Quote from: nero355 on April 08, 2026, 02:58:03 PMMaybe wait for the 26.1.6 Release and check again after a reboot ?Just did the above and the error seems to be gone!
I consider this fixed now :)
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: nero355 on April 08, 2026, 02:58:03 PMMaybe wait for the 26.1.6 Release and check again after a reboot ?Just did the above and the error seems to be gone!
Quote from: reinob on Today at 05:31:45 PMQuestion 1: is there an easier way (set once and forget) to make sure that the IPv6 addresses of (all, or this one) devices get a permanent status in NDP and are updated automatically if/when the IPv6 prefix changes?I think that's why this year they have added https://docs.opnsense.org/manual/neighbors.html#automatic-discovery to OPNsense together with some Captive Portal related features, but I am not entirely sure to be honest...
Quote from: Greg_E on Today at 05:16:05 PMwith approximately a gen 4 series of processor (it's a Xeon e 1200 series).Xeon E3 models from the 1200 Series (1230/1240/etc.) have v1/v2/v3/v4/v5 after their model name IIRC, so : 1230v3/1230v4/1230v5/etc.
Quote from: bloodyNetworker on Today at 06:17:23 PMHence, the office is arguably the most "complex" rooms of all to configure.Not really : The way you did it on your drawing is just fine! :)
QuoteMy "Other" TP-Link M4R is connected to the wall outlet, but as you know the M4R has a NIC (yes this time I mean NIC as in NIC, not a wall outlet) to which my TV is connected to.AFAIK that "NIC" is simply a Switchport that is part of a very small integrated Switch ;)
QuoteAs I understand it, Managed Switches are configurable to have access/untagged ports (every packet that goes through a specific port is tagged the same way, the tag disappears once it leaves the switch) or trunk/tagged ports (packets going through a;)NICSwitchport can have multiple tags assigned to them, which can be relayed to a different trunk port on a different managed switch).
QuoteI'm assuming that in my case I'd be only working with tagged ports as everything is supposed to run through by Opnsense, which controls through the firewall rules the VLAN-access, am I right?It depends how you like to setup things :
QuoteNow continuing with my planned network upgrade (sketch_planned.png): I've colored the wires based on the following:&
Red means trunk connection.
Yellow means connection of IOT interface.
Purple means connection of UNTRUSTED interface.
QuoteBecause the AP's do SSID to VLAN Mapping and you guys made it clear that APs can infact be set on a VLAN as well, I have a specific question in mind:By using Untagged/Tagged settings of the Switchport correctly :
When the VLAN-aware AP receives a connection from a specific device from a specific SSID, it'll tag it accordingly.
Then the AP would relay the tagged packets through the trunk port.
But now that those are tagged I also want to make sure that the packages of the AP are tagged as well so that I can get them to be placed in IOT.
How can I achieve this or isn't this possible after all?
QuoteI'm assuming I'd have to configure the switch-software in a way that the specific trunk port;)tagsUntagged packages with IOT
Quotebut this theory leaves me with another question:See above!
Would the VLAN tags from the SSIDs be overwritten in this setup, or does the software distinguish between the ethernet-connected device and those connected through other means? Specifically, does it only tag packets from the IP address it knows is associated with the Ethernet connection?
QuoteThis theory is why I've colored the connections to the APs so that they are to be placed in IOT.Now that I see the drawing I feel like we should have started with that, because it looks like a very straightforward setup that you can achieve very easily!
But as I've also made clear: I could also live without them being in a seperate VLAN, because after all I can just deny any telemetry based off their IPs.
QuoteSo my "theory" that the APs would join IOT is realizable?Yes, you can put their Management Interface Untagged in IoT and all other Networks would be Tagged for regular useage.
QuoteI hope you guys aren't colorblind.LOL! Good thinking!
Quote from: OPNenthu on Today at 03:17:22 AMIn all of the years that I have used Pi-Hole and helped people on various forums with all sorts of questions this is the first time that I read something like that : Are you sure it's not a False Positive ?!Quote from: nero355 on April 04, 2026, 03:40:27 PM- Or you could use Pi-Hole + Unbound the way it's explained here : https://docs.pi-hole.net/guides/dns/unbound/Their main website (https://pi-hole.net/) get blocked on my end by a DoH IP list. Looks like a CDN domain (*.b-cdn.net) according to uBlock origin and it has a high abuse score to boot:
https://www.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/37.19.207.37
I've used Pi-Hole in the past and wanted to experiment with it again in a Proxmox container, but I don't want to whitelist these IPs.
Not a good look for a privacy-focused DNS project :-/
QuoteNo issue with their GitHub repo, though.What does https://discourse.pi-hole.net/ do for you ?
QuoteAs I haven't used Pi-Hole in years and haven't followed the project, do you still find them trustworthy now in 2026?It's a small team of about 8 people and some do the development and some do the support on a couple of places : That's it! ;)
Any concerning developments or money ties?
Quote from: Patrick M. Hausen on April 13, 2026, 07:30:14 PMWe are dealing here with a "Beginner" and despite the fact that MikroTik does have such a thing as their WinBox GUI for setting up everything I am not sure if that's a good idea ?Quote from: bloodyNetworker on April 13, 2026, 07:21:04 PMDo you have an alternative brand / products to suggest?Mikrotik.
Quote from: Boxer on April 13, 2026, 10:03:56 PMFirst, let me apologise. The Tapo AP's ping those servers (reddit, netflix etc) to check the connection is still up. So sorry about questioning that. I still think that's absurd if they're in AP Mode.Tapo ?! Are you talking about TP-Link M4 Mesh Sets or something else ?!
Quote from: bloodyNetworker on April 13, 2026, 07:21:04 PMIt is in AP mode. I also first thought, that the AP only sets up the "bridge" and do not require IPs, but if you take a closer look at my logs you'll see I'm not lying when I'm saying that my TP-Link APs have their own IPs and THEY THEMSELVES send out telemetry.I think you have misunderstood my reply about Accesspoints and IP Addresses...
Quote from: bloodyNetworker on April 13, 2026, 07:41:29 PMThe APs are connected through the network cables that are in our walls. They don't have to be directly connected.I think it's time to post a schematic picture of your network setup before we have a lot more misunderstandings...
I'm assuming I'm misunderstanding you wrong?
QuoteEither TP-Links specifications are not very clear or idk...Everyone does it these days and a lot of it can be disable in a lot of cases...
Here is a list of all "Omada Mesh" supported devices on their own website.
The "ceiling" EAP225 is advertised with Omada Mesh support, same as it's outdoor variant.
I'm starting to dislike this company... they do all that telemetry goof, force you into cloud accounts to manage your devices and are just so incredibly confusing with their marketing and specifications IMO.
Quote from: bloodyNetworker on April 13, 2026, 11:19:45 PMEDIT: I just found a big forum post on TP-Links official website, where their customers report the same: The TP-Link APs do infact send out telemetry.That's really a shame...
https://community.tp-link.com/en/business/forum/topic/525328
They are too sorry to make firmware updates for their cheaper product lines to opt-out.
Quote from: bloodyNetworker on April 13, 2026, 11:38:51 PMThis was my original idea, but nero355 told me this could go wrong if I were to put them in IOT VLAN.Please note :
QuoteThe cables in the walls lead to every NIC in the household. They're coming together in a room where I have them connected to my "main" switch.Everytime you mention a NIC and Accesspoint it sounds like you are using the Accesspoint as an extension of the NIC in a PC ?!
So basically it doesn't matter to which NIC in the wall the APs are connected to since the switch makes sure that they can all speak to each other.
Quote from: Patrick M. Hausen on April 13, 2026, 11:55:05 AMThe scroll bar I marked in red should not exist. The box around the rules should not exist. The rules table should be rendered on the page extending downward as far as necessary and the browser scroll bar should be used to get at the lower ones.I think you have uploaded the wrong screenshot ?!
Duplicating a function the browser already brings inside the page is bad, IMHO.
Also it does not automatically use all the width I have available ...
Quote from: bimbar on April 13, 2026, 10:38:50 AMComing back to the general issue of modern UIs - there is a general trend to waste space.You have no idea how much I agree with you on that one... It's driving me mad sometimes !!! :(
I don't think that is something one should accept as normal and reasonable.
Quote from: drosophila on April 13, 2026, 02:35:24 AMDon't smart switches provide the option of restricting the configuration access to a specified port only anymore? At least HP had that over a decade back.Ofcourse they do, but not everyone seems to know for whatever reason :)
Quote from: Patrick M. Hausen on April 13, 2026, 12:13:01 AMThnx! :)Quote from: nero355 on April 13, 2026, 12:05:27 AMFor any Accesspoint to function it does need any kind of IP Address at allIt does *not* need ... 🙂
Quote from: bloodyNetworker on April 12, 2026, 09:59:23 PMI'm struggling to understand your explanation how access points are set up.For any Accesspoint to function it does not need any kind of IP Address at all : It's all Layer 2 communication based on the Hardware Address a.k.a. the MAC Address.
I understand that you can tag SSIDs with specific VLANs. I thought that because my access points act as network devices as well (and surely have their own IP), I should be able to put them in a VLAN as well.
I'm now giving up this idea, I'll just block their Static DHCP Leased IPs from accessing the internet and that's it.
QuoteWell I don't necessarily need an access point with NICs. Remember that one ethernet-connected device that needs to be in UNTRUSTED? Currently, it's connected to the NIC my TP-Link M4R offers, but it would be cleaner if I just use a Managed Switch and connect both of them to it.True! :)
QuoteAssuming I'm already connecting AP and ethernet-connected device in UNTRUSTED to a switch, I won't need additional NICs that are on the AP. Especially if the switch also offers PoE.You can ofcourse!
As I've said, I don't really specifically need Wall-Type APs. If there is another AP that is cheaper and offers VLAN-tagging on SSID as well, i'd rather take that one.
QuoteIt seems to me that Omada products require the products to know / contact each other over my home network. As of right now I can't tell whether (based on my future firewall rules / VLAN configs) this feature could break regarding what I'm trying to achieve.OK, but it's not that hard really :
I'm giving up the idea of "putting AP / switches in VLANs to regulare their telemetry", it seems irritating and complex. I'd rather just assign them Static DHCP Leases and then block those IPs from accessing the internet. I won't bother with on which interface they're chilling or not.
QuoteI see the potential... Tangled cables? BEGONE!That too! :)
QuoteEDIT:Are you saying you can not connect each Accesspoint via it's own UTP cable ?
I've now picked Omada. I want to see how convenient it is:
2x TP-Link Omada ES200 Desktop Gigabit Managed Switch, 8x RJ-45, 64W PoE+
2x TP-Link Omada EAP225
My price comparision site tells me that only EAP225 supports Mesh, which is a MUST in my household.
The other ones - those "Wall" thingies you praise - don't??
https://geizhals.de/tp-link-omada-eap230-wall-a2419233.html
https://geizhals.de/tp-link-omada-eap235-wall-a2451515.html
https://geizhals.de/tp-link-omada-eap225-a1501193.html
QuoteI hope it's ok to post links from other sides here. This is not an ad. I only want to show what I mean so please don't ban or delete this message mods if this is against the rules. I'm sorry if it is against the guidelines.Don“t worry about that : It's OK! :)
Quote from: pseudonym3k on April 12, 2026, 09:24:40 PMWhen you cut it off like that then yes, but the whole sentence is simply to steer you to the right place with the right information, because this :Quote from: nero355 on April 12, 2026, 07:54:23 PMIt's all a matter of readingYour comment is not nice and not necessary in a helpful context. Please be kind.
QuoteI found videos for setting up KEA with one LAN and one subnet, a few minutes and simple. And while some of them also showed how to set up Unbound to work with KEA, none that I watched stated it (or another DNS solution) was a requirement with KEA.Is the whole problem these days : YouTubers who think they know everything telling people half the story because they also don't understand what they are doing exactly!
Quote from: Patrick M. Hausen on April 12, 2026, 09:39:20 PM- If run locally you can use Kea, ISC (deprecated, but still working) or DNSmasq for that job.I would mention those three in a different order :
Quote- If run locally you can use ISC (deprecated, but still working) or KEA or DNSmasq for that job.To avoid people thinking KEA is deprecated too like someone did a while ago here on the forum :)
QuoteSo familiarise yourself with the fundamental protocols ("jobs") and subsystems on OPNsense and try to pick the best solution.That's the most important part IMHO for anyone starting out with any kind of software :)
Quote from: Patrick M. Hausen on April 12, 2026, 08:23:06 PMNetflow is a behemoth designed for large ISPs. It will scrub your SSD to death in weeks if you log locally and have some considerable amount of traffic.Good to know! Thnx! :)
The smallest recommended deployment - even for a home lab - for Elastiflow is 4 cores, 16 G of RAM, a couple of hundred G of disk.
They promise the license will be free forever, they just want you to register an account and extend the license once per year. Like e.g. Maxmind, too.
The limit for the free tier is 4000 flow records per second. If you outgrow that, you have bigger fish to fry ;-)
Quote from: stefan21 on April 12, 2026, 11:42:00 AMDid an upgrade to the latest OPNsense version.That does not mean you had to do this too :
QuoteMigrated to NEW firewall rules.Because it does bring some changes along you might not like and the migration is not something you must do for now !!
QuoteMigrated from ISC to KEA.That's something you could have done in 25.7 too first and then upgrade afterwards once you were sure everything is still working as it should ;)
Quote from: Patrick M. Hausen on April 12, 2026, 01:36:32 PMDon't save netflow data on OPNsense. Export to a netflow collector like Elastiflow and save your SSD 🙂Looks seriously sweet as far as I can tell from your other recent post : https://forum.opnsense.org/index.php?msg=264974
Quote from: JamesFrisch on April 12, 2026, 01:32:58 PMSorry, I should have been clearer in my writing. This is not the setting I have, this is the setting my ISP recommends.I see now :)
Here ist the link: https://www.init7.net/en/support/faq/mit-welchen-uebertragungsarten-funktionieren-die-tv-streams/
On the buttom left, you have to activate nerdmode. That shows you the "Rules for multicast streaming" which are the rules I posted.
But it could very well be that these settings are just some old leftovers. I contacted support and asked them exactly this.
Maybe they are long gone to IGMPv3. I would also assume that the mentioned old servers are no longer running, but they are still described there.
QuoteI even tried something similar like you linked. I created a whole seperate VLAN just for the AppleTV Box, but still no luck.AFAIK most modern IPTV setups require Quickleave anyway so I don't see that as being wrong to be honest.
My current setting is this:##------------------------------------------------------As you can see, this is not exactly what my ISP recommends, since it has quickleave enabled.
## Enable Quickleave mode (Sends Leave instantly)
##------------------------------------------------------
quickleave
phyint cxl1 upstream ratelimit 0 threshold 1
altnet 77.109.129.0/24
phyint vlan0.51 downstream ratelimit 0 threshold 1
phyint wg0 disabled
phyint cxl0 disabled
phyint vlan0.25 disabled
phyint vlan0.50 disabled
phyint vlan0.52 disabled
...
...
...
Quote from: jonm on April 12, 2026, 02:39:42 PMThere's a reasonably active init7 sub on Reddit, it may be worth also asking your question there?Aren't there any "German Tech Community Forums" that talk about this stuff very often ?