Go to Firewall: NAT: Port Forward and click on the plus sign (create new rule)1. Interface: LAN2. TCP/IP Version: IPv43. Protocol: TCP/UDP4. Source: any5. Destination/Invert: checked6. Destination: LAN address7. Destination port range: from DNS to DNS8. Redirect target port: DNS9. Description: whatever you want10. NAT reflection: DisabledSAVE/APPLY
I know. I gave my LAN IP 192.168.5.1/24
or 127.0.0.1 - for cases when you use multiple interfaces with multiple subnets and you create an "interface group" in the firewall, and create a single rule for this group containing all LAN subnets.
if we are using a internal active directory. do we have to add this rule and use the active directory ip 10.10.10.101 ?
the dns is working now or creating this rules would speed up things ?
3. If you have newer Intel CPU (so not an AMD) in the OPNsense box, most probably you can select as pattern matcher 'Hyperscan'. You will have to dmesg in the console to verify. If no SSE3 (so a newer Intel CPU), leave the default Aho-Corasick4. Select WAN and LAN in interfaces. If you have a PPPoE link, WAN won't work.
Do you use the URLHaus list? ATM it's too big and unusable.