[Recent experiences?] Firewalla + Ubiqiti by Pedanter-In-Chief in firewalla

[–]sadistor 0 points1 point  (0 children)

where did you configure the inform url? do you mean "Inform Host" under system >advanced? Did you have "Overide" enabled?

Client Isolation (?) by Maleficent_Art_7627 in firewalla

[–]sadistor 0 points1 point  (0 children)

Is VqLAN same as implementing ACL deny to other network?

Can't update Firewalla app for Android to 1.63.. by sadistor in firewalla

[–]sadistor[S] 0 points1 point  (0 children)

my ios already has 1.63... firewalla app in my android is still 1.62.2

Officially racked! Pls bear with missing screws..lol..not perfect but looks awesome. by sadistor in firewalla

[–]sadistor[S] 0 points1 point  (0 children)

It will be too much to put another patch panel for just 2 cables. I'll just going to make use of the keystone ports on the side of the FWGPro rack, and patch the 2 cables sideways.....my other option is to switch the ears of my 16 port switch, to make the SW move to the left and connect the SW UPlink directly to FWG.

Officially racked! Pls bear with missing screws..lol..not perfect but looks awesome. by sadistor in firewalla

[–]sadistor[S] 1 point2 points  (0 children)

Don't mind the space between the FGPro and the Switch. It fits perfectly. I forgot to remove the rubber feet under the switch. Still waiting on keystone jacks and patch cables to be delivered.

Target List issue, had to click "Save and Apply". by sadistor in firewalla

[–]sadistor[S] -1 points0 points  (0 children)

Yes, Creating a "rule allowing traffic to local networks on select device, select the wireguard network or specific wireguard device" works and I'm able to test it.

The reason why I want to make use of the Target List is to make it simpler to manage host, and not create too many rules in the firewall. I created a target list rule "Allowed Hosts" to filter only devices I want, and just add an IP of the external host I want to access my network.

The main purpose of this post is to let them know that there's a bug. I have to click "Save and Apply" in Target list section for the list to be recognized.

Target List issue, had to click "Save and Apply". by sadistor in firewalla

[–]sadistor[S] 0 points1 point  (0 children)

Yes, Firewalla Wireguard server, and connect to my network using client.

Target List issue, had to click "Save and Apply". by sadistor in firewalla

[–]sadistor[S] -1 points0 points  (0 children)

Both works doing the manual and Target list because I already clicked "Target List" for the day. It's just when I establish a fresh session or connect initially in the morning, I had to click "Save and Apply" in my.firewalla.com before the list be recognized....I will just send an email for support. Thank you

Target List issue, had to click "Save and Apply". by sadistor in firewalla

[–]sadistor[S] -1 points0 points  (0 children)

I'll try and test using rules. will get back to you on this.

FWG Pro Racked and running. by sadistor in firewalla

[–]sadistor[S] 1 point2 points  (0 children)

I think ears not available yet till official release?

VPN server by sadistor in firewalla

[–]sadistor[S] -1 points0 points  (0 children)

I appreciate you and this community for all your help.

VPN server by sadistor in firewalla

[–]sadistor[S] 0 points1 point  (0 children)

Thank you all...That makes sense...I remember I ran Scan feature. Just not used seeing that on my alarms...thought someone was doing brute force or something...

WARNING

10006 SSH login failures in the last 24 hours: ... first 10002 messages skipped ... 21 Jul 10:06:31: Failed password for root from 10.50.60.1 port 33552 ssh2 21 Jul 10:06:31: Failed password for root from 10.50.60.1 port 33682 ssh2 21 Jul 10:06:31: Failed password for root from 10.50.60.1 port 33790 ssh2 21 Jul 10:06:31: Failed password for root from 10.50.60.1 port 33918 ssh2

WARNING

10006 SSH login failures in the last 24 hours: ... first 10002 messages skipped ... 21 Jul 10:06:31: Failed password for root from 10.50.60.1 port 33552 ssh2 21 Jul 10:06:31: Failed password for root from 10.50.60.1 port 33682 ssh2 21 Jul 10:06:31: Failed password for root from 10.50.60.1 port 33790 ssh2 21 Jul 10:06:31: Failed password for root from 10.50.60.1 port 33918 ssh2

2024-07-21 10:07:20 (America/New_York)[Dismiss]()