Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Topics - zeropage

#1
I consulted the WireGuard Road Warrior Setup tutorial. The connection works. I also completed Step 4(a) - Assign an interface to WireGuard. However, firewall rules only seem to be applied if they are configured under "WireGuard (Group)." Rules for "WG0" are ignored. Unfortunately, I have not yet been able to find the cause of this. What can I do?

Have attached some screenshots to this topics.
#2
Hi their.

I operate my own CA, imported in OPNsense and would like to use a certificate for OpenVPN Server. I have taken the following steps:

  • I imported the certificate of my CA into OPNsense (System: Trust: Authorities)
  • Created a CSR for a leaf certificate in OPNsense (System: Trust: Certificates)
  • Signed the CSR with my intermediate CA.
  • Opened the CSR for editing in OPNsense and inserted the PEM data of the certificate.
  • When I try to save the new certificate, I get the error message "Invalid X509 certificate provided: error 20 at 0 depth lookup: unable to get local issuer certificate".

Unfortunately, the list of certificates shows "self-signed" in the "Issuer" column instead of the name of my CA. I cannot select my CA in OPNsense, either when creating the CSR or when importing. The problem is becoming somewhat urgent because I only have 4 days left to replace the certificate that was imported in the same way 3 years ago with a new one. Thanks in advance!
#3
I operate my own root and intermediate CA and would like to use a certificate for the Syslog client (TLS). I have taken the following steps:

  • I imported the certificates of both CAs into OPNsense (System: Trust: Authorities)
  • Created a CSR for a leaf certificate in OPNsense (System: Trust: Certificates)
  • Signed the CSR with my intermediate CA.
  • Opened the CSR for editing in OPNsense and inserted the PEM data of the certificate.
  • When I try to save the new certificate, I get the error message "Invalid X509 certificate provided: error 20 at 0 depth lookup: unable to get local issuer certificate".

I performed this process some time ago and had no problems. Unfortunately, I cannot find any documentation for my request. I would be very grateful if someone could help. Thanks in advance.
#4
Hello everyone,

I am using the DHCPv4 service on my OPNsense. Connected to it is a Proxmox host with some VMs. Each guest is assigned an IPv4 address via static lease. The guests are running Debian Bookworm with ifup and dhclient. However, the dhclient now makes a DHCPREQUEST about every hour. Because the IP addresses almost never change, a DCHP request during boot would be enough. What do I have to configure? Don't find any hints for dhclient.

I don't want to set a static IP on the guests, because in my opinion this is the task of the DHCP server.


# /etc/network/interfaces
allow-hotplug ens18
iface ens18 inet dhcp

#5
In my home setup, I have an OPNsense as well as a server and other devices that are publicly accessible via NAT port forwarding. I also have a domain (e.g. example.com). DDNS takes care of updating the DNS records. Everything has been working perfectly for a long time. However, if I now want to access the server at home via the public domain, this does not work. After some time I get a timeout from the client/browser. Why not?

Actually, a request should be routed out to the ISP and from there back to my DSL connection.  :o

I would like to mention at this point that I use Unbound for my private zone (e.g. example.home.arpa). Maybe I can solve the problem there somehow, but I don't know how.

Thanks in advance.
#6
Hallo,

ich habe ein VLAN für "nicht vertrauenswürdige Hosts" eingerichtet. Dort sollen hosts nur ausnahmsweise untereinander kommunizieren dürfen. Bestimmte Services wie HTTP/S sollen in das Internet erlaubt sein. Letzteres habe ich durch folgende Regel unter Angabe des PPPOE-Gateway bewerkstelligt:

Action: Pass
Quick: Checked
Interface: VLAN20
Direction: in
Protocol: IPv4 TCP/UDP
Source: VLAN20 net
Port: *
Destination: *
Port: 443 (HTTPS)
Gateway: WAN_PPPOE

Ich frage mich nun aber, ob das der richtige Weg ist. Was meint ihr? Auch allgemein interessiert mich, wie man ein solches Subnetz mit opnSense konfiguriert. Gibt es ein Beispiel für ein solches Ruleset hier im Forum oder anderswo?

Anhang: Auszug VLAN20 Rules.
#7
Hallo!

Ich betreibe seit einiger Zeit auf meiner OPNsense einen OpenVPN Server. Zugriff darauf haben 3 Clients mit jeweils einem Zertifikat zur Authentifizierung. Nun sollen Clients nur auf bestimmte Netzwerksegmente zugreifen dürfen. Dazu habe ich versucht, die Anleitung Configuring client-specific rules and access policies über die OPNsense GUI umzusetzen. Dabei ist mir nicht klar, wie oder ob überhaupt ich das mit den routes umsetzen muss. Weiß dazu jemand was?

Danke, Titus
#8
Moin!

Ich beschäftige mich schon einige Jahre mit Netzwerkthemen und habe vor kurzem hinter meinen DSL Router eine APU mit OPNsense geschaltet. Für dessen LAN würde ich nun gerne mal eine lokale Domain verwenden. Also zum Beispiel xyz.home.arpa. Für Zugriffe aus dem Internet nutze ich bereits DynDNS und eine Domain example.de bzw. lan.example.de. Die Clients im LAN möchte ich gerne gerne mit nas.lan oder nas.lan.example.de ansprechen können.

Mir ist nicht klar, welche Angabe ich unter System: Settings: General: Domain machen muss bzw. sinnvoll ist. Und zu Unbound habe ich einiges gelesen. Aber kaum etwas zu OPNsense gefunden.  ::)

Hinzu kommt, dass ich von außen oft VPN nutze. Mein Notebook befindet sich entweder direkt im LAN oder ich greife per OpenVPN auf Clients im LAN zu. Dazu habe ich in Bookmarks bisher die statischen IPs der Clients gespeichert (z.B. 192.168.10.10). Nun wäre die FQDN irgendwie cooler. Geht das?

Hier noch mal das Setup:

Internet -> VPN -> DynDNS -> DSL-Modem -> WAN Router -> LAN1 -> WAN OPNsense -> LAN2 -> Clients (NAS, Mediacenter etc.)