News:

Welcome to the Home Network Guy forum!

Main Menu
Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Home Network Guy

#31
An Ethernet drop is just what they call running an Ethernet cable down through walls (the cable is "dropped" down the wall).

If you don't feel comfortable with creating aliases, you could create 2 block rules for the em2 interface to block access to the em1 and em3 interfaces and put them before the allow all rule. So the rules for em2 could be:

(replace em1, em2, em3 with the names you use in OPNsense for those interfaces)

Interface: em2
Action: Block
Source: em2 net
Destination: em1 net

Interface: em2
Action: Block
Source: em2 net
Destination: em3 net

Interface: em2
Action: Allow
Source: em2 net
Destination: any

Repeat the process for the other 2 interfaces. You could always try accessing a device on each network to make sure everything is blocked properly.
#32
Sure!

IP addresses are assigned to every device on the network including routers and network switches.

A subnet is a network which has one more devices. The modern notation used for IPv4 networks is called CIDR (instead of using Class A, B, or C networks). For home networks it is common to use the 192.168.x.x addresses so a subnet could be defined as 192.168.0.0/24 or 192.168.1.0/24, etc. The /24 indicates that the last digit can be used for device addresses so for 192.168.0.0/24, you can have devices assigned to 192.168.0.1-192.168.0.254 (.0 and .255 are reserved for special use such as network broadcasts).

In OPNsense, you will see 2 gateways by default if IPv6 is enabled. One gateway on the WAN is used for IPv4 and the other is IPv6. IPv6 is the new protocol for IP addresses that allows for a much greater amount of IP addresses than IPv4. It is ok to have both enabled. Sometimes devices/software will prefer to use the newer IPv6 protocol if it's enabled. You have to keep that in mind when creating firewall rules. If you want to restrict the traffic for both IPv4 and IPv6 network traffic, you need to apply the rules to both protocols.

If you wish to see the names of the devices, you need to set the option to "register DHCP leases" and "register DHCP static mappings" on the "Services > Unbound DNS > General" page. This doesn't always guarantee you will see the hostname. I've had some devices not show up but most do. If you really want everything named better, you could create a static DHCP mapping for a device (once you have identified it) and you can set an IP address (outside of your DHCP IP address range you have set for the network) and a hostname. Sometimes the manufacturer will show up below the MAC address which could possibly help identify devices. Most devices provide a way for you to view the IP address (and sometimes the MAC address). That will help you find out which device has which IP address.

Please let me know if this info helps and if you have more questions!
#33
Yes, this is a subjective topic. However, what I have done to keep things simple is just select the rulesets that I wish to use and put them all in one policy. Since I am just setting all the rules which are enabled to "block", I do not really see a need to group them in separate policies since I don't make use of a lot of the filters. If I had more time, I could start to filter on the rules I'm most interested in using within each ruleset using the filters in the policy, but it's easier to just blanket it all in one policy for a home network. It doesn't seem to impact my network performance (especially since I'm just using it on the WAN, and I have less than 1 Gbit downstream). In the past before the policies were a feature, I manually searched for hardware/software products I didn't have on my network and disabled those rules to minimize the amount of rules that are active for performance, but I haven't noticed any issues just leaving them all enabled for the rulesets I have selected. I don't have every ruleset selected but I have a lot of them selected. I don't run it on extremely fast hardware, but it works very well especially considering I'm also running Sensei on my LAN interfaces.

If guessing makes you nervous, you could just try it out and then disable it if it is causing issues. In my experience, you may encounter more issues running it on the LAN rather than the WAN because it could end up blocking services you are trying to use (which isn't malware). You also have to make sure you turn on Promiscuous Mode and only select the physical LAN interface(s) if you plan to use it on the LAN because you will end up blocking access to all of your VLANs. That is the biggest issue you have to worry about (as far as I know). I've seen intrusion detection described as a "not fire and forget" solution because it requires monitoring and tweaking in order for it to be of the most benefit. I don't monitor mine as well as I should. Since I also have Sensei running, I have other protections in place (along with firewall rules, etc).
#34
Glad you found my site useful and a safe place for newbies!

Instead of having a separate switch in each room, you could have one switch in your closet. However, it means you would need to run an Ethernet drop for each device in all the rooms. It is easier to manage to have 1 centralized switch, but if your house isn't wired and you aren't willing or able to run more wires, the approach you are taking will work also!

Using a separate interface on the OPNsense box for each switch (like you are doing) is a better approach than chaining a bunch of switches. Chaining a bunch of switches introduces extra points of failure (if one switch dies) and could negatively affect performance. For a home network, if you have to chain a few switches in a few locations where it may be hard to run extra Ethernet drops, performance likely won't be terrible unless you are doing lots of high bandwidth file transfers at the same time, for example. I know some people may get upset if you chain switches, but sometimes it's just more convenient in a small home network (if it is found later that performance is an issue, then perhaps it would be worth the effort to run some extra Ethernet drops).

You mentioned wanting to use VLANs for improved security. If each of your rooms needs to be in a separate network, you don't necessarily need to use VLANs. Since they are on separate physical interfaces, you can simply keep the network traffic separated via appropriate firewall rules. If you want some devices in each room to be on the same network as devices in another room, then you could make use of VLANs to create a virtual network so the devices appear to be on the same network even though they may not be physically connected to the same switch.

With that said, for the em2 interface you mentioned there are no firewall rules on that interface. By default, any new interfaces (including VLANs) have no firewall rules. When there are no firewall rules, it means all traffic will be blocked. You need to add rules to allow network traffic. You will notice that the LAN has a default "allow all" rule which allows access to all networks and the Internet. If you want to isolate different networks, you need to modify the rules to allow access to the Internet but not other networks (unless you want them to have access to a local server, etc).

For testing purposes, you could mimic that allow all rule in your em2 interface to see if you can get access to the Internet. If that works, then you can work on locking down access between your interfaces. If you don't use VLANs, the configuration will be more simple but if you plan to setup VLANs, you have to set them up on the interfaces in OPNsense and your network switches. You also have to be careful not to lock yourself out when changing the VLANs on your switch/OPNsense. You will need to be connected to a port that's not on the VLAN you are trying to set up (VLAN 1 is a safe default since that is untagged traffic).
#35
Success Stories / Re: Thanks for the ToDo'S
August 30, 2021, 11:22:54 AM
I'm glad you found my site useful in helping you set up OPNsense for a small business! Also thanks for the tips for people using that particular hardware.
#36
Tech Discussions / Re: Opnsense + sensei vs untangle
August 30, 2021, 11:17:31 AM
I replied to this same question in the Disqus comments for Sensei, but for reference for others browsing the forum, here is what I wrote:

Quote
I've seen mentions of Untangle in some firewall discussions and also heard about it some on a Podcast. I'm not familiar with it in detail but it seems similar in features.

As for the differences, it may be a matter of preference. Untangle seems to be even more GUI focused/driven that OPNsense if that is something you prefer. OPNsense let's you tweak things outside of the GUI (not sure to what extent you can do that with Untangle). OPNsense is open source which can be beneficial. I'm not sure if it's easier to find online help with OPNsense vs Untangle and how each community compares. The OPNsense community seems to be very friendly and helpful.
#37
Quote from: Criss on August 19, 2021, 10:51:54 AM
I get my selective Routing now working with the Help of this Guide here

https://community.spiceworks.com/how_to/177167-policy-based-routing-via-vpn

best regards

Thanks for providing a link to help resolve the issue especially since I don't have a lot of experience with this yet, but I do want to experiment with connecting to external VPNs to help others get their VPN set up even if I do not plan to use a VPN for my own network.
#38
I personally haven't set up my OPNsense as a client to an external VPN service such as PIA, but it is certainly on my todo list to write about. There is enough interest in the topic, and I would want to see what I could learn along the way that I could share with others.

That said, I think that you may need to do that 3rd step in the pfSense documentation to add the outbound NAT rule. That is similar to how you need the outbound rule for running your own OpenVPN server so communication can occur between your network and your clients.

You will have to set your interfaces to use the VPN as the gateway so you can have some networks on the VPN and some that are not if you so desire.

I haven't gone through the entire process yet but I think that may be the general idea. I hope tot dig into it more when I get some time to work on it.

Thanks for posting this on the forum! I am hoping others with more knowledge in areas I haven't explored deeply will chime in with more information. It is why I established a forum rather than just rely on page comments (since it's harder to work through issues).

If the amount of feedback continues to grow in the future, it could get to the point where it will be too time consuming to respond to every single question. I get questions via email, Disqus comments, and the occasional forum post.
#39
Proposed Network Designs / Re: Just starting out
July 19, 2021, 09:28:29 PM
Thanks for sharing your proposed design! Once you can post a diagram that will be helpful in visualizing how the network is laid out.

It sounds like you are planning to connect 3 different switches — one to each port of your modem/router. How are you planning to do that? You mentioned you have cables ran so are you running 3 different cables to 3 different locations with a switch at each location?

While that will work, alternatively you could buy one larger switch (16 or 24 port), connect one cable to the switch from the modem/router and then connecting all your devices to that large switch. Of course that requires you to have more cables ran to the location of your switch. If you only have a couple Ethernet drops ran and it's too hard to run more, putting a switch at location is not necessarily a bad idea for a small, basic home network. Keep in mind that you will be sharing bandwidth if you put a switch at each location if you have multiple devices transmitting/receiving a lot of data.

If you want to separate your IoT or guest devices, you may want to get managed switches. It adds more complexity but it's nice to have for improved security. However you would need a router that supports VLANs. The Internet Service Provider's modem/router is not likely to support that type of more advanced functionality. It depends on how deep you want to jump into when creating your home network.
#41
Topic Suggestions / Re: OpnSense Howto Updates?
June 11, 2021, 04:23:01 PM
Thanks for the suggestion! The default direction is "in" for firewall rules and is what most users will want to use because it processes more efficiently and is likely easier to think about how to write the rules. When I specify settings for the rules, I usually leave out the values that should be left at the default (so I don't have to list 50 data elements and their values). However, I could make mention that you should usually leave that at the default.

I have been slowly working through my old guides and updating them. I've updated the following guides in the last few months: firewall rule cheat sheet, the Sensei Free vs. Home Edition comparison, how to configure WireGuard, and redirecting local DNS requests. Next on my list to update is the intrusion detection how-to since I know it's out of date. I'm trying to mix in new content in between updating the old content.
#42
How-to Discussions / Re: VLAN DHCP In OPNSense?
June 01, 2021, 07:30:52 PM
It looks like from the screenshot that you didn't create the same VLANs on your network switch. The VLAN IDs you defined in OPNsense needs to match the VLAN IDs on your switch. You need to make sure you have the proper ports selected as tagged and untagged ports for each VLAN you create. It's not a bad idea to configure your OPNsense/network switch from the default VLAN so you don't lose access to the web interfaces.
#43
Troubleshooting / Re: Opnsense content filtering
May 28, 2021, 12:38:16 PM
Yeah the documentation is lacking for several things. That is one thing that inspired me to create my site. Not just for OPNsense but for other more advanced home networking topics.
#44
Troubleshooting / Re: Opnsense content filtering
May 28, 2021, 11:15:11 AM
I just took a quick look and that is one of the lists on the Web Proxy help page on OPNsense so that means it is in the right format. I apologize since I haven't looked into implementing the Web Proxy in my network so I don't have much experience with it. I would like to explore using it at some point, but I thought for my purposes, it may be helpful for transparently caching commonly downloaded files so it more than one device on my network needs the same files to download, it will be quicker to hit the local cache.
#45
Troubleshooting / Re: Opnsense content filtering
May 28, 2021, 11:10:26 AM
It sounds like you are trying to use the Web Proxy for a blocklist. I haven't tried using the Web Proxy for this purpose. I have created a few block lists but created a firewall alias which updates periodically and use a floating rule to block that list for all of my internal networks. The blocklist I use for this is a simple text file with IP addresses -- one on each line. (One list is the Spamhaus block list: https://www.spamhaus.org/drop/drop.txt)

When looking at that list you linked to, it is in a specific format that may only work for Squid and other types of firewall plugins/features that recognize that format. I don't know if the Web Proxy supports blocklists in that format.