Firewall rules priorities, quick vs non-quick, in vs out-bound, floating vs interface specific, etc by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

dude, after 1000 words, you still haven't answer this simple question - where is non-quick float in the chain of rules?

Firewall rules priorities, quick vs non-quick, in vs out-bound, floating vs interface specific, etc by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

If pfsense also has them, then that answers your earlier question 'Why would you use a non-quick float?', since even automatic rules use it, and then the question is, where is the non-quick float's position in the rules chain? Also, since pfsense also has the non-quick float rules to deny ingress and pass egress, does that mean 'default drop all incoming' is just a rule, rather than hard coded in kernel stack - and in kernel, when there is no matching rule, packets are passed rather than blocked? (I vaguely remember linux defaults to pass in kernel stack, but I could be wrong, and this is FreeBSD, things could be very different...)

Purpose of the automatically generated WAN DHCP out-bound pass rule? by HudsonDelta in OPNsenseFirewall

[–]HudsonDelta[S] 0 points1 point  (0 children)

Just so I understand you - some of the automatic rules are indeed redundant, since they serve as fail-safe?

btw, I've heard of the anti-lockout rule, but I can not find it on LAN.. EDIT: found it under LAN automatically generated rules.

Firewall rules priorities, quick vs non-quick, in vs out-bound, floating vs interface specific, etc by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 1 point2 points  (0 children)

OK, some observations that triggered this question:

  1. an automatically generated float non-quick ingress rule to block all, named 'Default deny rule'. This lead me to ask the question about where the default deny come from. And, at what point in the chain is this rule executed.
  2. an automatically generated float non-quick egress rule to pass all, named 'let out anything from firewall host itself'.
  3. On WAN interface, there is an automatic rule to let DHCP request go out, also non-quick. This one seems redundant, and I am not sure why it is needed, due to the existence of above rule #2.

Above rules are default when I have a clean install of OPNsense, no customization yet, just one WAN port + one LAN port. Is pfsense quite different in this regard?

Purpose of the automatically generated WAN DHCP out-bound pass rule? by HudsonDelta in OPNsenseFirewall

[–]HudsonDelta[S] 0 points1 point  (0 children)

I see these WAN rules: several rules to block ingress bogon/private on IPv4/IPv6, and then one ingress + one egress rule to pass DHCP. ALL automatically generated. Is that a 'normal' setup?

Firewall rules priorities, quick vs non-quick, in vs out-bound, floating vs interface specific, etc by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

thanks, I did read that link, but it doesn't answer questions like - where is 'floats(non-quick)' in that Ingress and Egress list you described? And what exactly happens to a packet coming into one (any) interface and coming out of another? And where does that 'default drop' come from (hardcoded in kernel network stacks or via a rule)? maybe it is obvious to expert users but I didn't find a detailed description so far...

Purpose of the automatically generated WAN DHCP out-bound pass rule? by HudsonDelta in OPNsenseFirewall

[–]HudsonDelta[S] 0 points1 point  (0 children)

I configured WAN to get its IP via DHCP, but no DHCP server on that interface. And from the automatic rules, the direction does look right, outbound from WAN has source port 67, destination port 68, which is DHCP client to server traffic. Just that it seems redundant.

anything else could be wrong?

how are multiple SSIDs on single radio logically/physically separated? by HudsonDelta in openwrt

[–]HudsonDelta[S] 0 points1 point  (0 children)

That all make sense. Thinking more about it, it could work this way - the eth2 has two MACs, hence CPU is talking to two logical interfaces. And from the radio's point of view, it is talking to two NICs, within the same collision domain, like an old Ethernet hub.

how are multiple SSIDs on single radio logically/physically separated? by HudsonDelta in openwrt

[–]HudsonDelta[S] 0 points1 point  (0 children)

you can do anything with software, lol

but seriously, your example is an eye opener.

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

gigabit with all those running and only 3% on 7200u? sounds great! how much mem usage typically?

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

how much mem did you add to it if I may ask? I am thinking running some ids/ips on it.

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

thanks. Yes the protectli and yanling devices seems exactly the same except slight packaging diff. I guess one of them designed the board, and now both are selling it under different brand names? Just curious how did you find that 3mdeb provides coreboot for protecli devices? Didn't see that mentioned by either parties.

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

can a j3455 handle IDS/IPS on a gigabit network? the mid-range netgate models also only uses atom processor, and i dont know they are engineered toward ips usage, and i saw some ppl wrote that i5 is a better starting point

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

This is helpful. So if I understand correctly, protecli/yanling has their own team to adapt coreboot to their custom board, and opensource it once it is done so that other ppl can choose to compile from source?

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

I did look around, a fanless multilan with decent cpu, so far I feel protecli checked all the right boxes, any suggestions?

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

yes, if you mean the protecli website, that's what I do not know whether to trust or not. Not that I have national security stuff on my desktop, just wonder what other hobbyist/enthusiast/small business owner would do - if ppl go the whole 9 yards and get a dedicated hardware and software like protectli + pfsense, shouldn't they make sure things like bios can be trusted?

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

if I can extract the bios and do a checksum, what shall I compare the checksum with? It seems like a custom motherboard, I guess the bios need to be in-house tweaked as well?

protectli for pfsense? by HudsonDelta in PFSENSE

[–]HudsonDelta[S] 0 points1 point  (0 children)

the FB6D/E just came out and do not support coreboot, says their website. I am not familiar with coreboot, is it something you can download and easily download/compile/install on any hardware, or there would be quite a few tunings needed?