Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Diggy

#1
26.1 Series / Re: Override DHCP Valid Lifetime
March 26, 2026, 04:09:36 PM
Quote from: hharry on March 26, 2026, 07:30:55 AMIt's been requested before here -> https://github.com/opnsense/core/issues/7592
Unfortunately that issue is "Closed as not planned".  Since I don't have a github login, I am officially making my request here for that feature.  LOL
#2
26.1 Series / Override DHCP Valid Lifetime
March 25, 2026, 07:50:23 PM
We're using Kea DHCP server.  The Valid Lifetime set on the Settings tab is sufficient for most of our subnets.  However, there are a couple subnets that require a shorter lease time.

Which Option code, if any, overrides the value set on the Settings tab?  There isn't a code that says "valid lifetime".  The closest I found is "renewal time [58]", but because this is a production router, I cannot do trial and error.  Is "renewal time [58]" the correct code to overrride default valid lifetime?

UPDATE:
The code I mentioned above is for IPv4.  I also need the correct code for IPv6.  Please and thanks.

#3
Quote from: meyergru on March 19, 2026, 04:38:59 PM3: Use "dmesg | fgrep microcode" on the CLI to see if an update was applied.


Apparently no microcode updates applied.  Output from that command:
[1] CPU microcode: no matching update found
#4

I have some questions about the "Intel CPU microcode updates" plugin.

First, I'd like to say that it would have been nice if the pre-install description stated that the package is no longer being maintained.  It was only mention post-installation.

Second, I would consider this package to be very important with respect to security, so why is it not being maintained?  Further, why isn't it included as part of the core installation?

Third, I am using an HP server with the "Intel Xeon CPU E5-2620 v4" CPU.  How can I determine if my system will benefit from the microcode?
#5
26.1 Series / Re: Port Forwarding automatic rules
March 17, 2026, 10:41:06 PM
Anyways, I disabled the auto-generated rules.  Then created the correct "Pass" rules and placed them after the GeoIP block.  In theory, the GeoIP block should take place when applicable before allowing the Port Forwarding.
#6
26.1 Series / Re: Port Forwarding automatic rules
March 17, 2026, 10:37:59 PM
Quote from: OPNenthu on March 17, 2026, 11:43:29 AMIn any case the order of the rules you show here should be working.  Are you sure you are testing from the outside?

Yeah, of course I was testing from the internet.

Quote from: OPNenthu on March 17, 2026, 11:48:05 AMDo you have any other NAT rules set to "Pass" maybe?  Those would override and would not show here.

I do not see any rules elsewhere that would affect the desired behavior.
#7
26.1 Series / Re: Port Forwarding automatic rules
March 17, 2026, 10:33:29 PM
Quote from: OPNenthu on March 17, 2026, 11:43:29 AMWhat is the meaning of "!" by itself in the Source field of your NAT rules?

I have no idea the meaning of the "!" by itself and am also wondering its meaning.  It is part of auto-generated rules.
#8
26.1 Series / Re: Port Forwarding automatic rules
March 16, 2026, 10:50:04 PM
Screenshot of the rules for the WAN interface:
#9
26.1 Series / Port Forwarding automatic rules
March 16, 2026, 10:40:59 PM

I have port forwarding working.  Internet can hit the WAN interface and both HTTP and HTTPS forward to the internal web server.

However, I am concerned that the port forwarding might take precedent over my manual rules including GeoIP blocking.  So I created a manual rule temporarily to see if it would block port forwarding.  It does not.  The docs say that the automatic port forward rules are to be applied last.  That does not appear to be the case.

Ideas?
#10
Quote from: Patrick M. Hausen on March 13, 2026, 05:21:48 PMMaybe they are using RA to distribute ULA ...
Static IPv6 ULA addresses for servers, DHCP ULA via RA for workstations.
#11
26.1 Series / Minimizing storage writes
March 13, 2026, 06:40:43 PM
Although I am using an SSD for storage opposed to a flash drive, I would still like to minimize writes to storage to extend its life.

Any suggestions on what settings I could/should change to accomplish this?

Is RRD written to storage?

Feedback on this matter is appreciated.

#12
I believe I have it working with IPinfo and I can see it got an initial database update from IPinfo.

Do I have to manually schedule database updates via cron or something similar?  If not, at what interval do updates automatically occur?
#13
Quote from: Patrick M. Hausen on March 12, 2026, 07:03:33 PMYou do not need IDS/IPS for that, nor a special plugin. GeoIP aliases are supported in standard firewall rules.

Set up a free account with MaxMind or IPinfo, navigate to Firewall: Aliases: GeoIP settings, follow the documentation:

https://docs.opnsense.org/manual/aliases.html#geoip

Thank you for the fast and thorough response.  I will definitely check it out.
#14
We are using private IPv6 addresses along with IPv4 addresses on our local network.  I noticed that the IPv6 range "fc00::0/7" is not included in the default Home Networks list.  Why?  Does "Home Networks" not apply to IPv6?  Are there any special considerations when adding "fc00::0/7" to the Home Networks list?

In advance, thanks for guidance on this matter.
#15
Running OPNsense 26.1.2.  Does the built-in IDS/IPS system allow blocking traffic to/from the internet by geographical region?  For example, blocking traffic from IP blocks allocated to Russia, China or Iran?  Or inversely, allow only traffic with IP blocks allocated to just north America?  If yes, what rulesets (if that is the correct term; I'm new to this) or configuration would I need?

If not, is there a plugin that can add the traffic blocking by geographical region functionality?

Help and guidance is much appreciated.  Thank you.