client setup: 192.168.0.x(Corp net) ----- 10.10.10.x (DMZ network)The default rules allow all networks to access each other until you enter some block rules.
Quote from: cs@ithandsfree.com on November 12, 2021, 10:40:53 pmclient setup: 192.168.0.x(Corp net) ----- 10.10.10.x (DMZ network)The default rules allow all networks to access each other until you enter some block rules. In fact not true. The basic philosophy of OPNsense is that, with limited exceptions like for DHCP and ICMP, traffic between subnets/VLANs is blocked by default.It is true that the LAN interface is created with two allow any rules for IPv4 and IPv6 - basically to ensure that OPNsense works out of the box. But any other interface/VLAN created does not have any allow any rules, and so virtually all traffic from those subnets is blocked by default.I’m not sure how helpful it is to be repeating the same info in different threads when the focus of the OP question is on other issues, eg double NAT in this thread or SNAT in another thread? No doubt you are keen to promote your business but I don’t think this is the place for that. Just sayin’…
You can keep repeating the same thing, but it is still not true.Even the GUI tells you are wrong - have a look at the bottom of the Rules page for each interface: “Everything that is not explicitly passed is blocked by default.”Yes, with the default LAN “allow to any” rules, anything coming into the LAN interface will be allowed anywhere, including to the DMZ subnet. But the reverse does not apply (other than of course stateful replies to incoming LAN traffic).Outbound NAT has nothing to do with it. The automatic Floating rules block everything into an interface by default (with limited exceptions), and allow everything out of an interface by default (coz OPNsense’s default policy is to filter inbound).
Hello, I am experimenting with OPNsense and I want to route between 2 private subnets192.168.50.x/24 192.168.60.x/24.there is a web server in the second subnet for testing purposes.I have port forwarded ports 80 and 443 from first subnet to the second one and made no other rule changes but I can't access it I get a default deny rule from the web server to the FW IIRC.What kind of options should I make sure that I check for this scenario?What do I do with double NAT? What options do I have?Cheers,
In fact I have in the past when they had issues with accessing their webserver. They have some funky virtualised setup that seems to cause odd behaviour (the reference to double NAT is a clue). It’s probable their issues are not related to OPNsense, either in part or at all. Too difficult to troubleshoot all the variables with limited info
i had similar issues quite some time ago.as far as i remember, in the end i just had to define a rule on the interface where the host, launching the connection was attached, to allow traffic from the source host to the destination host.there was no nat/pat or things like that involved. so the destination host sees the source host (with it's ip address) as a sender. i.e. it needs to accept a request from an ip in a "foureign subnet".but i don't remember all the details as it's too long ago. i just remember that the way it is done is completely different from the FW i had before, and therefore it took me quite long to find the right way to go.