This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: Monviech (Cedrik) on October 04, 2025, 02:19:11 PMThe way it works right now is intentional, since it guides the user implicitly that domains that are entered must be resolvable by dnsmasq. This is because most users also run unbound.
QuoteAllowing a wildcard (#) to flush all resolved domains into an alias seems like its unecessary. The use case is clearly stated in the documentation, for allowlists regarding things like *.example.com or the like. It is just an extension of the other Alias types that exist for hostnames, not a solution for full alias management.
QuoteIf you want full control, you can import a custom dnsmasq configuration file.
Services > Dnsmasq DNS & DHCP > Domains
server=/*/127.0.0.1#5335
rebind-domain-ok=/*/
server=/example.org/127.0.0.1#5335
ipset=/example.org/dns_resolved_ips
rebind-domain-ok=/example.org/
server=/example.org/1.1.1.1
ipset=/example.org/dns_resolved_ips
rebind-domain-ok=/example.org/
server=/example.org/1.1.1.1
ipset=/example.org/my_orga_unit
rebind-domain-ok=/example.org/
# no copy-and-paste mistake by me, this gets auto-generated
server=/example.org/1.1.1.1
server=/example.org/1.1.1.1
ipset=/example.org/dns_resolved_ips
ipset=/example.org/my_orga_unit
(Does that actually send DNS requests *twice* due to double entries, as dnsmasq will do concurrent queries to all servers, if "Query DNS servers sequentially" is not checked?)server=/example.org/1.1.1.1
ipset=/example.org/dns_resolved_ips,my_orga_unit
QuoteTop level wildcard entries are not allowed for Ipset.
Quote from: meyergru on September 26, 2025, 08:42:05 AMYou could only block outbound connections with that, which is usually not what you want.Yeah, I see. But sometimes there is still need for blocking of OUT traffic on WAN. An example is a VPN "killswitch" via NO_WAN_EGRESS tag or similar, which prevents data leaks as last barrier. If I am not mistaken, the guide even is in this forum. Two remaining questions:
Quote from: Monviech (Cedrik) on September 25, 2025, 01:27:03 PMhttps://opnsense.org/roadmap/
Quote from: Patrick M. Hausen on September 25, 2025, 01:29:37 PMNAT is always processed before filtering.Thanks for your answer. I should write that on a paper - netfilter/iptables/nftables first does dnat, then filtering/routing, then snat. So coming from that tool, this order is slightly confusing.
Quote from: Patrick M. Hausen on September 25, 2025, 01:29:37 PMSo e.g. if you use global blocklists like FIREHOL and friends, but still want easy inbound NAT, best place those blocklists in the floating category and not on the interface.Yeah, it definitely makes sense to add global rules to Floating. But you also could define an interface group - or firewall group, as called in the GUI - for global rules and probably have more flexibility, as you can define multiple of those.
Quote from: meyergru on September 25, 2025, 12:46:29 PMYou are aware of the implications of doing that w/r to firewall rule priorities, especially when you use NAT?To my knowledge System > Floating > Interface group > Interface rules.
Quote from: Monviech (Cedrik) on September 25, 2025, 12:54:04 PMin the new Firewall - Automation - Filter all of this works already as Floating is determined differently.Oh, thanks. Honestly I totally missed this new feature.
Services > ISC DHCPv4 > Static ARP > Enable Static ARP entries (*checked*)
Quote from: Seimus on March 22, 2025, 11:54:50 AMBasically if you have rules on all 3 of these. From Interface rule view point, its created as a single list starting with rules from Floating at the top followed by Group rules Followed by Interface rules. In case a Floating rule is "last match" If any rule from this combined list is hit, the "last match rule" will not be preferred.
Quote from: Seimus on March 22, 2025, 11:54:50 AMPBR is not a security feature, its a routing feature.
Quote from: EricPerl on March 21, 2025, 07:50:09 PM#4: I don't think so.
Otherwise, the default deny/state violation rule would override all custom rules. 😉
Quote from: EricPerl on March 21, 2025, 07:50:09 PMThis said, I agree that the force GW might be one of the most obscure rules.
In particular, it's after another last match rule that's more generic thus should fire first. I suspect a non-visible element.
Quote from: Patrick M. Hausen on March 21, 2025, 10:38:09 PMA firewall is first and foremost a router with filtering capabilities on top. It runs on a single IP stack with locally connected interfaces and a routing table. And that should be all that is taken into consideration by default when forwarding packets.
[...]
Just default both to off and revert the UI so a ticked checkbox means "special feature only necessary in rare situations explicitly enabled".
Firewall -> Settings -> Advanced -> Multi-WAN -> Disable force gateway
QuoteTraffic leaving the firewall is accepted by default (using a non-quick rule), when **Disable force gateway** in `Firewall ‣ Settings ‣ Advanced` is not checked, the connected gateway would be enforced as well.https://docs.opnsense.org/manual/firewall_settings.html#disable-force-gateway
QuoteDisable force gateway
By default OPNsense enforces a gateway on "Wan" type interfaces (those with a gateway attached to it), although the default usually is the desired behaviour, it does influence the routing decisions made by the system (local traffic bound to an address will use the associated gateway).
**Note**
This rule is responsible for the `let out anything from firewall host itself (force gw)` rule visible in the floating section, it forces a route to (`route-to`) on all non local traffic for the "Wan" type interface.