Edit: I suspect I need a set of rules to say “allow inbound from 10.0.7.0/24 on tcp port 99443” and “deny/block pubic to all internal and all ports”? The last one assume should actually be the drop all/any rule at the end of the rule set. /end edit.
I am finally back home now with physical access to the box. I am at a loss though of how to log back in and make the change to the config of the HTTPS port back to the earlier xx443. I tried connecting via the specific admin LAN port I configured, but HAProxy applies same rules there. I also tried connecting via SSH but my user, whilst an admin, does not have root privileges and cannot edit the config.xml (that would be the easiest...).Currently a site access is captured by HAProxy and results in the 503 error. Any tips of how to regain access to make the change?
Next step would be to fix the issue that I cant access the gui via the subdomain of the dynamic dns provider I configured...
Does that DNS record resolve to your public IP?
If so you need to activate NAT loopbackb or create a DNS override for the same hostname that resolves to an internal IP where webui (or HAProxy) is listening.
QuoteDoes that DNS record resolve to your public IP?Checking with ping and tracert the dynamic dns name (mike0000.dynprovider.com) resolves to my WAN IP. Same for a subdomain (opnsense.mike0000....)QuoteIf so you need to activate NAT loopbackb or create a DNS override for the same hostname that resolves to an internal IP where webui (or HAProxy) is listening.How can I create the DNS override to resolve that hostname to an internal IP? I went to Services --> Unbound DNS --> Overrides and added an entry under both Host Overrides as well as Domain Overrides pointing at the IP, but still does not work (after restarting the service).Any idea or specific pointer? Thanks so far!
C:\>ipconfig /flushdnsWindows IP ConfigurationSuccessfully flushed the DNS Resolver Cache.C:\>nslookup opnsense.mike0000.dynprovider.comServer: pi.holeAddress: 192.168.5.95Non-authoritative answer:Name: mike0000.dynprovider.comAddress: [WAN IP ADDRESS]Aliases: opnsense.mike0000.dynprovider.comC:\>nslookup mike0000.dynprovider.comServer: pi.holeAddress: 192.168.5.95Non-authoritative answer:Name: mike0000.dynprovider.comAddress: [WAN IP ADDRESS]
C:\>nslookup mike0000.dynprovider.comServer: pi.holeAddress: 192.168.5.95Non-authoritative answer:Name: mike0000.dynprovider.comAddress: [WAN IP ADDRESS]C:\>nslookup opnsense.mike0000.dynprovider.comServer: pi.holeAddress: 192.168.5.95Name: opnsense.mike0000.dynprovider.comAddress: 192.168.5.1
C:\>ipconfig /flushdnsWindows IP ConfigurationSuccessfully flushed the DNS Resolver Cache.C:\>nslookup opnsense.mike0000.dynprovider.comServer: UnKnownAddress: 172.20.10.1Non-authoritative answer:Name: mike0000.dynprovider.comAddress: [WAN IP ADDRESS]Aliases: opnsense.mike0000.dynprovider.comC:\>nslookup mike0000.dynprovider.comServer: UnKnownAddress: 172.20.10.1Non-authoritative answer:Name: mike0000.dynprovider.comAddress: [WAN IP ADDRESS]
Also you never mentioned anything about pi-hole in your previous posts so for the future I'll pass on a great tip from the Zen of Python:Explicit is better than implicit