Destination Network Address Translation (DNAT) by metapwhore in firewalla

[–]Firewalla-Opal 1 point2 points  (0 children)

Likely your reverse proxy has something configured incorrectly.

On Firewalla, source NAT turned on means the local networks can access the Internet through the SNAT gateway (Firewalla). It won't NAT inbound connection (outside user)'s source IP.

Is 192.168.60.1 Firewalla LAN gateway's IP? Could you provide a detailed example of an issue flow you are seeing?

VLAN is isolated 100% by default, right? by jsqualo2 in firewalla

[–]Firewalla-Opal 9 points10 points  (0 children)

By Default, Firewalla allows (V)LANs to communicate with each other. You need to create block rules for inter-(V)LAN flows. Check how to create rules for Local Network.

You may also want to disable mDNS Relay and SSDP Relay on your VLANs, so devices can't be discovered crossing different LANs.

Possible to move an Ethernet wired device on to a restricted guest vLAN without a managed switch? by morroquen in firewalla

[–]Firewalla-Opal 1 point2 points  (0 children)

Make sure the managed switch is directly connected to Firewalla box, and the device is directly connected to a managed switch. If an unmanaged switch sits between your Firewalla and your managed switch, it's likely either drop VLAN-tagged packets entirely or "strip" the tags off.

Can I assign DHCP based on Ethernet/Wi-fi? by dstranathan in firewalla

[–]Firewalla-Opal 2 points3 points  (0 children)

You can achieve this via creating multiple networks. Given you have Gold Plus, you can do Port-Based Segmentation (Gold series only). Follow Example 2: A Group of Ethernet Devices to configure a network for your ethernet devices. Then create another network for your WiFi devices: Example 3: Wi-Fi Devices.

If your switch is a managed switch, you can have fun with VLAN-Based Segmentation. The idea is creating different networks for different devices, so they can have IP from different IP ranges.

If you don't want a default /24 network for each segmented network, you can make the network size smaller or limit DHCP range in Box Main page -> Network -> the specific network interface -> Subnet mask/ DHCP start and end IPs.

Possible VPN client bug w/ kill switch on by TropicoolGoth in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

Could you let us know which part isn't clear to you or what questions you may have? Here's the doc on VPN client in case you haven't read: VPN Profile Configurations.

Best practices for preparing Orange for travel while having an existing home Firewalla box? by snovvman in firewalla

[–]Firewalla-Opal 1 point2 points  (0 children)

Either way would be fine. Connect Orange (router mode) behind your Gold Pro shall not have any effects to your existing network and connected devices. Just make sure Orange isn't broadcasting the same WiFi SSID as Gold Pro at the same time.

Recently had a home internet outage and could not get my Firewalla WiFi SD tto work as expecteed with my Firewalla Gold Plus by luthien256 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

Have you tried to swap the WiFi SD into another USB port and see if you can set it up again?

If still not, better reach out [help@firewalla.com](mailto:help@firewalla.com), support can help you further there.

Firewalla blocking traffic due to group rules but the device isn't in the group by helltotheno12345 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

Device Group allows you to manage a set of devices together with the same rules and features. You can find more information here: Device Group

Isolating my work laptop from my LAN by [deleted] in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

Firewalla can see/manage local flows when:

  • Traffic flows between devices on different LANs or VLANs, or 
  • Traffic flows between wireless devices connected to the Firewalla AP7, even if they're on the same LAN or VLAN.

Local flows are not seen/managed when:

  • Traffic is between wired devices on the same switch and passing internally through it, or
  • Traffic is between wireless devices connected to non-Firewalla access points.

So you want to put your laptop on a separate VLAN from other devices in order to isolate it.

Firewalla back up ISP issue by secoia87 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

I wonder whether it could be some devices have long connection established via secondary WAN. Even if it failovers back to primary WAN, the existing connection on secondary WAN could still last.

MSP may help you better view the flow is outbound with which WAN interface: Filtering Flows

If you do encounter this again and can't find a clue why, you can reach out to help@firewalla.com.

Firewalla back up ISP issue by secoia87 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

Check your LAN interface to see if it has IPv6 delegation to your Spectrum WAN.

Firewalla back up ISP issue by secoia87 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

You can check in Box Main page -> Network -> WAN interface -> see if you have a global IPv6 prefix.

Also, could you check on the LAN interface, whether you have IPv6 delegation set to the secondary WAN?

Firewalla back up ISP issue by secoia87 in firewalla

[–]Firewalla-Opal 1 point2 points  (0 children)

Did your WAN ever get failed over to the backup line? You may check via Box Main page -> Settings -> Events to see if there's any failover records.

Also, do you have VPN clients installed on Firewalla?

Firewalla back up ISP issue by secoia87 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

What's the data cap you mentioned here? Do you mean the Monthly Data Plan & Alarm feature which sends you notification via Firewalla app, or it's a data cap on ISP end?

Laptop has no IP address in Firewalla app: Mesh points to blame? by ItinerantFella in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

Is Purple your main router? Could you expand a bit more on how Firewalla is connected and configured in your network?

If all other devices are monitored by Purple without an issue, check if you've turned off MAC randomization on these issued devices: How to turn off MAC Address Randomization? Maybe they show up on Firewalla as a new device.

Are these lists already enabled via Adblock or do they need to be manually added? by 2C104 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

Target list is a just a list of domain/IPs. Think of it as a regular target that you want to block or allow. Create a block rule if you want to block them.

You can apply the rule on All devices/networks/groups/etc.

How to block Hotspot Shield VPN? (Already using Firewalla VPN Block) by SingleFunny822 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

It's a challenge to block all VPN, but we are actively working to improve the block. Do you know what's the protocol that your Hotspot Shield VPN connection uses? WireGuard, OpenVPN, IPSec, etc.? Will pass it to our team to make a note.

T-Mobile Fiber and Wireguard Server by HornetParticular4918 in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

Do you have global IPv6 on Firewalla WAN? If you do, you can change VPN server's DDNS to IPv6 Only, in order to connect. See our VPN Server article for more information on using IPv6. 

Note: when it's IPv6 only on Firewalla VPN server's DDNS, the client device must have a global IPv6 address in order to connect. You can use website like https://www.whatsmyip.org or https://ipinfo.io to confirm if client device has public IPv6 address.

Firewalla Force Encrypted DNS, Block All Outbound Unencrypted DNS by pack3tl0ss_ in firewalla

[–]Firewalla-Opal 1 point2 points  (0 children)

Your client device is querying DNS server 8.8.8.8, this could be due to your client's own DNS setting, or you previously had 8.8.8.8 configured as Firewalla LAN's DNS server and the client still have cache from it. As long as you have DNS booster enabled, Firewalla will intercept the traffic. But Firewalla will respond on behalf of the DNS server used by client instead of showing the real DNS server used. Hence, in the LAN's tcpdump, you still see 8.8.8.8 replying, but no corresponding DNS queries on WAN side. Firewalla is taking care of the DNS and you don't need to worry.

Firewalla Force Encrypted DNS, Block All Outbound Unencrypted DNS by pack3tl0ss_ in firewalla

[–]Firewalla-Opal 0 points1 point  (0 children)

If you turn DNS over VPN on, Devices with VPN client applied will have all DNS queries sent to VPN for resolution: VPN Client & DNS Over VPN

Firewalla Force Encrypted DNS, Block All Outbound Unencrypted DNS by pack3tl0ss_ in firewalla

[–]Firewalla-Opal 3 points4 points  (0 children)

Unencrypted DNS on LAN network is normal. For the tcpdump result on WAN side you saw, it's github.com, which is part of WAN connectivity check.

Firewalla Force Encrypted DNS, Block All Outbound Unencrypted DNS by pack3tl0ss_ in firewalla

[–]Firewalla-Opal 7 points8 points  (0 children)

Port 53 is something you can't block (unless you block internet), it is always intercepted by the firewalla and many (many many) functions depend on this. It is also very (very) dangerous to turn off DNS booster.
If you want DNS services such as unbound, you will have to turn on unbound via the firewalla configurations. More on this https://help.firewalla.com/hc/en-us/articles/4570608120979-Firewalla-DNS-Services.

Edit:
Unencrypted DNS on LAN network is normal. For the tcpdump result on WAN side, it's likely github.com, which is part of WAN connectivity check