OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • Profile of paradox55 »
  • Show Posts »
  • Topics
  • Profile Info
    • Summary
    • Show Stats
    • Show Posts...
      • Messages
      • Topics
      • Attachments

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

  • Messages
  • Topics
  • Attachments

Topics - paradox55

Pages: [1]
1
20.7 Legacy Series / LAN firewall rule questions
« on: October 26, 2020, 01:11:16 am »
I've started to tinker around with rules and noticed every 20-24 hours I have to allow all traffic into my network again in order for my wireguard services (which have been running for months with no issue) to function again.

Currently I am blocking all services (LAN) other then ports 53, 853, 80 and 443 with the ssh port and wireguard ports open. ICMP is also open.

Wireguard external IP(s) are whitelisted and can bypass all of the lan rules.

This problem also goes away instantly when all traffic is allowed on the interface...

It's a constant 20-24 hour cycle.

The services over wireguard don't stop working. They just start taking minutes to resolve and load. At first I thought it was a peering issue between myself and the server but then noticed that allowing all traffic fixes the problem..

My assumption is because I have such a tight restriction on LAN traffic there may be a cache issue or communication issue between all of the servers on my LAN. Perhaps an ARP cache issue?

I'm running the latest opnsense version, upgraded today.

Which ports/protocols do I need to open on LAN for servers to communicate with each other internally?

2
General Discussion / Hardware offloading per-nic
« on: August 02, 2019, 04:14:31 am »
I have two nics (one is intel, the other is a virtio bridge). Is there a way to enable hardware offloading only for the intel nic?

If not I'll probably need to use a dedicated server instead of VM. The CPU on the VM hits 70% with 90Mbps on speedtest.net which I'm assuming is due to hardware offloading being disabled.

3
19.7 Legacy Series / 19.7.1 upgrade broked
« on: July 29, 2019, 08:32:59 am »
Just a FYI the upgrade to 19.7.1 destroyed the system on reboot. While likely fixable, it was easy enough to start from scratch.

Output of install, followed by boot (attached):

Code: [Select]
***GOT REQUEST FOR TYPE: opnsense***
Updating OPNsense repository catalogue...
OPNsense repository is up to date.
All repositories are up to date.
The following packages will be fetched:

New packages to be FETCHED:
opnsense-devel-20.1.a_44 (4 MiB: 100.00% of the 4 MiB to download)

Number of packages to be fetched: 2

The process will require 4 MiB more space.
4 MiB to be downloaded.
Fetching opnsense-devel-20.1.a_44.txz: .......... done
Updating OPNsense repository catalogue...
OPNsense repository is up to date.
All repositories are up to date.
Checking integrity... done (2 conflicting)
  - opnsense-19.7.1 conflicts with opnsense-devel-19.7.r_1 on /boot/brand-opnsense.4th
  - opnsense-19.7.1 conflicts with opnsense-devel-20.1.a_44 on /boot/brand-opnsense.4th
Checking integrity... done (0 conflicting)
The following 2 package(s) will be affected (of 0 checked):

Installed packages to be REMOVED:
opnsense-devel-19.7.r_1

New packages to be INSTALLED:
opnsense: 19.7.1

Number of packages to be removed: 1
Number of packages to be installed: 1
[1/2] Deinstalling opnsense-devel-19.7.r_1...
Stopping configd...done
Resetting root shell
Updating /etc/shells
Unhooking from /etc/rc
Unhooking from /etc/rc.shutdown
[1/2] Deleting files for opnsense-devel-19.7.r_1: .......... done
[2/2] Installing opnsense-19.7.1...
[2/2] Extracting opnsense-19.7.1: .......... done
Updating /etc/shells
Registering root shell
Hooking into /etc/rc
Hooking into /etc/rc.shutdown
Starting configd.
Keep version OPNsense\Backup\NextcloudSettings (1.0.0)
Keep version OPNsense\CaptivePortal\CaptivePortal (1.0.0)
Keep version OPNsense\Cron\Cron (1.0.1)
Keep version OPNsense\Diagnostics\Netflow (1.0.0)
Keep version OPNsense\Firewall\Alias (1.0.0)
Keep version OPNsense\IDS\IDS (1.0.3)
*** OPNsense\Monit\Monit Migration failed, check log for details
Keep version OPNsense\OpenVPN\Export (0.0.1)
Keep version OPNsense\Proxy\Proxy (1.0.3)
Migrated OPNsense\Routes\Route from  <unversioned>  to 1.0.0
Keep version OPNsense\Syslog\Syslog (1.0.0)
Keep version OPNsense\Dnscryptproxy\Forward (0.1.0)
Keep version OPNsense\Dnscryptproxy\General (0.1.0)
Keep version OPNsense\Dnscryptproxy\Whitelist (0.1.0)
Keep version OPNsense\Dnscryptproxy\Server (1.0.0)
Keep version OPNsense\Dnscryptproxy\Dnsbl (1.0.0)
Keep version OPNsense\Dnscryptproxy\Cloak (0.1.0)
Keep version OPNsense\iperf\FakeInstance (0.0.0)
Keep version OPNsense\ARPscanner\ARPscanner (1.0.0)
Keep version OPNsense\TrafficShaper\TrafficShaper (1.0.3)
Writing firmware setting...done.
Configuring login behaviour...done.
Configuring system logging...done.
Message from opnsense-19.7.1:

Roar!
Your system is up to date.
Starting web GUI...done.
Generating RRD graphs...done.
***DONE***

4
19.7 Legacy Series / 19.7.1 upgrade broked
« on: July 29, 2019, 08:20:23 am »
Just a FYI the upgrade to 19.7.1 destroyed the system on reboot. While likely fixable, it was easy enough to start from scratch.

Output of install:

Code: [Select]
***GOT REQUEST FOR TYPE: opnsense***
Updating OPNsense repository catalogue...
OPNsense repository is up to date.
All repositories are up to date.
The following packages will be fetched:

New packages to be FETCHED:
opnsense-devel-20.1.a_44 (4 MiB: 100.00% of the 4 MiB to download)

Number of packages to be fetched: 2

The process will require 4 MiB more space.
4 MiB to be downloaded.
Fetching opnsense-devel-20.1.a_44.txz: .......... done
Updating OPNsense repository catalogue...
OPNsense repository is up to date.
All repositories are up to date.
Checking integrity... done (2 conflicting)
  - opnsense-19.7.1 conflicts with opnsense-devel-19.7.r_1 on /boot/brand-opnsense.4th
  - opnsense-19.7.1 conflicts with opnsense-devel-20.1.a_44 on /boot/brand-opnsense.4th
Checking integrity... done (0 conflicting)
The following 2 package(s) will be affected (of 0 checked):

Installed packages to be REMOVED:
opnsense-devel-19.7.r_1

New packages to be INSTALLED:
opnsense: 19.7.1

Number of packages to be removed: 1
Number of packages to be installed: 1
[1/2] Deinstalling opnsense-devel-19.7.r_1...
Stopping configd...done
Resetting root shell
Updating /etc/shells
Unhooking from /etc/rc
Unhooking from /etc/rc.shutdown
[1/2] Deleting files for opnsense-devel-19.7.r_1: .......... done
[2/2] Installing opnsense-19.7.1...
[2/2] Extracting opnsense-19.7.1: .......... done
Updating /etc/shells
Registering root shell
Hooking into /etc/rc
Hooking into /etc/rc.shutdown
Starting configd.
Keep version OPNsense\Backup\NextcloudSettings (1.0.0)
Keep version OPNsense\CaptivePortal\CaptivePortal (1.0.0)
Keep version OPNsense\Cron\Cron (1.0.1)
Keep version OPNsense\Diagnostics\Netflow (1.0.0)
Keep version OPNsense\Firewall\Alias (1.0.0)
Keep version OPNsense\IDS\IDS (1.0.3)
*** OPNsense\Monit\Monit Migration failed, check log for details
Keep version OPNsense\OpenVPN\Export (0.0.1)
Keep version OPNsense\Proxy\Proxy (1.0.3)
Migrated OPNsense\Routes\Route from  <unversioned>  to 1.0.0
Keep version OPNsense\Syslog\Syslog (1.0.0)
Keep version OPNsense\Dnscryptproxy\Forward (0.1.0)
Keep version OPNsense\Dnscryptproxy\General (0.1.0)
Keep version OPNsense\Dnscryptproxy\Whitelist (0.1.0)
Keep version OPNsense\Dnscryptproxy\Server (1.0.0)
Keep version OPNsense\Dnscryptproxy\Dnsbl (1.0.0)
Keep version OPNsense\Dnscryptproxy\Cloak (0.1.0)
Keep version OPNsense\iperf\FakeInstance (0.0.0)
Keep version OPNsense\ARPscanner\ARPscanner (1.0.0)
Keep version OPNsense\TrafficShaper\TrafficShaper (1.0.3)
Writing firmware setting...done.
Configuring login behaviour...done.
Configuring system logging...done.
Message from opnsense-19.7.1:

Roar!
Your system is up to date.
Starting web GUI...done.
Generating RRD graphs...done.
***DONE***

Boot had a require_once (script/load_phalcon.php) failed to open stream warning in legacy_bindings.inc line 29.

5
19.7 Legacy Series / Feature request - Unbound DNSBL
« on: July 08, 2019, 04:32:48 pm »
Can we get DNSBL for unbound? It's available for both bind and dnscrypt.

Unbound can blacklist based on config files so this should be possible.

6
General Discussion / Basic bind question
« on: July 07, 2019, 10:27:28 pm »
I'd like to use the DNSBL in bind, but want to continue using unbound as my DNS server. BIND has a dns-forward option, but it's very specific about it only being for unknown dns queries.

Ideally, I'd like it to go like so for every DNS query:

BIND (53) / DNSBL -> Unbound (port 5353) / ad-blacklist, domain blacklist config files, etc -> DNSEC/TLS via port 853 to 1.1.1.1

Would setting dns-forward in bind be all I need to do?

7
General Discussion / Losing connection when LAN is setup
« on: May 28, 2019, 05:49:48 pm »
Hi all,

I have a weird setup, but with my small network I can't justify running a dedicated opnsense box.

VPS (opnsense) -> Server -> Switch -> Router (DHCP) -> WAN

What I'm trying to do is the following:

VPS (opnsense+DHCP) -> Server -> Switch -> Router (DHCP) -> WAN

The server only has one NIC, the VPS has two separate virtual nics with their own mac addresses. What I want is for everything behind the switch to be using the opnsense dhcp server and leave the coax cable tv boxes on the FIOS router.

However, upon configuring the LAN interface with services -> DHCP enabled the VPS loses all internet connectivity.

I think it's from both DHCP servers conflicting with one another. Any suggestions on how to make this setup work? And yes I can buy another NIC card if the virtual nic's won't work on this setup.

FIOS router - 192.168.1.1/24
Opnsense - 192.168.1.15 DHCP WAN
Opnsense - 172.0.0.1/8 DHCP LAN

Pages: [1]
OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2