Got it - thx :)
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: pfry on October 02, 2025, 06:56:11 PMQuote from: s3b0 on October 02, 2025, 09:56:28 AM[...]
1. I wonder why there are so many options for DNS and DHCP (in menu i can see at least 3: Dnsmasq DNS & DHCP, ISC DHCPv*, Kea DHCP, Unbound DNS). Which one i should use and how to remove not used to avoid misconfiguration?
Flexibility. Choose one and use it, and simply disable the others (you cannot remove them easily). For instance, I do not use OPNsense for DNS processing, so I use Kea for DHCP.Quote2. I've tried to make some VLAN-s to isolate some IOT stuff[...]
I understand what you'd like to accomplish, but not how, given your equipment. I isolate traffic using VLANs, using a Netgear MS510TX switch (smart/web managed) that I've broken down into a port expander. That is, ports 1-9 are each assigned a unique VLAN, untagged, and port 10 has all, tagged, and uplinks to a port on my firewall. Clients plugged into the switch do not have to be VLAN-aware. Note that this is not a common configuration, as most folks would prefer that their switch actually switches, and would have fewer VLANs assigned to multiple ports. You can accomplish something similar with basically any switch that offers some sort of management. A cheap example would be the Netgear GS108T, but there are (very) many others (ServeTheHome is a good resource if you'd like to look at quick reviews).
I also cheesily isolate my wi-fi by breaking down my AP (OpenWRT) into two bridges, one for management and one for wi-fi client access. The management bridge acquires an IP via DHCP; the access bridge has no IP. The OpenWRT firewall is broken down such that it only isolates the bridges, and wi-fi clients are isolated from one another. Wi-fi client DHCP is served from the firewall. Oh, the management side is a bridge so that I can assign multiple ports to it, just in case. I could divide the management from access via VLANs and save a port, but I prefer to minimize special port configuration and I have plenty of switch ports.
This is not to say that you can't make VLANs work for you with your current hardware... but I don't think it's what you're looking for. In the short term you might consider foregoing the isolation. Another isolation option would be additional port(s) on your firewall, each serving a different switch.
And, of course, other folks here may have different/better advice.