OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • Profile of TrixieBell »
  • Show Posts »
  • Topics
  • Profile Info
    • Summary
    • Show Stats
    • Show Posts...
      • Messages
      • Topics
      • Attachments

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

  • Messages
  • Topics
  • Attachments

Topics - TrixieBell

Pages: [1]
1
23.1 Legacy Series / Lamenting the change to firewall live log searching
« on: February 22, 2023, 09:54:42 pm »
I recently upgraded from an ancient OPNsense 20.something install to a modern 23.bleedingedge version and the only change I noticed in the Web GUI was that the search of the live logs went from a quick and easy broad search with regex to a clunky dropdown option.

I loved the other one. It was quick and easy to use, in my opinion one of the best features of the GUI (which in general I think is pretty great).

I'm not looking for replies, just letting people (devs perhaps?) know how much I miss it.

RIP nice search. :o(

2
Intrusion Detection and Prevention / Nessus scans overloading state tables
« on: February 22, 2023, 09:47:33 pm »
Possibly off topic but I thought perhaps it belonged in the Intrusion Prevention threads.

We use Nessus for vulnerability scanning, currently if I scan a subnet which is the other side of my OPNsense firewall it quickly fills up the state table on the firewall and I end up DOSing myself.

It doesn't seem to matter if I use SYN, UDP or TCP port scanning, I assume this may be related to block vs reject in my default rules?

The Nessus docs say -

"It may also be beneficial to review which port scanner your policy is using. While the SYN scanner is the default, and works well in most situations, it can cause connections to be “left open” in the state table of the firewalls you’re scanning through. The TCP scanner will attempt a full 3-way handshake, including closing the connection."

But this doesn't seem to make much difference in my case.

Can anyone confirm whether changing block to reject might fix this or does anyone have any other suggestions or experience with this sort of issue?

Thanks.

3
Hardware and Performance / Hardware acceleration settings for DEC2700
« on: February 22, 2023, 09:36:56 pm »
Hi Everyone,

I finally worked out enough of the kinks in my config for the dec2700 to put it into production, though I am currently only using the 1g ports (I think I have something configured incorrectly on my 10G switch but that's something a different post!).

Now what I really want to know is what performance tweaks I should do?

Hardware acceleration?
Hardware checksum offload?
Hardware TCP segmentation offload?
Hardware large receive offload?

Currently they are all off, as per the defaults, and on normal load its ticking along at about 2% cpu so I doubt any settings would after my real world performance but I just assume, since this is hardware spec'd and provided by OPNsense that some hardware acceleration should be possible!
I am seeing about double the ram usage that I had on my old OptiPlex setup but this still only adds up to 20% utilization so not concerning.

4
23.1 Legacy Series / Odd issues after upgrade
« on: February 15, 2023, 08:07:27 pm »
Hi All,

I upgraded from opnsense 20.1-amd64 running as a router on a stick on an old Dell Optiplex to a brand new shiny DEC 2700 running the bleeding edge production version, fully up to date and using 3 interfaces to route.

I did this by dumping the config and restoring it to the new box, changing the interfaces to be correct and that's pretty much it. Just about everything worked, it was routing and letting me access between VLANs on one interface and also routing down my 2 interfaces I split out (internet and WAN).

The only thing that seemed to be causing issues was the proxy->internet connection, I couldn't get any traffic out. It wasn't a route issue as I could SFTP out and VPN in so...

I enabled logging on all my rules and couldn't see anything blocked, in fact I could see DNS traffic being allowed from my proxy server but wasn't getting a response, i could also see traffic to the proxy and squid logs were showing the requests. I checked all the possible proxy and dns options I could find on the new box and nothing was enabled so I gave up and added a new floating rule, proxy can go anywhere any protocol both directions. Hey presto, internet worked, DNS was getting a response, happy days. I went home to bed.

I come in this morning and found 802.1x port authentication wasn't working for PCs (it was working fine for phones and printers though) and ram usage on the new box was sitting at 80% (which is odd as the new box has double the ram of the old one which sits below 20%).

I saw no drops on the rules (which were still logging from last night and I'm hoping was the cause of the high ram usage) and on the NPS server I see requests from all the computers except they aren't trying with their computer account and cert as they are meant to, the requests are coming in as mac address authentication...

Anyway, I reverted to the old box and everything is instantly okay.

Can anyone think of any reason, going from a dump of rules and settings on v20 and importing on v23 would cause these weird issues?

Pages: [1]
OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2