Home Network Guy
Home Network Guy
  • Видео 68
  • Просмотров 683 496
DIY Intel N100 Rackmount OPNsense Router Firewall (or Lightweight Server)!
Let's build an Intel N100 2U rackmount system that can be used for OPNsense or as a lightweight server!
If you are looking to build a custom, energy efficient, rackmount system, this video shows one example you could consider!
I plan to use this build in a future video when I do an updated full network build guide.
In the long term, I plan to use 2 of these rackmount systems as 2.5/10G throughput testing clients on my network since I do not have extra mini-PCs with 10G interfaces for testing new hardware (because those systems are powering my main network and lab network!).
Disclosure: This is not a sponsored video! I bought or already owned the hardware used in this project.
My Amazon affili...
Просмотров: 8 252

Видео

A Raspberry Pi Sized x86-64 SBC / OPNsense Example using a Single NIC!
Просмотров 4,9 тыс.Месяц назад
Wish you could have a single board computer (SBC) with the same form factor as the Raspberry Pi but was x86-64 instead of ARM? Radxa has created the first x86-64 SBC (that I am aware of) that mimics the form factor of the Raspberry Pi 4 with their X4 model. I thought it would be fun to demonstrate using OPNsense with a single NIC since I have not yet created any guides using a single network in...
Full Stack Grandstream Network!
Просмотров 1,1 тыс.Месяц назад
In this video I take a look at a full stack Grandstream network to demonstrate how you can manage all of Grandstream devices from a single pain of glass similar to other vendors. With Grandstream, you can manage the hardware using their new convergence devices such as the GCC6010, but you have other options as well: cloud managed, self-hosted software controller, local web interface on each dev...
XikeStor 12-Port 2.5G 10G L2 Managed Switch!
Просмотров 2,2 тыс.Месяц назад
If you are looking to get a L2 managed switch with 2.5/10G interfaces which has more than 6 ports at a budget friendly price, you may want to check out the 12-port XikeStor 2.5/10G managed switch! This switch is a rack mount switch but you can also use it on a desktop or mounted to the wall. In this video, I discuss various details about the network switch and show some of the more important fe...
Securely Access Your Home Network with WireGuard VPN on OPNsense
Просмотров 13 тыс.2 месяца назад
If you wish to access apps, services, and other devices on your home network remotely, you may set up a VPN server on your network. #OPNsense includes options for IPsec, OpenVPN, and WireGuard VPN. In this video, I will be demonstrating how to set up Wireguard VPN using the latest version of OPNsense and WireGuard. I will also show how to access a hosted web app behind the virtualized instance ...
ZimaBlade - TrueNAS Replication Target
Просмотров 2 тыс.3 месяца назад
Have you wanted to set up a low power, TrueNAS replication target so you may have an additional replicated backup on your network? In this video, I demonstrate how to set up a second TrueNAS Scale installation and configure it to be used as a replication target. IceWhale Tech sent me their #ZimaBlade 7700 to try out. The ZimaBlade is essentially a smaller form factor, lower cost version of the ...
Creating a Basic 3 Node Proxmox Cluster!
Просмотров 4,2 тыс.3 месяца назад
In this video, I finally finish creating a basic 3 node Proxmox cluster! It has been on my todo list for a while so I am glad the project is completed. I already had 2 independent Proxmox servers on my network (one hosting all my apps/services and one hosting primarily Home Assistant so it would stay online when I took my main server down). Therefore, it made sense to add a 3rd node to create a...
Build a Standalone Plex Media Server/Media Player for Your TV!
Просмотров 9 тыс.4 месяца назад
If you have wanted to build a Plex Media Server but want to use the same system to also view the media on a TV, I walk through the process in this video using the Protectli V1210! I will demonstrate how to set up Plex Media Server as well as the Plex HTPC app on Ubuntu 24.04. The V1210 has the Intel N5105 CPU and 4 GB of soldered RAM (so it's not expandable). However, the N5105 supports hardwar...
Prepping for the transition to a Proxmox cluster!
Просмотров 2 тыс.4 месяца назад
For those interested in creating a Proxmox cluster, I thought some intermediate steps I am taking to migrate to a Proxmox cluster comprised of several mini-PCs which will be replacing my old, more power hungry Proxmox server. I realize that clusters aren't for the average home network, but I'm planning to keep it relatively simple for now with Proxmox by only leveraging some replication of my O...
Tometek TC300 TTG Mini-PC/Server
Просмотров 1,3 тыс.4 месяца назад
Tometek sent me their TC300-TTG system for me to check out. This box is interesting because it has 4 SFP 10Gbps interfaces as well as an Intel Atom C3758R CPU. This will be first system with an a modern Atom processor that I get to test. One interesting aspect is that this system does not have an integrated GPU so it means you have to use the serial console in order to install operating systems...
Budget Friendly 2.5/10G SODOLA Switches!
Просмотров 5 тыс.4 месяца назад
SODOLA reached out to me to take a look at a couple of their 2.5/10G network switches. These switches are budget friendly and great if you are looking for affordable switches with faster than 1G network interfaces for your home network/homelab. The 5 port 2.5G switch is a basic unmanaged switch while the 6 port 2.5/10G switch is a web managed switch, which means it means it supports more advanc...
Speed Testing the EnGenius EWS276-FIT Wireless Access Point!
Просмотров 5594 месяца назад
In this video I take a look at the EnGenius EWS276-FIT, the web management interface, and finally a couple of speed tests to demonstrate its performance. The FIT line is designed more for home/SOHO users so it does not have all of the enterprise features, which makes these APs more budget friendly. However, the APs still support some advanced features such as VLANs. Disclaimer: EnGenius sponsor...
PC Builds with be quiet! Cases, CPU Coolers, and Power Supplies
Просмотров 6335 месяцев назад
PC Builds with be quiet! Cases, CPU Coolers, and Power Supplies
Addendum: Virtualizing OPNsense on Proxmox as Your Primary Router
Просмотров 6 тыс.5 месяцев назад
Addendum: Virtualizing OPNsense on Proxmox as Your Primary Router
Virtualizing OPNsense on Proxmox as Your Primary Router
Просмотров 77 тыс.5 месяцев назад
Virtualizing OPNsense on Proxmox as Your Primary Router
Introducing the Protectli VP6650!
Просмотров 4,7 тыс.6 месяцев назад
Introducing the Protectli VP6650!
EnGenius ECP106 PDU
Просмотров 5956 месяцев назад
EnGenius ECP106 PDU
Caddy Reverse Proxy using DNS Challenges and CrowdSec Multi-Server Config with OPNsense
Просмотров 11 тыс.6 месяцев назад
Caddy Reverse Proxy using DNS Challenges and CrowdSec Multi-Server Config with OPNsense
Configuring a Management VLAN
Просмотров 16 тыс.7 месяцев назад
Configuring a Management VLAN
EnGenius 1G PoE Managed Switches (ECS1112FP & EXT1105P)
Просмотров 5067 месяцев назад
EnGenius 1G PoE Managed Switches (ECS1112FP & EXT1105P)
Grandstream GWN7806P/GWN7806 48-Port Switches
Просмотров 9457 месяцев назад
Grandstream GWN7806P/GWN7806 48-Port Switches
Fundamental Network Interface Configuration in Proxmox
Просмотров 26 тыс.8 месяцев назад
Fundamental Network Interface Configuration in Proxmox
The ZimaBoard 832!
Просмотров 1,3 тыс.9 месяцев назад
The ZimaBoard 832!
Captive Portal Configuration in OPNsense
Просмотров 7 тыс.9 месяцев назад
Captive Portal Configuration in OPNsense
Server Rack Tour (2023) (Part 2)
Просмотров 3,1 тыс.10 месяцев назад
Server Rack Tour (2023) (Part 2)
Chamberlain myQ Garage Door Opener Alternative!
Просмотров 10 тыс.11 месяцев назад
Chamberlain myQ Garage Door Opener Alternative!
Beginner's Guide to Set up a Full Network using OPNsense
Просмотров 70 тыс.11 месяцев назад
Beginner's Guide to Set up a Full Network using OPNsense
EnGenius Cloud Managed Wireless Access Points
Просмотров 83511 месяцев назад
EnGenius Cloud Managed Wireless Access Points
Set up a Full Network using OPNsense (Part 4: UniFi Wireless AP)
Просмотров 9 тыс.Год назад
Set up a Full Network using OPNsense (Part 4: UniFi Wireless AP)
Set up a Full Network using OPNsense (Part 3: UniFi Switch)
Просмотров 8 тыс.Год назад
Set up a Full Network using OPNsense (Part 3: UniFi Switch)

Комментарии

  • @DrR0B0TN1K
    @DrR0B0TN1K 35 минут назад

    I work with clients that have Cisco switches, and have been remotely managing them for about 2 years now. The interface is really nice and intuitive. So of course, I bought a cheap 16port Dell X1018 thinking it would be just as easy to set up - nope! Probably going to sell it and pick up a CBS350 16port instead, since I'll be at least somewhat familiar with the management interface! Excellent content btw, I'm learning a ton from your OpnSense guide!!

  • @McWizardly
    @McWizardly 3 часа назад

    I'm confused why you would need to allow access to dns if you have a default allow lan rule ? ruclips.net/video/nlJTz2Am6lc/видео.html

    • @homenetworkguy
      @homenetworkguy 3 часа назад

      I had the default rules disabled (noticed they are grayed out) because I am no longer using the allow all rules to tighten up the rules (isolating the networks from one another).

  • @stephendetomasi1701
    @stephendetomasi1701 23 часа назад

    Sadly this guide did not work well for me. Was able to connect but no access to my LAN. Frustrating.

    • @homenetworkguy
      @homenetworkguy 22 часа назад

      I’m not sure why but for some users WireGuard can be difficult to get set up. Sometimes the ISP blocks the default port 51820, some users say creating a normalization rule worked for them (while others say they don’t need it, like myself), sometimes restarting the WireGuard service needs restarted (some uses reboot OPNsense), and when adding new peers you have to click Apply Changes or the new peers can’t connect. If you are actually connecting to your WireGuard VPN remotely and are actually connected properly (it’s hard to tell with WireGuard client unless you can see the handshake in the logs in OPNsense), it should be a matter of configuring firewall rules (assuming the LAN IPs are in the allowed IPs of the WireGuard peer). There’s several things that can go wrong but once it’s up and running it’s pretty solid in my experience.

  • @acehoodman
    @acehoodman 2 дня назад

    No management VLAN config = not secure = no buy. Sadly it's the same with all the cheap managed switches from China (Soloda, Mokerlink, Nicgiga, aso.) as they use the same GUI and Firmware. They don't even support HTTPS...

    • @homenetworkguy
      @homenetworkguy 2 дня назад

      Yeah, I know what you mean. I like using them in a lab environment when testing. You can technically assign the switch's IP address to be in the "management network" so that it's only accessible on that network (if the management network is untagged), but that's not always a good solution. I wish it at least had HTTPS for entering credentials. I haven't checked to see if there are any new firmware updates that adds any of those features. They added link aggregation in a firmware update so you would think it would be possible for other features as well. I use Grandstream switches for my primary network.

    • @acehoodman
      @acehoodman 2 дня назад

      @@homenetworkguy Well another issue that users have reported is that the Management interface (MokerLink switch is this case) was accessible from other vlans as long as you know the IP. That's a real security issue in my opinion! Could be a firmware bug and I don't know if they fixed it this issue via firmware update yet but that's a real "No-Go" in my book. You could harden the security via main router/firewall rules but this is still very concerning for a managed switch!

    • @homenetworkguy
      @homenetworkguy 2 дня назад

      A lot of devices are like that if there are no firewall rules on the router/firewall to prevent the inter-VLAN traffic (and there is no local firewall installed). However I do know that some managed switches don’t allow that traffic from another subnet/VLAN by default even if the firewall rules on the router/firewall allows it (I discovered this with the TP-Link switch I had a while ago). Anyway it’s certainly a concern with these switches if you’re worried about security.

    • @acehoodman
      @acehoodman 2 дня назад

      @@homenetworkguy U might be right but this isn't the proper behaviour for any decent L2 managed Switch imo. I do remember that some cheap managed L2 switches from TP-Link were also locked to vlan1 for management without the option to change it but a wide open web GUI on all configured vlans is something else if u ask me and even the cheap TP-Link switches from 5+ years ago didn't had this issue if I remember correctly. I would also highly recommend to restrict WAN Access for this kind of switches (I actually do this with all my switches, even with my rather expensive L3 Cisco ones... Better safe than sorry at the end). Anyway thanks for ur test and feedback! If u ever find a cheap L2 managed 2.5G switch that got the option to configure a management vlan please let us know (https support and/or SSH support would be the cherry on top) 😉

    • @homenetworkguy
      @homenetworkguy 2 дня назад

      For the TP-Link switches I had (the L2 switches, not their cheap easy managed switches), I had to create interfaces on the switch if I wanted to access the interface on different VLANs. I think the management VLAN could be set to but I'd have to go back to see. Not sure if this falls in the "cheap" category (since it's $219 on Amazon right now but sometimes can be lower like $199)-- I also recently took a look at the 12 port 2.5/10G XikeStor switch which allows you to set the management VLAN and has HTTPS. Someone said the interface and features reminded them of a managed Netgear switch (I haven't tried those models to compare it to a Netgear switch): ruclips.net/video/Jgz0o_1m3qw/видео.html

  • @AnnatarTheMaia
    @AnnatarTheMaia 2 дня назад

    The DHCP protocol RFC specifies that the DHCP client is supposed to solicit address offers, which implies that multiple DHCP servers should be on the network, and indeed, if one is managing one's network with the dynamic host configuration protocol, one should have as many DHCP servers as possible to increase redundancy and availability, but no less than three (so there can always be quorum).

    • @homenetworkguy
      @homenetworkguy 2 дня назад

      When I say you shouldn’t have multiple DHCP servers on the same network, I’m not referring to high availability but rather 2 different DHCP servers running on 2 different systems not in a HA configuration. There will be conflicts of IP address assignments if you have a rogue DHCP server running on the network if they’re using the same IP ranges. I imagine there are ways to mitigate this but I’m always speaking from a home network context (hence the name of the channel). You don’t really need have a minimum of 3 DHCP servers on a home network (I’m counting DHCP listening on multiple interfaces in OPNsense as one DHCP server). I’ve survived 25+ years of home networking using a single DHCP server. Typically I have other problems that are not DHCP related.

    • @AnnatarTheMaia
      @AnnatarTheMaia 2 дня назад

      @@homenetworkguy that's exactly what I wrote about: one should have multiple DHCP servers for the same network, even if that network is a home network. The challenge, of course, is keeping them in sync. I keep my configuration packaged in OS packaging format in Git, so when I modify it, I bump the package revision and upgrade the configuration package on all the DHCP servers. Problem solved!

    • @homenetworkguy
      @homenetworkguy 2 дня назад

      Yeah, that's a great solution for high availability, but I typically throw out the general warning that if you spin up another OPNsense or plug another device on the network which has its own DHCP server running on the network (that is NOT synchronized) that it could cause problems. What you are describing is syncing up the DHCP servers which is an intentional action to have redundancy on the network, which is not a bad idea for improving the reliability of the network when services or hardware fails, and shouldn't cause problems on the network when implemented properly. I've spun up VMs and or connected another OPNsense box to the network when testing and it would temporarily disrupt my network until I disconnected it because I accidentally connected the wrong interfaces or had some configuration incorrect.

  • @AnnatarTheMaia
    @AnnatarTheMaia 3 дня назад

    If you want to do this with VM's, I strongly suggest using Triton on SmartOS instead: you get IPFilter, Solaris zones technology, mdb, DTrace, ZFS, Fault Management Architecture (FMA), Service Management Facility (SMF, like systemd but way better) and the Crossbow network virtualization, which allows one to create virtual switches and routers, and yet everything runs on bare metal because Solaris zones virtualize the kernel and not the hardware (and yet still enable one to virtualize other operating systems like Windows, GNU/Linux and FreeBSD with both KVM and Bhyve).

    • @homenetworkguy
      @homenetworkguy 2 дня назад

      Yeah there are lots of solutions out there you can run but the video is not focused on the option you described. Thanks for the suggestion though. I can look into to it further at some point.

    • @AnnatarTheMaia
      @AnnatarTheMaia 2 дня назад

      @@homenetworkguy that'd be cool, another step-by-step video.

  • @Kattakam
    @Kattakam 3 дня назад

    Too many video cuts that’s not spliced good. Some technical aspects weren’t explained correctly like the purpose of using intel nic chipset and not realtech or other nic manufacturers with services and hardware offloading vs software offsets. I would’ve really like to see why buying this over netgate made sense.

    • @homenetworkguy
      @homenetworkguy 3 дня назад

      Sorry about that. I didn’t really intend to compare the difference between other brands. That is a good point about Intel vs Realtek for pfSense/OPNsense. I’m hoping to improve as I make more videos.

  • @vaughnbay
    @vaughnbay 4 дня назад

    7:25 ".....you'll see the zone id and the account id there....." Has this changed? I do not see an account id.

    • @homenetworkguy
      @homenetworkguy 4 дня назад

      This is the Cloudflare dashboard so if you’re using Cloudflare as your DNS registrar, the account ID should be listed on the right hand side of the page after you click on your website domain name from the dashboard. I just checked and it looks the same.

  • @al-souniibrahim5772
    @al-souniibrahim5772 4 дня назад

    Hi HomeNetwork i configured the OPNsense Captive Portal for my network, but I’ve encountered a challenge. After completing the setup, the captive portal login page does not automatically pop up in users' browsers when they connect to the network. Despite following the configuration steps and ensuring that the necessary settings are in place, users are not being redirected to the captive portal as expected. I would appreciate your assistance in resolving this issue and would be grateful if you could guide me through any additional steps or troubleshooting methods that I may have overlooked. Looking forward to your guidance.

    • @homenetworkguy
      @homenetworkguy 4 дня назад

      Did you try disconnecting and reconnecting users on the network where the captive portal is enabled?

  • @lencumbow
    @lencumbow 4 дня назад

    Clear as mud. You never really made it clear when to use floating vs. group.

    • @homenetworkguy
      @homenetworkguy 4 дня назад

      I rewatched part of the video to make sure I didn’t forget to include examples but I had a few examples in the video. If you have the same set of rules you wish to apply to multiple interfaces, consider using firewall groups- it reduces repetition of the same rules across multiple interfaces. If you wish to apply rules across the entire network, floating rules is a good option. I like using it for things such as allowing the iperf3 port on the entire network so I can speed test between all of my internal networks without needing to create rules all the time. You can use them for IP block lists to block malicious IPs across the entire network. I like allowing SSH across all internal networks as well so it works nicely as a floating rule. However floating rules do allow you to select specific interfaces to apply the rules. You can basically achieve the essentially the same thing with floating rules as firewall groups. One benefit of firewall groups is that you get autogenerated aliases for “address” and “net” like you do with other interfaces such as LAN address and LAN net.

  • @geekcruz
    @geekcruz 5 дней назад

    Awesome video, worked perfectly for me. I don't know if you noticed as well the plugin for OPNSense for caddy?

    • @homenetworkguy
      @homenetworkguy 5 дней назад

      Yes. I made this video like 1 week before the plugin came out. Haha. I personally prefer not to run it on the firewall because I worry about what happens if the reverse proxy gets compromised. The good thing about doing it this way is you can the proxy on a DMZ network and keep it isolated from the rest of your network. However someone assured me that it may not be that bad since it may be a less privileged user or the plugin runs in a jail or jail-like environment. I can’t recall the details off the top of my head.

  • @TheDropForged
    @TheDropForged 5 дней назад

    I also have bought 1U server case to swap my zimaboard pfsense to rack mount. I am also planning to get N100 topton motherboard off aliexpress. I have been using Topton N5105 as NAS, for more than a year without any issue.

    • @homenetworkguy
      @homenetworkguy 5 дней назад

      Nice! These low power systems are pretty great to run pfSense and other software.

  • @KR1SR1GH7
    @KR1SR1GH7 5 дней назад

    Great vid looking forward for next vid

  • @EA-Agent
    @EA-Agent 6 дней назад

    The handshake was not completed after I followed your guide. ZenArmor is running, but I don't think it affects the VPN. :(

    • @homenetworkguy
      @homenetworkguy 5 дней назад

      Some users stated they needed to do the normalization rule from the official OPNsense documentation. I’m not sure why but perhaps it’s for those who have ISPs which use different MTU values. Also make sure that port 51820 is not blocked by your ISP. On one network I set up WireGuard, I simply changed the port yo 51821 and it worked just fine. It’s annoying when ISPs block incoming ports like that.

    • @EA-Agent
      @EA-Agent 5 дней назад

      @@homenetworkguy Thank you! :)

  • @ChrisVirgilio
    @ChrisVirgilio 6 дней назад

    Do you think an N100 is really powerful enough to saturate a 10g SFP+ connection up and down? That’s my real concern.

    • @homenetworkguy
      @homenetworkguy 6 дней назад

      For a single 10G interface for speed testing and file transfers over the network, yes! So it’s fine as a desktop client or lightweight file server. If you’re doing IDS/IPS that’s is very CPU intensive with something like pfSense or OPNsense, not a chance. I’ve tried Zenarmor for example with OPNsense on an i5-1235U CPU which is much more powerful than the N100 and I could only get 4-5Gbps. If you’re not doing IDS/IPS, you should be able to route across 2 interfaces at 10G. Routing by itself is not as CPU intensive as IDS/IPS and VPNs.

    • @ChrisVirgilio
      @ChrisVirgilio 6 дней назад

      @@homenetworkguy my use case would be a local home network with a nas and client pc w/ 10gps connections while the rest are basically all 2gbps. My internet will be 2gbps fiber.

    • @homenetworkguy
      @homenetworkguy 6 дней назад

      Nice. As a client or light weight NAS, I imagine the N100 would be fine. I haven’t tested it with TrueNAS yet but it should be fine because it’s not the most CPU intensive especially if you’re not running apps on TrueNAS and for a home network.

  • @greymatter-TRTH
    @greymatter-TRTH 7 дней назад

    I just subscribed. 🙃

  • @drbyte2009
    @drbyte2009 8 дней назад

    I recently discovered this channel. I really love your tutorials, they are great!!!!!,. especially the ones on OPNSense, i almost watched them all. I would love to see a guide on how to setup OPNsense as a transparant bridge. I know there are a few on youtube, but the ones i found are far from perfect.

    • @homenetworkguy
      @homenetworkguy 8 дней назад

      Thanks! I appreciate you enjoy them!I’m working to ramp up quality as you can see in this most recent video. I have received several requests for a transparent filtering bridge guide. Seems like the demand for such a configuration has increased since Dave’s Garage released his video. I have yet to try it out, but I want to make sure I get it right when I do the video.

    • @drbyte2009
      @drbyte2009 8 дней назад

      @@homenetworkguy I was indeed also triggered by the video from Dave's Garage, but there are some minor hickups in that video. I managed to set it up(as a vm in proxmox on a MS-01), and i use that setup now in a test environment at the moment, but i think that i clould be done better 🙂

  • @greymatter-TRTH
    @greymatter-TRTH 8 дней назад

    Your accent makes me go insane. My brain keeps thinking you're asking something.😂😂😂

    • @homenetworkguy
      @homenetworkguy 8 дней назад

      Sorry. It’s also probably how I had to cut the video in certain places and how I end sentences with an inflection when I’m not supposed to. I’m trying to improve this over time. It’s tough speaking to a camera. Some people make it look easy. Haha.

    • @greymatter-TRTH
      @greymatter-TRTH 7 дней назад

      @@homenetworkguy No, man. You are fine. No need to apologize. Your video is fine and so is your accent. Being humble is a nice attitude to have, so 👍. Your video is great. I didn't notice anything about any cuts. You're fine. You took time to do something useful for the internet. Useful stuff. Thanks!

  • @CharizardSnyper
    @CharizardSnyper 8 дней назад

    Quick question, how do i get opnsense to handout dhcp addresses to the vlan networks? I've set up the necessary firewall rules (the ones shown in this video, dns and private networks) in opnsense, trunked the traffic to my switch and then configured the unifi ap with the necessary vlans. It was working for a days then it just stopped after a few days. I can connect to the vlan networks (guest/iot) with my phone but the gateway doesn't hand out addresses. Thought it was the AP first but when i tried setting up a HA vm with the vlan tag, the vm did not get an ip address. I've also gone into the dhcp leases in opnsense and added an IP address to the HA vm using the mac address but that still didn't work.

    • @homenetworkguy
      @homenetworkguy 8 дней назад

      I’m assuming you have the DHCP server running on each of the interfaces? You have to make sure you don’t forget to check the box at the top of the DHCP page for each interface if you’re using the default ISC DHCP (I have forgotten to do that sometimes). It’s not enabled by default as you likely saw in the video. One other thing I can think of is that the VLAN configuration is not quite right. That can cause issues with getting IPs assigned.

    • @CharizardSnyper
      @CharizardSnyper 8 дней назад

      @@homenetworkguy I’m assuming you have the DHCP server running on each of the interfaces? correct. You have to make sure you don’t forget to check the box at the top of the DHCP page for each interface if you’re using the default ISC DHCP (I have forgotten to do that sometimes). It’s not enabled by default as you likely saw in the video. dhcp is enabled for all vlan interfaces with the dns server pointing to my pihole. One other thing I can think of is that the VLAN configuration is not quite right. That can cause issues with getting IPs assigned. That was my first assumption and then came back to your video to rehash the vlans set up and firewall rules. Will zenzrmor block traffic if I set it up to monitor the lan and vlan networks?

    • @homenetworkguy
      @homenetworkguy 8 дней назад

      Zenarmor shouldn’t block everything by default but you could try minimizing points of failure by setting up the bare minimum settings and then work from there. I’m trying to think of other things that could go wrong (without being able to view all of your configuration in more detail).

    • @CharizardSnyper
      @CharizardSnyper 7 дней назад

      @@homenetworkguy Tried removing the vlans from zenanrmor but that didn't do anything. I do have a snapshot of a fresh install with vlans, firewall rules and dhcp leases configured but that's my last resort for now (cant remember if i took the snapshot with the pppoe credentials or not). Here is a wall of text also know as my settings Vlan Interfaces: Enable Interface - enabled Prevent interface removal - checked ID - n/a Device - n/a Description - n/a Block private networks - unchecked Block bogon networks -unchecked IPv4 Configuration Type - static IPv4 IPv6 Configuration Type - track interface MAC address - blank Promiscuous mode - unchecked MTU - blank MSS - blank Dynamic gateway policy - unchecked IPv4 address - using subnets .10 (impi), .20 (iot), .30 (guest) and .40 (dmz) IPv4 gateway rules - disabled Parent interface - nothing selected Assign prefix ID - 0 Optional interface ID - 0 Manual configuration - unchecked Vlan firewall rules DNS rules for iot, guest, dmz andf ipmi: Action - pass Disabled - unchecked Quick - checked Interface - vlan netowrks Direction - in TCP/IP Version - IPv4+IPv6 Protocol - TCP/UDP Source / Invert - unchecked Source - vlan net Source advanced - default settings/not messed with Destination / Invert - uncheck Destination - vlan address Destination port range - dns&dns Log - unchecked Category - n/a Description -n/a No XMLRPC Sync - Schedule - none Gateway - default Private network rules for iot, guest and dmz: Action - pass Disabled - unchecked Quick - checked Interface - vlan networks Direction - in TCP/IP Version - IPv4+IPv6 Protocol - any Source / Invert - unchecked Source - Vlan net Source advanced - default settings/not messed with Destination / Invert - checked Destination - private networks Destination port range - any Log - unchecked Category - n/a Description -n/a No XMLRPC Sync - Schedule - none Gateway - default IPMI network does not have this rule

    • @homenetworkguy
      @homenetworkguy 7 дней назад

      The OPNsense configuration looks reasonable but I did notice that if you're using IPv6 with Track Interface, you need to set a prefix delegation like /60 or /56 (whatever your ISP allows) and then for each interface, you will need to assign the prefix ID for each interface so that each interface can have a unique IPv6 subnet. Also have you tried using the parent interface with no VLANs to see if you get IP addresses via DHCP assigned? In your config above, it appears you are only using VLANs. It may be worth trying the parent physical interface with no VLANs and plugging a device into a port on the switch that is not assigned to any VLANs (which is often called VLAN1). If that works, you know that DHCP is working properly without the VLAN configuration. Then you can check over the VLAN configuration on the switch (and OPNsense but it doesn't look wrong so far assuming you assigned the VLAN to the proper physical interface).

  • @leaptech510
    @leaptech510 9 дней назад

    Thank you for the video, Do you have any hardware recommendation that can sustain 10Gbps(WAN and LAN Port) with NAT and Netflow?

    • @homenetworkguy
      @homenetworkguy 8 дней назад

      You might need a more powerful system than the Protectli I featured in the video depending your needs for IDS/IPS, etc. Perhaps the Minisforum MS-01. Also running bare metal or PCIe passthrough even with the Protectli allows you to get closer to 10Gbps (unless you are using IDS/IPS). What I have been doing on my own network is avoid routing large amounts of network traffic through the firewall across VLANs. Instead, I have been multi-homing my systems so I can access my NAS or other storage backends on each of the VLANs where I need the fast data transfers (all of those systems have multiple network interfaces which makes this possible). Besides reducing the workload of the firewall, it also simplifies firewall rules on the OPNsense firewall since you do not need to create rules to access systems which live on the same networks/VLANs.

    • @leaptech510
      @leaptech510 7 дней назад

      @@homenetworkguy Thanks, Have no plans to use IPS/IDS, Just want 10Gbps with NAT for a typical home setup Router: 1x 10G for WAN 1x 10G for Switch Switch: 1x 10G for Uplink 4~6x 1G links for end user devices. Netflow is a bonus but not a must, just to check top talkers. That's all. Thinking of Minisforum MS-01 or VP6670. My ISP will provide the SFP : Huawei OptiXstar S800E XGS-PON SFP+ ONU(SC/APC)

  • @area51xi
    @area51xi 9 дней назад

    This guy networks.

  • @durgeshkshirsagar116
    @durgeshkshirsagar116 10 дней назад

    Great detailed video. Bro you look like Bollywood actor Salman Khan 😃😃

    • @homenetworkguy
      @homenetworkguy 10 дней назад

      Thanks! I plan to do a new version of my full network build guide soon to use an updated OPNsense version as well as different hardware. I think he has much better hair than I do.. I'm slowly losing my hair as I get older. haha.

    • @durgeshkshirsagar116
      @durgeshkshirsagar116 10 дней назад

      @@homenetworkguy He had hair transplantation. Thanks for sharing the knowledge.

  • @chibiichen
    @chibiichen 12 дней назад

    Keep up the good work. Just bought a appliance, ap and switch. Your tutorials help. Do you plan to make a video about dns and or adblocking? I do not want to use my isps dns. Is it enough to just give the dns server via dhcp or is there a better „best practice“ regarding DNS?

    • @homenetworkguy
      @homenetworkguy 12 дней назад

      Thanks! I’m planning to do an updated full network build guide soon with the latest OPNsense version and different switch/AP hardware. I have done some videos on DNS such as using Pi-hole but I could do more. For the updated full network build, I may simply show how to set up DNS over TLS since that is pretty simple to do. I haven’t messed around with AdGuard Home but I may in the future. On my home network, I just use Zenarmor. It blocks some ads (and it does much more than that) but maybe not quite as aggressive as other ad blockers. However, I’m not obsessed with blocking as many ads as possible so I don’t mind it. I find it irritating if I have to keep unblocking legitimate things because blocking certain domain names prevents access to certain websites/apps/services.

  • @Олег-б3ц9б
    @Олег-б3ц9б 13 дней назад

    Please analyze such a product as defguard and its integration into opsense

    • @homenetworkguy
      @homenetworkguy 13 дней назад

      Hmm I haven’t looked into defguard. Thanks for the suggestion.

  • @WebystherNunes
    @WebystherNunes 15 дней назад

    For FreeBSD is okay keep Linux as a type? The correct option isn't 'other'?

    • @homenetworkguy
      @homenetworkguy 15 дней назад

      Perhaps so, but I don’t know what the low level settings are for “Other” vs “Linux”. I haven’t had trouble leaving it at the default so not sure of the benefit. It would be interesting to know since I can’t seem to find that info in the Proxmox documentation (it just says low level optimizations such as the BIOS clock).

  • @benm7242
    @benm7242 16 дней назад

    Can be bought much cheaper from ali express. Sodola is just rebranded Horaco hardware. Same hardware design, the managed switch has the same interface and firmware. They just changed the name and thats it.

    • @homenetworkguy
      @homenetworkguy 16 дней назад

      Yeah I’m sure. I should add my Aliexpress affiliate link. I sometimes to both Amazon and Aliexpress. Amazon is convenient, quicker and easier to return items (at least for US customers). Sometimes things off Aliexpress arrive in less than 2 weeks. One of my shipments took 11 days.

  • @Gotmilk211
    @Gotmilk211 17 дней назад

    do you need 3 ports to have more vm's or can i use the out port for vm aswell i have a mini pc with 2 ports

    • @homenetworkguy
      @homenetworkguy 17 дней назад

      You could do everything with a single interface if you like! I like using more of the interfaces available because it means less bandwidth is shared. Also for certain things such as clustering Proxmox, it’s recommended to dedicate an interface just for the cluster traffic (on its own network). If you have fewer ports and you have multiple networks/VLANs set up, you can just assign the CTs or VMs to whatever network you like. You have to make sure the network switch is set up for VLANs. The key thing to consider is that you need to use bridges instead of using pass through so multiple CTs and VMs can share the same physical network interface.

  • @hexium
    @hexium 17 дней назад

    Thanks for the guide! I managed to set up all up, but I'm struggling with the hostname resolution. I have a pi-hole VM in the LAN network, and I set up the LAN DHCP server to use it, but obviously that doesn't affect clients that connect via wireguard. I understand for that I need to configure Unbound DNS, but I can't find how to do it. As in, how to forward DNS request from Unbound DNS to the pi-hole IP address so that wireguard clients can see the hostname aliases that I defined in pi-hole.

    • @homenetworkguy
      @homenetworkguy 17 дней назад

      I haven’t tried using Pi-hole for DNS for WireGuard clients but you can specify the Pi-hole DNS server in the WG client DNS settings. You will need a firewall rule on the WG interface to allow access to the Pi-hole DNS server.

    • @josephmartinez5749
      @josephmartinez5749 12 дней назад

      @@homenetworkguy Im curious about this as well. I dont use a pihole but cannot get to any of my systems by name through WG. When I am actually on the network everything is fine

    • @homenetworkguy
      @homenetworkguy 8 дней назад

      I haven’t tried using Pi-hole with WireGuard in a long time but with using Unbound DNS without Pi-hole, DNS resolution with WireGuard works. I need to try this sometime with Pi-hole (on a lab network) to see if it works or if perhaps additional configuration is necessary.

  • @ricaspinto
    @ricaspinto 18 дней назад

    One of the most underated channels I have seen in a while. Keep up the great work! Looking forward to the opnsense guide 2024 edition :D

    • @homenetworkguy
      @homenetworkguy 18 дней назад

      Thanks! Appreciate the comment! I have lots of ideas and so little time to execute it all but I keep moving slow and steady!

    • @ricaspinto
      @ricaspinto 17 дней назад

      @@homenetworkguy I can imagine :) If it's not on your list already, one thing i've been searching for recently is baremetal mini-pc hardware for opnsense installations. I have hear alot about N100 chips but a video with updated info would be awesome!

    • @homenetworkguy
      @homenetworkguy 17 дней назад

      Cool. I have several mini-PCs I could line up on a table and discuss the pros and cons. A few I’m currently using on my main home network so I can’t take them down for illustration purposes. Could be useful for those looking for some guidance. I would probably need more variety of hardware to have a more comprehensive view. I should keep that in mind for the future.

  • @casperghst42
    @casperghst42 19 дней назад

    And there is no remote access to bios or hw, that is a major problem with all these boards. You'll need IPMI or something similar.

    • @homenetworkguy
      @homenetworkguy 19 дней назад

      You could use a KVM over IP device. Some of them even have the ability to reboot the machine. If you really need that capability built in, you’ll need more enterprise like gear. I avoid enterprise gear due to noise, power consumption, large/heavy footprint, etc. However, I did buy an old used server grade motherboard for my TrueNAS box that does have IPMI. I don’t use it all the time since I mostly use the web interface or SSH to get access. IPMI is nice though when you need it.

    • @casperghst42
      @casperghst42 19 дней назад

      @@homenetworkguy adding an additional device will add to the complexity, and they are also not for free either. I'd like if Intel would release one of these CPU's with support for vPro Enterprise, which would solve the problem once and for all. And just to make tings even better support for ECC. I like Enterprise stuff (when I can afford it) as it works. But especially a firewall should as a minimum have a serial port which can be used to access the bios.

    • @homenetworkguy
      @homenetworkguy 19 дней назад

      That would be nice if it was available on all systems, but for home use, I can live with KVM over IP to access the BIOS screen but I rarely need to do that. I used a cheap Qotom mini-PC OPNsense for almost 6 years and only needed to access the BIOS for the initial installation. I just used this build as an example OPNsense box but I won’t be using them for that purpose in my lab other than for demonstration purposes.

  • @Crabofwar2
    @Crabofwar2 19 дней назад

    No idea what i'm doing wrong. The connected devices handshake with wireguard but i can't ping any local device or connect to the internet

    • @homenetworkguy
      @homenetworkguy 19 дней назад

      I have noticed that some users have a real struggle getting WG setup even with following the directions. I’ve tried to help with everything I can think of and sometimes the issue isn’t fully resolved. I am curious what is different for some users’ configuration that makes the WG VPN not work properly. Have you checked all of your firewall rules? If you can make a successful handshake, it should be a matter of setting up the proper rules on the WireGuard interface to allow the appropriate access.

    • @JamesBond-kx3kl
      @JamesBond-kx3kl 16 дней назад

      I banged my head against the wall for an hour before I realized I had a typo in the WAN firewall rule and typed the port# for WG wrong.

  • @SB-qm5wg
    @SB-qm5wg 19 дней назад

    new intel 4x 1g nics have really dumped in price but the 2.5g 4x nics are still crazy expensive.

    • @homenetworkguy
      @homenetworkguy 19 дней назад

      What do you consider crazy expensive? For example there is an IOCrest 4 port card that’s $82: a.co/d/cjjdyal If you get StarTech, they’re over $200 on Amazon which is expensive. I sometimes get NICs from Aliexpress because they are cheap and there are more options to choose from than Amazon. Of course it’s hard to say how many are genuine but they have all worked at advertised speeds when I tried them.

  • @dustingarder7409
    @dustingarder7409 19 дней назад

    why did you disable proxmox firewall for wan but not for lan?

    • @homenetworkguy
      @homenetworkguy 19 дней назад

      Probably not intentional but I don’t use the Proxmox firewall since I use OPNsense to firewall the network (and I use local ufw firewalls on all my Linux containers/VMs). If you have box checked to enable the firewall, there are no rules defined by default so it doesn’t offer any protection. You have to add rules in Proxmox if you want to further restrict access. I suppose it is yet another layer of protection if you want to use it in addition to everything else.

  • @sekritskworl-sekrit_studios
    @sekritskworl-sekrit_studios 20 дней назад

    meh.... i'd have rather seen a server setup

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      For the hardware or software? I may test a Proxmox build but not sure if it will be worth a full video or not. I’m going to be doing a Proxmox build in an upcoming video and some examples using Proxmox using a mini PC with the Intel Atom 3758.

  • @tactoad
    @tactoad 20 дней назад

    Just a heads up regarding the memory. I got random crashes in OPN sense when running the memory in 3200. I had to bump the memory voltages a bit to stabilize it. Been rock solid since.

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      Thanks for the heads up! Same motherboard I’m assuming? I will have to test and see about stability cause RAM and motherboards can be finicky. I had to bump voltages on my old Ryzen 7 1700 motherboard when I maxed it out with 64 GB of RAM on my old Proxmox server. I found like the only post on the Internet which mentioned bumping voltages for that CPU/motherboard (haha), and it made it rock solid.

    • @tactoad
      @tactoad 19 дней назад

      @@homenetworkguy I have the ITX/DC variant so it should be similar. The bios doesn't give a clear use of the XMP profile regarding memory voltage. Running a dual i226-v nic and it works great for a 2.5G FW solution. But it's not a platform I'd recommend for a dual 10gbe fw due to pcie limitation. You can tap out the pcie lanes from the m.2 slot with a converter but it's not pretty.

    • @homenetworkguy
      @homenetworkguy 19 дней назад

      Yeah I noticed you don’t have the option to select an XMP profile (I didn’t dig deep into it) like some motherboards. When I test it some more I’ll see if it stays stable or not. Yeah I mentioned in the video that dual 10G wouldn’t be good even for the PCIe 3.0 x2 (which your ITX board doesn’t have) but it can handle a single 10G NIC just fine assuming it’s a PCIe 3.0 card.

  • @crocodiluvesel4929
    @crocodiluvesel4929 20 дней назад

    How much power does it use?

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      The default installation of OPNsense with no tweaks and no power savings tweaks in the BIOS, it sits at like 24-25 Watts. The case also has 2 fans it’s powering. Fanless systems would use less power. I imagine there could be some power savings settings that could be enabled to further reduce the power consumption. Still much less than most desktop hardware running as a server (some of my old servers were using 65-90 Watts idling).

  • @msolace580
    @msolace580 20 дней назад

    looking forward to more on this, i got a n100 just put proxmox on it. going to virt opensense and see how more performance i get etc

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      Nice! But you likely won’t get more performance with using VMs on Proxmox. In some cases it can decrease performance (like using bridged network interfaces with OPNsense). Maybe I’ll test it soon to see how it goes.

  • @JonatanCastro
    @JonatanCastro 20 дней назад

    Thanks for this video and the very nice improvement in production! I have actually linked your article in one of my past videos about OPNSense. If you don't mind, I have an N100 1U rack router/firewall from Gowin with that same Mellanox card. I tried both OPNSense and PfSense on bare metal and virtualized over Proxmox. When I run an iperf3 (server either out of the router or in the router), I get around 5 Gbps for 3-4 seconds, and then it drops to 800 Mbps. I've tried several settings, with and without hardware offloading, etc. No luck. Do you have any experience with this problem? Thanks!

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      Thanks! I’m excited for the improved quality! Took me a while to get there but it’s worth the investment. Also thanks for linking to me! Are you using passthrough for the NICs? You won’t be able to get full 10G using bridges. I’ve noticed it takes a faster CPU (such as the i5-1235U in the VP6650 that Protectli sent me) to get close to 10 Gbps and in some cases, only passthrough could reach it. I’ll likely be doing some more testing on throughput performance now that I have two N100 systems to play with. I previously didn’t have any experience with them but know that lots of people love the N100 for OPNsense builds.

    • @JonatanCastro
      @JonatanCastro 20 дней назад

      @homenetworkguy I tried both, actually: passthrough and virtio, even bare-metal... which is driving me crazy because I assumed it should be able to handle 10G, but still, it goes downhill in the iperf3 test very quickly. I can share images with you if you want to! I'm super interested in your testing results as well.

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      @JonatanCastro Interesting. I know that I can get 10G bare metal with Linux using iperf3 (I’ve already done that prior to my video). I have yet to test OPNsense performance with the N100 but that will be soon.

    • @JonatanCastro
      @JonatanCastro 20 дней назад

      @@homenetworkguy exactly! I also installed Proxmox on the N100 and I was able to get the full 10G as well

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      I’m assuming you’re referring to the Proxmox host getting 10G (Linux based) and not the VMs?

  • @kyleg3433
    @kyleg3433 20 дней назад

    I love seeing you continue to share all this amazing information in addition to improving the production quality of your videos!

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      Thanks! I plan to continue doing more! Glad you appreciate the improved production quality. The "budget friendly" (relatively speaking) Panasonic LUMIX G85 has far exceeded my expectations in video quality. No comparison to my old iPhone footage. I also got some new LED studio lights as well that are less bulky (but not quite bright) and more energy efficient than the traditional, cheap studio lights I was using.

  • @suntoryjim
    @suntoryjim 20 дней назад

    That's a beefy OPNsense rackmount. Too bad the ASRock motherboard doesn't come with built-in 4port NIC like the various N100 NASboards on Aliexpress.

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      Yeah, you can buy 4 port i226 NICs if you want that on the board. If you put it in the PCIe 3.0 x2 slot, you should be able to get the full throughput on all 4 network interfaces. I'm actually glad the board doesn't include the 4 2.5G NICs because it allows me to have more PCIe lanes to play utilize and I can put a 10G NIC on that board instead of the 4 2.5G interfaces. The N100 only has 9 total PCIe lanes and you can only utilize 3 of those lanes via the PCIe slots (the NVMe/WiFi module slots, USB ports, etc utilize the remaining lanes).

  • @Jared-v4o
    @Jared-v4o 20 дней назад

    Looking forward to your updated guide! I have been following your existing one recently as a guide to building a new home network. Its been an invaluable resource. I may be beating you to the punch, but i am curious on your security suites you are running today. I read through your guide on securing OPNsense on your website, is that still a good representation of your recommendations? Are you still using Zenarmour on the LAN with IDS / IPS with suricata on the WAN? Do you still utilize CrowdSec? What about any IP blocklists? I am getting near to point of cutting over and using OPNsense as my primary router and have been thinking through best approaches to secure it when that happens. I absolutely love your vids and the material you publish.

    • @homenetworkguy
      @homenetworkguy 20 дней назад

      Yeah I'm getting closer to creating an updated full network build to essentially replace the original ones I did almost 2 years ago. Video and audio will be improved from the original, and I am getting a bit more comfortable recording on the camera (it is very challenging for me compared to written content, haha). As for security services, etc, I mostly use the same things. I don't use Suricata on the WAN. I just use Zenarmor and CrowdSec in addition to the basics: isolating networks via VLANs, allowing/blocking traffic across VLANs via firewall rules, local ufw firewall on all my Linux systems/containers/VMs, SSH keys with strong passwords, software updates, etc. Defense in depth security practices. All of it works together to maximize security. There's always room for improvements, of course! I try to balance security with usability of my network. I try not to lock things down so tight that it's a pain to use my network especially since it's a home network and not a corporate network. Glad you love the content! Thanks for following along!

  • @cyrilpinto418
    @cyrilpinto418 21 день назад

    Hi once again thank you for everything. Small question wrt VLANs; let’s assume as in the above video, a Nic / bridge is made VLAN aware, and then connected to a switch that has say 5 physical ports and each port is being used for 5 separate VLANs (VLAN id 2, 3, 4, 5, 6) Let’s say we create a Proxmox CT or VM but want it to have a new VLAN id 7; do we need to do anything on the switch itself ? Or should we just input 7 as vlan id in the CT/Vm. Are the number of VLANs restricted to the number of physical ports on the switch. Would really appreciate your views on this .

    • @homenetworkguy
      @homenetworkguy 21 день назад

      First of all, 1 of the 5 ports will need to be connected to Proxmox and that port will have ALL VLANs assigned as a trunk port so the traffic can pass through to Proxmox. A trunk port can have as many VLANs as you want to pass through to other switches, routers, wireless access points, and servers (all of which need to be VLAN aware devices). Each non-trunk port can only be assigned to a single VLAN. In Proxmox you can create a virtual bridge (with or without VLAN tags) that you can use as a virtual network within the Proxmox server or Proxmox cluster- if you wish to have CTs/VMs on their own virtualized network (this can be helpful for lab networks, etc).

    • @cyrilpinto418
      @cyrilpinto418 20 дней назад

      @@homenetworkguy the last sentence is what I want to do; create virtualized CTs in 3 Vlans, 1 each for Caddy, Apps, and Arr stack. I created a Vlan aware Bridge that wasn’t connected to any NIC, and all was working fine, but the setup is causing OpnSense to crash / restart. I’m now thinking of using my last remaining Nic, making a VLAN aware bridge, creating 7-8 VLANs and trunking them to my Mikrotik Hex which will only have 4 available ports, to be used to separate physical devices such as office, Iot, guest etc. The only 3 VLANs to be used for Caddy, Apps, and the Stack. Am totally lost here.

  • @jtucker4
    @jtucker4 22 дня назад

    The, "Allow access to DNS" and, "Allow access only to Internet" work great unless you try and use apt update or apt upgrade in an LXC container in Proxmox and then nothing. It won't update or upgrade unless I give the container full firewall access in OPNsense. Not sure why.

    • @homenetworkguy
      @homenetworkguy 22 дня назад

      Is the container on a different VLAN then the Proxmox host? If so, don’t forget you need to specify the DNS server in the settings for the container because it will default to the same DNS server as the host (which could be 192.168.1.1 by default depending on the network IP addresses you’re using). I sometimes forget to change the DNS server when I create a new LXC on a different VLAN than the Proxmox host.

  • @josemmm11
    @josemmm11 23 дня назад

    can you make a review about how this device detect virus from internet? for example downloading several malware samples from internet to know how effective is the antivirus of this device. Best regards

    • @homenetworkguy
      @homenetworkguy 23 дня назад

      That would be a good idea to test out the firewall/malware protections of that product.

  • @hprompt166
    @hprompt166 23 дня назад

    hi there great video as usual how does this work with regular plaintext dns using port 53, pihole using port 5335 and unbound in opnsense using port 853 to clouldflare???? also I have 2 proxmox servers, should I install pihole on each proxmox server? thx for all your help

    • @homenetworkguy
      @homenetworkguy 23 дня назад

      Sure you can have 2 instances running for redundancy (plus when you reboot one of your servers, it doesn't take down the DNS on your network). For the DNS configuration, you could configure the DHCP settings for interfaces in OPNsense to use the Pi-hole DNS server(s). Then have Pi-hole use the Unbound DNS IP address as its upstream DNS server. Then Unbound DNS can be configured to use DNS over TLS to Cloudflare for external DNS requests. So it would be like this: client -> Pi-hole DNS -> Unbound DNS -> Cloudflare DNS over TLS.

    • @hprompt166
      @hprompt166 22 дня назад

      @@homenetworkguy thx for the reply, I have 2 more questions: when you say "have Pi-hole use the Unbound DNS IP address as its upstream DNS server" where in opnsense unbound will I find that ip address? are is it the clouldflare dns address? also when I run resolvectl my current scopes show none and your shows DNS, resolv.conf mode shows foreign and your show stub. thx again

    • @homenetworkguy
      @homenetworkguy 22 дня назад

      Unbound listens on all interfaces by default so the IPs you can use is any of your network interfaces as the upstream DNS server for Pi-hole. If Pi-hole lives on the LAN, use 192.168.1.1 as the DNS server for Pi-hole, for example. Don’t confuse internal DNS with external DNS. You’re basically creating a chain of DNS servers and inserting Pi-hole in the middle. I prefer to keep DNS more simple than that by not using Pi-hole (I use Zenarmor in OPNsense). I created this demonstration for those who like to use it. The more complex you make DNS, the more likely you will have issues if something goes wrong or fails. As for the second question. Not sure what you are saying unless you’re not getting the DNS server appropriately assigned by DHCP. If you’re using a static IP on the device, you would have to specify Pi-hole as the DNS server since it wouldn’t obtain it from DHCP from OPNsense.

    • @hprompt166
      @hprompt166 22 дня назад

      @@homenetworkguy it's starting to make more sense now. thanks again

  • @MrKalindro
    @MrKalindro 24 дня назад

    Great video, it indeed works! I was wondering if there is a way to allow all routes to my homelab but forbid peers from communicating with each other? If I do it in the firewall settings, will it be sufficient? Or it also has to be done on VPN level

    • @homenetworkguy
      @homenetworkguy 23 дня назад

      I haven't tried this since I mostly just use my phone to connect back home but occasionally my iPads. However, I've seen where you can adjust the iptables on the server side to enable client side isolation (www.lautenbacher.io/en/lamp-en/wireguard-prohibit-communication-between-clients-client-isolation). That is for Linux. FreeBSD would be different since it doesn't have iptables like Linux. I'm not sure you would do this command line in FreeBSD or if it could be accomplished via certain firewall rules on the WG interface. Also you could create multiple instanced of WG and have clients connect to different instances (it may be possible to allow devices on different WG to communicate via firewall rules-- similar to how you would to allow traffic across VLANs). This would be an interesting area to explore. I have a lot of things on my todo list... a never-ending todo list (which is great for content creation).

  • @tkuwalek1
    @tkuwalek1 25 дней назад

    I have configured the Wireguard server and want to share access to the LAN, but I do not have !PrivateNetworks alias

    • @mr.dingleberry4882
      @mr.dingleberry4882 23 дня назад

      Look for a video called "Beginner's Guide to Set up a Full Network using OPNsense" on his channel and skip to 18:33. Follow that section, and then come back here for rule cloning.

  • @opposedforces
    @opposedforces 26 дней назад

    @homenetworkguy Your videos are amazing, but for someone new to opnsense (me) I am stuck in the mud. It would be AWESOME if you had a quick video on how to set up the WAN interface properly for those of us who want to ditch our supplied routers, and use an opnsense box instead. For some reason, I cannot get my opnsense to grab a public IP on the WAN interface, so consequently, I cannot access the internet on the LAN interface. I have spent quite a bit of time looking for that missing link only to be thwarted at every turn.....lol. Thank you tho, for all you appear to be doing for this community sir !! P.S. Frontier fios/fiber....

  • @RodolfoOchoa
    @RodolfoOchoa 28 дней назад

    once you starting cloning rules I don't have, I got lost, I have my own install

    • @homenetworkguy
      @homenetworkguy 27 дней назад

      Exactly. Everyone has their own set of firewall rules to allow the access they want on their own networks. I can’t show everyone how to create their exact rulesets. I can only provide examples. However there are some basic rules you will need to allow access to your network/Internet. I walked through each rule in the video but I have more detailed examples in my other guides. If you want your WireGuard clients to have exactly the same access as you have on your other networks, you can create similar rules or clone them so you don’t have to create them all from scratch. Creating rules for your WireGuard interface is exactly the same as any other network interface you have configured for your network.

    • @mr.dingleberry4882
      @mr.dingleberry4882 23 дня назад

      Look for a video called "Beginner's Guide to Set up a Full Network using OPNsense" on his channel and skip to 18:33. Follow that section, and then come back here for rule cloning.

  • @hussainblackdrag1983
    @hussainblackdrag1983 28 дней назад

    how to setup opnsense behind a router act as a b-router?

    • @homenetworkguy
      @homenetworkguy 28 дней назад

      I have written versions of this on my website but I need to do a video on it. I believe in certain videos I mention sometimes what you need to tweak some settings if you’re using OPNsense behind another router. Definitely would be good to do a guide on it.

    • @hussainblackdrag1983
      @hussainblackdrag1983 27 дней назад

      @@homenetworkguy we are looking forward to it, it would be nice to know how to configure opnsense in bridge mode .. please do the installation in hyperv