QuoteA dynamic range like 192.168.1.100-192.168.1.199 and a reservation like 192.168.1.101 are valid and there will be no collisions.
The reservation can also be outside the dynamic range, but it is not recommended for simple setups as the dynamic dns registration with dhcp-fqdn will not work correctly.
Quote from: nero355 on February 08, 2026, 07:02:42 PMSo just to be sure :Yes, the opnsense-bootstrap script uninstalls all packages and re-installs them afresh. You can select the major release branch to install, or can select snapshot mode to install from the latest development branch. The process is pretty much automated and quite sleek. :-)
After logging into your OPNsense via SSH and after succesfull outcome of the procedure the file integrity of the system should be restored to safely enough reboot into the latest version ?
If so : NICE!!! :)
[lisa@Legion-Pro-5 ~]$ nmap 192.168.10.90-254
Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-02-08 15:25 MST
Nmap scan report for ESP8266-5.flack.net (192.168.10.93)
Host is up (0.038s latency).
All 1000 scanned ports on ESP8266-5.flack.net (192.168.10.93) are in ignored states.
Not shown: 1000 closed tcp ports (conn-refused)
Nmap scan report for ESP8266-7.flack.net (192.168.10.94)
Host is up (0.038s latency).
All 1000 scanned ports on ESP8266-7.flack.net (192.168.10.94) are in ignored states.
Not shown: 1000 closed tcp ports (conn-refused)
Nmap scan report for ESP8266-8.flack.net (192.168.10.95)
Host is up (0.0066s latency).
All 1000 scanned ports on ESP8266-8.flack.net (192.168.10.95) are in ignored states.
Not shown: 1000 closed tcp ports (conn-refused)
Nmap scan report for 192.168.10.200
Host is up (0.0049s latency).
Not shown: 999 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
Nmap done: 165 IP addresses (4 hosts up) scanned in 140.01 seconds
[lisa@Legion-Pro-5 ~]$ Quote from: miketubby on February 08, 2026, 02:49:57 PM... so if 'vv' is 20 then it's on VLAN20 - just makes it easy to remember.... Keeps everything memorable.
Quote from: Kornelius777 on February 08, 2026, 04:27:24 PMToday, I have re-installed my firewall.Read the documentation carefully : https://docs.opnsense.org/manual/dnsmasq.html
What will I need to change so that the CNAME will be resolved?
Quote from: sstaible on February 08, 2026, 09:23:21 PMWhile migrating my static host entries I added some alias and cname records. However they don't resolve.Please also check the above :)
Quote from: LisaMT on February 08, 2026, 09:42:17 PMDNSmasq has always given me issues. I only run unbound and it resolves everything on my network. For duplicates (like multiple names for a server), I just put an entry in Unbound/overrides.NOFI but IMHO nothing but User Error probably :)
error: read (in tcp initial): Connection reset by peer for 192.168.20.X port #Quote from: planetf1 on February 08, 2026, 06:56:53 PMSo I thought I should setFor what it's worth =>
edns-buffer-size: 1232
msg-buffer-size: 8192
but had trouble figuring out how to inject these values. Eventually for a test I just edited config /var/unbound/unbound.conf directly and sent a SIGHUP.
Still the error. Then checking the unbound docs at https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound.conf.html it seems as if the default for edns-buffer-size and max-udp-size is already 1232 - as an outcome from DNS flag day. Yet it doesn't seem this way
Has anyone figured out this can of worms?
# Reduce EDNS reassembly buffer size.
# IP fragmentation is unreliable on the Internet today, and can cause
# transmission failures when large DNS messages are sent via UDP. Even
# when fragmentation does work, it may not be secure; it is theoretically
# possible to spoof parts of a fragmented DNS message, without easy
# detection at the receiving end. Recently, there was an excellent study
# >>> Defragmenting DNS - Determining the optimal maximum UDP response size for DNS <<<
# by Axel Koolhaas, and Tjeerd Slokker (https://indico.dns-oarc.net/event/36/contributions/776/)
# in collaboration with NLnet Labs explored DNS using real world data from the
# the RIPE Atlas probes and the researchers suggested different values for
# IPv4 and IPv6 and in different scenarios. They advise that servers should
# be configured to limit DNS messages sent over UDP to a size that will not
# trigger fragmentation on typical network links. DNS servers can switch
# from UDP to TCP when a DNS response is too big to fit in this limited
# buffer size. This value has also been suggested in DNS Flag Day 2020.
edns-buffer-size: 1232So you should definitely include it in your configuration file :)