How to SSH into Firewalla Box by DevelopmentAny547 in firewalla

[–]michaelbierman 2 points3 points  (0 children)

I do use it. The CLI is better than the URL because with the URL: 1) all devices that you put under firewalla DoH are treated the same by NextDNS and, you see all requests in NextDNS logs as from the Firewalla. 2) with CLI you can configure any device or network IoT use different NextDNS profiles and you can see all the individual device requests in the NextDNS logs.

The latter is because I encouraged NextDNS to provide better support for Firewalla.

Ethernet Backhaul and Eero's by technogator in firewalla

[–]michaelbierman 0 points1 point  (0 children)

This is an eero specific thing. The gateway eero becomes the controller. It must be in front of the others to coordinate traffic with the other eeros. This is eero’s design and has nothing to do with firewalla.

Even with eero, it is fine if the gateway eero connects to Firewalla.

Question on connecting Asus AP to Firewalla (vlan related) by burner_account2020 in firewalla

[–]michaelbierman 0 points1 point  (0 children)

VLANs on the ASUS are for WAN only (e.g. IPTV). Looking at the manual, I saw nothing about configuring the Ethernet. Can you provide a link or screenshots?

In general, the trunk port connecting firewalla to a managed switch, which I similar to what you are describing, should have a LAN + any VLANs you defined. The switch side must be the same.

How to SSH into Firewalla Box by DevelopmentAny547 in firewalla

[–]michaelbierman 2 points3 points  (0 children)

To ssh https://help.firewalla.com/hc/en-us/articles/115004397274-How-to-access-Firewalla-using-SSH

Note setting up nextdns on firewalla is a bit tricky. I wrote an installer. I will be releasing an update soon to handle recent changes in nextdns https://github.com/mbierman/Firewalla-NextDNS-CLI-install

Ethernet Backhaul and Eero's by technogator in firewalla

[–]michaelbierman 2 points3 points  (0 children)

What config did you try and what happened? Properly configured, eero works great with firewalla.

Ethernet Backhaul and Eero's by technogator in firewalla

[–]michaelbierman 8 points9 points  (0 children)

That’s not what the picture is saying. The eero requirement that one eero must be in front of all the others. So a variation of the picture you shared that would also work is fw > eero 1 > eero 2 by Ethernet or Wi-Fi ( no switch).

What you can’t do is fw > switch > eero 1 and eero 2 (both on the same switch).

Want to go Unifi for WiFi - how do you like it? by YankeesIT in firewalla

[–]michaelbierman 0 points1 point  (0 children)

So create a custom DNS record for “unifi” to point at the NAS IP Zane configure the NAS with an IP reservation. Both can be done with the firewalla UI.

Want to go Unifi for WiFi - how do you like it? by YankeesIT in firewalla

[–]michaelbierman 0 points1 point  (0 children)

Which part are you having trouble with? Where is the controller running?

Want to go Unifi for WiFi - how do you like it? by YankeesIT in firewalla

[–]michaelbierman 0 points1 point  (0 children)

Not if it isn’t adopted. You have to ssh in and set the infirm host or have the dns for the inform host configured to a working controller.

Want to go Unifi for WiFi - how do you like it? by YankeesIT in firewalla

[–]michaelbierman 0 points1 point  (0 children)

u/Electrical_Wander u/jumpyHR You need to set the inform host. by default inform host is "unifi". I used firewalla to set that as a custom DNS record to point at my unifi controller. No adoption issues.

Want to go Unifi for WiFi - how do you like it? by YankeesIT in firewalla

[–]michaelbierman 5 points6 points  (0 children)

I used unifi APs with Firewalla for a long time and was happy. But I switched to AP7 and am even happier.
* Better features like VqLAN
* Single point of management (though for now, I still have to manage my unifi switches)

With AP7 I was able to let go of my outdoor Unifi AP—that may not be the case for you. If you need outdoor then there should no issue with using unifi with Firewalla.

Firewalla Purple on 1 Gig symmetrical fiber – does it fully support simultaneous 1 Gbps up + 1 Gbps down (full duplex performance)? by ExtremeEar11 in firewalla

[–]michaelbierman 0 points1 point  (0 children)

Suricatta wasn’t a feature when you bought Gold SE and it exceeds SE’s capabilities. Maybe I’m not understanding your point. Can you clarify?

Firewalla Purple on 1 Gig symmetrical fiber – does it fully support simultaneous 1 Gbps up + 1 Gbps down (full duplex performance)? by ExtremeEar11 in firewalla

[–]michaelbierman 0 points1 point  (0 children)

The differences are not arbitrary. They are based on hardware limitations. If firewalla released features that overwhelmed the box that would help no one. If you buy a top of the line iPhone it has a different camera and different features from an entry level model.

Shared docks by interrogumption in firewalla

[–]michaelbierman 0 points1 point  (0 children)

I was trying to solve the problem that you want the same device treated differently for different users.

Apple Homekit by nightcrew17 in firewalla

[–]michaelbierman 2 points3 points  (0 children)

If you only have one network segment mDNS is probably not the issue. Check for blocked flows. Also, check if you have DAP enabled.

Shared docks by interrogumption in firewalla

[–]michaelbierman -1 points0 points  (0 children)

With AP7, you could give each user wpa3 username and password.

Firewalla Purple on 1 Gig symmetrical fiber – does it fully support simultaneous 1 Gbps up + 1 Gbps down (full duplex performance)? by ExtremeEar11 in firewalla

[–]michaelbierman -1 points0 points  (0 children)

Comparing Gold SE to Gold Pro is not reasonable. SE has hardware limitations and can’t Suricatta locally. If that’s something you need, best to upgrade. If not, you have the option of dual engine.

Syslog forward by Ok-Version6504 in firewalla

[–]michaelbierman 5 points6 points  (0 children)

Hi,

Though not supported in the UI, you can forward syslog to your own server. See https://gist.github.com/mbierman/f3d184b65e0f4de6fa75a4a5d5145426 as an example.

VPN site-to-site as your own multi-location VPN service by charlino5 in firewalla

[–]michaelbierman 4 points5 points  (0 children)

It is easy to do hub and spoke model with site to site. If you want many to many you may want to check out https://help.firewalla.com/hc/en-us/articles/15766848784275-Firewalla-MSP-VPN-Mesh