. "reason"), hit the "i" to the right of the log entries.
#13
The only things I can think of would be stratum (too high) or auth... but those aren't enumerated as a status. "Not Considered" does not appear in the NTP source. I assume it's a text representation of an ntpq peer status. So... what symbol ("Select Field" code from the URL) appears on the left edge of "ntpq -p"?
#14
Hardware and Performance / Re: I2C Interface
April 20, 2026, 04:36:16 PM
Largely a guess, but I figure you'd need something like ig4 (depending on your hardware), either instead of or in addition to the base driver(s) (I don't know what all is required). Interestingly, this is loaded (not explicitly by me) on one of my AMD systems (but no igbus).

Something like superio might also allow monitoring and control, but I don't know of an appropriate utility package.

ACPI may be an option as well... I have a Gigabyte board that exposes some temperature sensors, but no apparent fan monitoring or control (it has no fans).
#15
General Discussion / Re: second LAN port
April 19, 2026, 02:50:03 PM
To correct myself, the new rules allow ruleset sharing.