Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Visioner

#1
Die OPNsense erzeugt nicht das Schlüsselpaar für den Client, jedenfalls wenn man die Oberfläche benutzt.
Der PubKey muss aus dem Client kopiert werden und der private Schlüssel des Clients ist so der OPNsense nicht bekannt.

Ob das Absicht ist (security) weiß ich nicht.
Bei wireguard z.B. auf dem Raspberry mit pivpn wird auch das Schlüsselpaar des Clients gleich auf dem Server erzeugt und so kann man da auch den qrcode gleich ausgeben.
#2
Hello all

I have two OPNsense connected via Wireguard. VoIP phones can use the PBX of the main office via the VPN tunnel.

However, the voice quality is very poor when the WAN is busy.

I have been looking for instructions on how to use shapers to give priority to VoIP traffic. However, these instructions are written to give preference to VoIP traffic going over the WAN to an external VoIP provider. But here the target is the traffic going through the wireguard tunnel.

So how can I create rules that give preference to VoIP data that should go through the tunnel?


Translated with www.DeepL.com/Translator (free version)
#3
Hi,

I´m still trying to resolve the following problem for 2 days  :o:

The System is a fresh installed OPNSense 15.7.16 with activated captive cortal on OPT1. Everything is working fine. If I call a http://www.thisisaurl.com site, the Portal Login Page appears and when I put in a voucher code it works an I can surf the net.
But when I want to surf a secured https://www.thisissecureurl.com url the browser stucks and doesn´t display the portal login page. On chrome-Browser it stucks for 20-30 sec. then chrome redirects itself to the "gstatic.com" url (not secured) and then the Portal login page appears.

What am I doing wrong? Is it a bug or a feature...

Greets, Holger