Quote from: notspam on Today at 12:04:18 AMYou should correct the thread title.
The actual title is not the real situation.
There is no way readable you described in the past with a hack concerning opnsense.
So be so serious and change the title to whatever, i was hacked or so.
Quote from: Monviech (Cedrik) on March 05, 2026, 10:29:05 PMIt's a deliberate design choice.
Quote from: nero355 on March 04, 2026, 10:01:50 PMYou only need to catch DNS traffic NOT going to your DNS Server IP (in this case OPNsense) and not ALL DNS traffic ;)
Quote from: nero355 on March 04, 2026, 10:01:50 PMYou could create an Alias or maybe there is one already ?
USWProMax16PoE-US2.7.1.26# swctrl vlan
Usage: swctrl vlan show id PORT_ID
where PORT_ID := a list of target port, e.g., 3 or 5-7 or 1,4,9-12
USWProMax16PoE-US2.7.1.26# swctrl vlan set
swctrl[4597]: [error] swctrl.unknown_command(): Command "set" is unknown. Try option "help"
USWProMax16PoE-US2.7.1.26# swctrl vlan help
Usage: swctrl vlan show id PORT_ID
where PORT_ID := a list of target port, e.g., 3 or 5-7 or 1,4,9-12
USWProMax16PoE-US2.7.1.26# swctrl port help
Usage: swctrl port set { up | down } [ id PORT_ID ]
swctrl port restart id PORT_ID [ interval SECONDS ]
swctrl port clear counters [ id PORT_ID ]
swctrl port show [ id PORT_ID ] [ detail ]
counters [id PORT_ID]
mirror
where PORT_ID := a list of target port, e.g., 3 or 5-7 or 1,4,9-12