Love the fact that I could follow your step-by-step without getting lost. Yes! Do more OPNsense stuff. Add a segment on using a machine with built-in Wi-Fi so I don’t have to go down the add a separate access point gadget to complicate matters.
@Texan104810 ай бұрын
My Arris router is a cable + wifi router, pretty rare nowadays tp find one of those
@drewlarson6510 ай бұрын
pf/opnsense suck at wifi, don't do this, that's not what they're for. look into openwrt
@eDoc202010 ай бұрын
Built-in Wi-Fi won't work as well as a dedicated AP but more importantly very few chipsets work properly in FreeBSD in AP mode.
@takakazushi670310 ай бұрын
Sadly, I COMPLETELY agree with you. THAT is why I’m hoping that people MUCH SMARTER than me (like Dave here) can suggest solutions so we can get that “built into the router” AP without needing that “extra/separate” AP gadget, it’s software and another layer of complexity.
@Texan104810 ай бұрын
@@eDoc2020 it works from 300' feet away, thats good enough for me
@mithubopensourcelab48210 ай бұрын
In my professional life I must have done setup of OPNsense / pfSense more than 300 + times. But, I swear, never heard or imagined transparent filtering bridge. Thank you Dave for enlightening me and the world about it. Will surely put in to practice.
@DavesGarage10 ай бұрын
Glad I could bring something new to the table!
@perwestermark892010 ай бұрын
Have had it on my todo to figure out how to set up transparent filtering on a naked Linux system. But too many other tasks taking time. In my case, I want an existing firewall to believe an external box with modem should look like a local interface so the firewall sees (and thinks it owns) the public IP.
@abdulsalamshar56019 ай бұрын
yeah he reach Saudi Arabia also , i will do as he advice, thanks dave
@SpriGgEx9 ай бұрын
Me neither and i still dont rly see what the Point of it is. It doesnt come clear to me in this video.
@perwestermark89209 ай бұрын
@@SpriGgEx Transparent here means it looks like a layer 2 switch. No changes to any IP numbers. So it isn't visible. Until one of the firewall rules decides to block something. Then it's just a magic cable that blocks the bad connections. So the computer on the inside can still believe that it owns the public IP number and runs without firewall.
@MartinStrazynski10 ай бұрын
This is exactly the sort of opnsense configuration I was looking for to implement for home clients. Beautiful, clear and concise video. Much appreciated. Looking forward to more content!
@JafiB10 ай бұрын
Thank you for delving deeper into this subject, please keep this type of content coming! I'm also on the spectrum and as an AuDHDer I find your presentation suits me better than most KZbin creators as it's to the point! I need all go and low show to get through tutorials and can follow along with you without losing interest waiting for the next step! Keep up the great videos and thank you for all you have done for us geeks on the spectrum!
@TDawgBR10 ай бұрын
I appreciate the straight forward approach Dave, and I've noticed quite a few experts nit-picking, I haven't seen anything significant enough to disregard the video. Thanks for this.
@alexatkin10 ай бұрын
If you Google for Suricata there's plenty of people talking about how often it blocks things due to false positives and it wont see most malware as its delivered over SSL. The best you can really do is region and IP blocklists which require much less CPU power.
@stephensalex10 ай бұрын
Experts who needlessly nit-pick are just being difficult. Source, I work in the industry and listen to it daily. From a big-picture standpoint the video is great.
@ICEMANZIDANE10 ай бұрын
a grown up man advocating for a youtuber. You dont need to defend him, he is old enough and probably accepts his mistakes. Gotta love Fans of youtubers, DONT BE a fan of a youtuber.
@MrCalldean10 ай бұрын
@@ICEMANZIDANEYawn. I got bored after grown up.
@ltlking10 ай бұрын
@@ICEMANZIDANEAssumption much? Maybe he’s just offering a fellow human being some kindness and support. Even grownups appreciate an attaboy from time to time. If you think that’s only for kids, then I’m sorry for you.
@funknick5 ай бұрын
Hey Dave, I just finished setting up a transparent filtering bridge following your steps laid out here. Thank you so much, this was a lot of help! I have a small hiccup (with a solution) I wanted to mention. In your setup steps, you have connected to the LAN port/interface while configuring OPNsense. Prior to setting up the IPS/IDS services, you have us turn off the DHCP and static IP for the LAN port interface. Once this is applied as a configuration, you will lose the ability to access the administration pages. When this happens, you're locked out and can't complete the rest of the steps in your video (turning on IPS/IDS/ClamAV). I think the reason you didn't have this problem is that you have more than 2 ethernet ports on your device (2 SPF, 4 ethernet) and you're using one of the ethernet ports as your management interface. The way I got around this, is the system I'm using has two ethernet ports for LAN/WAN on an Intel NIC and I use the motherboard's built in third ethernet port as a management interface. Before I followed your steps, I configured an interface, static IP, and DHCPv4 service for that 3rd ethernet port that I aptly named `MANAGEMENT`. Then I used that port instead of the LAN port to perform all my configurations. Anywho, that made for a fun little challenge. I had to re-install OPNsense to regain access and do some tinkering to hook up that 3rd port, but it was fun and now I've got a fully working transparent bridge for my ever-growing home network. Cheers and thanks for making this video!
@SunshineDave5 ай бұрын
I got to the end and was locked out as you describe. Also, you can't add a Firewall Pass rule to the WAN interface - WAN is absent in the current version of OPNSense. Hoping for an updated video. I bought the dual NIC mini PC just to do this, and I'll have to start all over. Can this all be done from the text interface with the Mini PC just hooked up to a monitor, keyboard and mouse?
@funknick5 ай бұрын
@@SunshineDave Unfortunately, no, you can't perform the install from the CLI (text) interface that the system boots up from. Configuration is primarily performed via the web management portal. This is why I wrote my comment, as I think there is a mistake and the latest versions of OPNSense don't work with the instructions provided in this video. To properly set up the device, I believe 3 ethernet ports are required: - WAN - LAN - Management I honestly don't know if it's possible to set the system up properly with only the dual NIC at this time.
@SunshineDave5 ай бұрын
@@funknick I'll probably be looking for another video to setup OPNsense more conventionally. But I do have an ethernet dongle I could use as a third port if I had a clue how to create the management port. The oversight in this video is a fatal one. It should really be redone because success is impossible for most users, even the most advanced.
@rustyp215 ай бұрын
Could you not have just logged in through the CLI and used option 4 to reset to factory defaults?
@funknick5 ай бұрын
@@rustyp21 sure, I guess I didn’t think of that during the moment. Good tip! Do you have a workaround for the management port issue?
@Aint1S10 ай бұрын
Like the no ads at the start... Easy to settle into the video. 👍🏼👍🏼
@thaphreak10 ай бұрын
get premium, seriously, it makes youtube everything you want it to be
@pete389710 ай бұрын
@@thaphreak really? it will filter sponsor messages that creators include in their videos?! sign me up!
@Alex-ii5pm10 ай бұрын
@@pete3897no it won't
@R07ishere10 ай бұрын
@@pete3897 There is an extension that does this called "SponsorBlock For KZbin". It's a game changer.
@scottkuzma12510 ай бұрын
@@pete3897 Almost really, however you can scrub past that stuff, so yeah…really is worth the cost of admission.
@waiitwhaat19 сағат бұрын
I would absolutely lose my mind if you and networkchuck made a series together
@bryonnevis218710 ай бұрын
Love the one-liners. @0:57 "The order in which you do things doesn't really matter," said with a completely straight face. CCNA dig pretty funny too!
@DavesGarage10 ай бұрын
Technically, the order DOESN'T matter if you perform them as a single atomic operation, right? :-)
@ingchatboy9 ай бұрын
Critical Care Nursing Assistant 😆
@TheFNGee6 ай бұрын
@@ingchatboy @davesgarage Uhh...Yeah. I didn't realize it could have so many definitions. 😆
@SpaceCadet4Jesus10 ай бұрын
I jumped off the slow moving Ubiquiti ship and landed on a Firewalla Gold life raft. So impressed with this little setup after testing that I'm putting them in client offices now. Set it up takes less than two minutes and further desired segregation/isolation changes are so easy I don't have to bring my networking knowledge. So easy to setup a mess of these around the state and control them from one browser tab at home office.
@VaticanTop8 ай бұрын
Ubiquiti is for your average dummy
@jordanmelville578610 ай бұрын
Love everything you do Dave! As someone who will be doing the same thing when my new rack mount server arrives I do hope you make more videos on this and similar topics. You're experience and teaching style "works" for me - and I am thankful to have found your channel!
@johanbtheman10 ай бұрын
Back in the days we called it ”bump in the wire”. Have set up a few cisco ASA with transparent filtering. Love your videos ❤ / retired CCNP-R/S, CCNP-S 😅
@HugoDahl6 ай бұрын
Something that might be worth covering, or mentioning with a friendly link to another content creator, is that most people also use their ISP-provided device as their WiFi access point. I know you mentioned being a Ubiquiti fanboy, however, the cost of entry can be a bit steep for some of we mere mortals! The reason I mention possibly another content creator, or maybe a collaboration, is that this may also be a proverbial "bridge too far". There is a lot to cover with WiFi hardware selection, such as multiple networks for guests, IoT, security, protocols (more than "WiFi6") and the likes. But I figured it's at least worth a mention, since the solution covered here wouldn't do anything for those using the ISP's gear for WiFi, and wasn't explicitly mentioned! Thanks, and I'll keep subbing and liking as you keep providing awesome value and insight!
@dirkbester90505 ай бұрын
If you are too poor to turn off the ISP wifi and use your own, are you simultaneously rich enough for a transparent bridge?
@rustyp215 ай бұрын
@@dirkbester9050 Not helpful. You just wasted my and everyone else's time with this comment.
@ragtop638 ай бұрын
For anyone interested in pfSense vs OPNsense, one of the biggest reasons to go with OPNsense is because of its advanced hardware support. It’s a fork of pfSense but the developers build support for newer hardware themselves instead of waiting for the BSD community to do so. This means that you typically aren’t waiting years for the OS to support a new NIC (or something else) like you do with pfSense. They’re both really good choices but OPNsense wins it for me because of the hardware support.
@thepcenthusiastchannel230010 ай бұрын
I've been running pfsense since 2018 with version 2.4.3. Currently running 23.09.1. It's been very solid for me. I have the AV, IPS, IDS, etc all enabled and route at 10Gbps over Multimode Fiber and SFP+. I went with an AMD Ryzen 7 5700GE as the CPU for it with 16GB of RAM. It's enough for my 10Gbps FTTH Internet connection and multiple users as well as a VPN. To me, it's a solid system and I don't know how I ever did before by buying proprietary Cisco Meraki stuff that cost an arm and a leg in licensing. I really like pfsense and I recommend it.
@bdlii10 ай бұрын
Cool man. What do you use for your VPN client? I tried setting up a native W10 client but didn’t have much luck. Planning to try again and do more searching on best options.
@jondonnelly310 ай бұрын
That is one fat pipe!
@jondonnelly310 ай бұрын
I used to do the UniFi stack and ripped it all out. I went for microtek, cheap 2.5G switch and a NAS using an amd 4600GE and a stack of cheap nvmes. SMB 3 can combine 2.5G so NAS has 5G and so does my main PC. I have a WiFi 6E ap 2.5G uplink that covers the whole house with 2.4GHz switched off for everything else except my media pc which is on 2.5. It's works ok. Sometimes the microtek router crashes so i added a fan to it and set it to reboot once a week (2 different issues). The NAS uses no raiding and backs up to a pair of 10Tb WD gold on external caddy. I can literrally grab them and have everything. Photos and docs sync to Google drive. 1G symmetric ftth is the fastest i csn get.
@StephenMcGregor198610 ай бұрын
pfSense is epic
@thepcenthusiastchannel230010 ай бұрын
@@bdlii I use OpenVPN still. Old habbit. There is WireGuard now also available but haven't configured it yet.
@Craigeek10 ай бұрын
I've been running OPNSense for about 7 years now. Minor correction, OPNSense is FreeBSD/Unix not Linux. Great video Dave!
@bradouellette103210 ай бұрын
Been running pfsense as my main router for 17 years. Love your videos. One thing I would add. If people are using the Internet Provider' box, they usually include WiFi, and your setup with the transparent filtering it won't see wifi packets.
@johnnygolden740110 ай бұрын
I plan to disable the wifi from the ISP box and implement a much better managed wifi router behind the OPNSENSE bridge that has full capabilities compared to most ISP boxes these days that limit what you can and can't do
@a9fc9 ай бұрын
hmm this would be only if they're not using the ISP's box only as a bridge?
@notaras19859 ай бұрын
@@johnnygolden7401which did you order
@wilty54 ай бұрын
How do you disable wi-fi on the ISP router?
@bradouellette10324 ай бұрын
@wilty5 I set mine to bridge mode, so it just acts as a cable modem, and passes it to thr ethernet port, no filtering or wifi. You can probably just disable the wifi, in the settings as another option though.
@Techintx10 ай бұрын
In grade school my parents got me an Atari 2400, and it was so cool. That got me into electronics. Then I mowed a lot of lawns and bought a TI 99/4a, and that got me on a route towards computer science. Now I am a cofounder of a shop that makes software that has helped change the world. Don’t discount consoles, but understand the power of a fully customizable computer.
@michaeldeloatch746110 ай бұрын
OK Dave -- show us an OPNSense install on a TI99 ! Definitely not comparable to the Intel Atom, so it should work pretty good, right?
@IBM2910 ай бұрын
As a 5th grader in 1967, I would occasionally help my father transcribe his handwritten FORTRAN programs into something an IBM 1130 could read, using, you guessed it, an IBM29 80 Column Card Puncher. (He was getting his BSEE via night classes compliments of his employer.)
@Techintx10 ай бұрын
@@IBM29 oh god, I remember once helping my dad and dropping a whole stack of punchcards. I don’t remember anything after that.
@Techintx10 ай бұрын
@@michaeldeloatch7461 lmao!!!
@Techintx10 ай бұрын
@@michaeldeloatch7461 It’d actually be really fun to see that happen. I’d imagine you’d get close to 309K baud, if not less.
@lacklustre2229 ай бұрын
Wow you’re such a good explainer! I just got a Lenovo tiny pc to make my own router and I love the fact that you said all the pros and cons of keeping your isp router. We need more of this content! You’re great keep it up
@stucorbishley10 ай бұрын
While I probably won’t go the transparent bridge route (pun intended), seeing OpnSense being run through like this makes me want to dive in. Been running MikroTik gear for over decade and have been curious about OpnSense but often ended up overwhelming myself with info and putting it on the back burner. Great video!
@QualityDoggo10 ай бұрын
MikroTik makes cool stuff too... there's always a trade off as things become more hardware-focused or software-defined. They seem to be a good mix in between.
@priyanrajeevan10 ай бұрын
cheap mikrotik router + their winbox ui is quick and simple , swiss knife for the network
@stucorbishley9 ай бұрын
What is (or is there) the equivalent for transparent filtering bridge for MikroTik, seems pretty CPU intensive so thinking it’s not something a 750 series would offer..
@WillieHowe10 ай бұрын
Great video, Dave. Transparent bridging is a jewel that often gets overlooked. You can also do it with the Synology routers -- which IMO have the best parental and content filters available in their price class.
@Notofsoundmind7 ай бұрын
I had to replace my off the shelf router with a PC I converted into a router using OpenBSD. My ISP at the time would scan their network for devices that identified as routers, then check if the subscriber had their top tier residential service. If the subscriber was not using the top tier connection, then the ISP would throttle the connection, which is what they did to me. By using a PC as a router, I was able to trick my ISP's automated scanners into believing that I had only one machine attached to my modem. After that my connection speed was never throttled again. A home built, PC based router is the best way to go for many reasons.
@oleleclos2 күн бұрын
Thanks Dave for a great video! Fast paced, but hey that's what the pause button is for ;-) I found the configuration recipe linked in the description very useful, but then at first forgot to return to the video to activate intrusion detection and prevention and other services. But everything else worked first time round which was a pleasant surprise as I haven't been this close to the machine for 40-odd years. I'll pass this on to friends and family!
@alunhassall10 ай бұрын
More opnsense videos please. You make it so easy!
@leanderperera84672 күн бұрын
Excellent quick overview of OPNSense and the transparent bridge. Will be on the watch for further videos with more details on configuring the firewall rules etc.
@pc-fc9du9 ай бұрын
This video was linked in a forum post so I watched out of curiosity especially regarding the transparent bridge since I already use OPNsense. Getting to the end, I decided I would subscribe (was watching it on the forum site) and arriving at KZbin discovered I already had, so changed my alerts to 'all' and tapped the like. Very well done video, clear and easy to follow, thank you.
@crazycarl003 ай бұрын
LOL, the CCNA joke got a subscription. Wish I didn't have a crippling ADHD problem that went 40 years before being diagnosed so I could've followed this path after high school like I wanted to at the time. Can't even begin to imagine that life without alcoholism and despair.
@jaredlozano169210 ай бұрын
This is my first hearing of a transparent filtering bridge, thanks for sharing. 👍
@kahrhoshe10 ай бұрын
me too and im in the internet biz lol
@tolpacourt10 ай бұрын
firsttime hearings
@thatcreole991310 ай бұрын
Yeah this is perfect. Would love a deeper episode digging into the experience.
@FreedomDaddy5 ай бұрын
Thank you Dave. I did the IPS / IDS part and the ClamAV. Everything is good but I cannot get VLANS to work on my OPNSense / TP-Link managed switch. So I just made each Proptectli box interface a separate network. It works fine as that is all I need. More OPNSense content would be good, probably things like rules to keep us safe would be a good topic.
@bimsbarkas3 ай бұрын
Congratulations, both of those steps do nothing. Except slowing down your network.
@shanefeather-lopez593510 ай бұрын
Great video, and I almost considered switching from PFsense to OPNsense but I've spent too much time configuring my current setup to want to figure it all out again in another UI 😂
@jp-ny2pd10 ай бұрын
OPNSense is what I use for a lot of BGP edge routers. It works great for sub-10Gig networks. There's also a lot of ISP modem/router combos that mess up IPv6 in bridge mode. So there's a decent chance you may no longer have IPv6 when not using their router.
@ipavemyownroad6 ай бұрын
How do they "mess it up"? Can we work around this?
@mowtown7510 ай бұрын
enjoyed that, and love that we average Jo's can take back some control at little expense. Thank you Dave!
@mowtown7510 ай бұрын
BTW I paused and went to google for a win.ini file example to remember what I used to do, I think it was there that I did dual booting back in the 90's :)
@airborneinferno10 ай бұрын
You're tempting me into trying this out. I have a 1Gbps connection which my Unifi UDR can't pass fully when running the on board IDS & IPS so this transparent filter makes a lot of sense to me. Thanks for the guidance and will try this out soon when I have found a suitable box to load it onto.
@rustyp215 ай бұрын
That's why I'm here - UniFI Dream Router chokes!
@Mickr770111 күн бұрын
I'm in the exact same boat! Supporting a small office, and Unifi gateway chokes the connection with IDS & IPS enabled.
@airborneinferno11 күн бұрын
@@Mickr7701 I have to confess I went the slightly easier route and just upgraded to the Unifi Cloud Gateway Max has a greater capacity for IDS & IPS running. (I managed to sell my Dream Router to a client!) Will still consider this way when I have more time on my hands to tinker.
@jasonbryant23775 ай бұрын
Dave your dry humor is right up my ally. Thanks for all you do. I love your videos. Yours truly, fellow Techie/Gear Head.
@_goobs10 ай бұрын
Thanks for this. I've been using OPNSense for a while and didn't realize I wasn't getting the most I could out of it. And Chuck's a smart guy, but thanks for making content that's easier to digest.
@DavidHuffTexas10 ай бұрын
_"Errata: OPNSense is FreeBSD, not Linux!"_ I'm an old, grey-bearded Unix sys admin, and that makes me like it even more.
@JeordieEH10 ай бұрын
That is what I was wondering, I remember pfsense was unix and I thought maybe they ported it over to Linux? Thanks for the clarification.
@imadam10 ай бұрын
why do you hate linux?
@esk10310 ай бұрын
You mean there are other *nix based OSs than Linux? FreeBSD is one of the OG versions of Unix. It is horrible what AT&T (or whatever their name was at the time) did to this *nix branch!
@DavidHuffTexas10 ай бұрын
@@esk103 Well, since AT&T's Bell Labs _invented_ Unix, they did what they darn well pleased with it back in the day :) @imadam I don't "hate" Linux, I just like FreeBSD a bit better. It's dead stable and I'm used to the way you do sys admin tasks on it. I also like the license it's released with better vs. the GPL. And apparently so did MS back in the day. I understand that they used the BSD network stack to add networking to Windows. Don't have details, but I bet our erstwhile host might...
@ZathrusGizmo1239 ай бұрын
Thanks Dave for this video! Being on the spectrum this was like eating popcorn for my brain! ❤
@rolandleyco5735 ай бұрын
Thank you for getting me started on OPNsense! I'd like to see more OPNSense content to get more tips and trick on my whole system. I recently just started on my networking journey and I all self taught. Guides like this are so digestible, I wouldnt mind getting more information on specific detail and why things should be.
@MompfDompf10 ай бұрын
Love your videos, because it give me some ideas, what to do in the near future on my home network. I'm now so far, as having VLANS to seperate any kind of critical stuff, IoT(rash), Wifi etc. But your videos give an inspiration to my next further steps. Thank you so far.
@wngimageanddesign954610 ай бұрын
great video, Dave! Now I know how to go for upgrading an old pfsense build based on an Atom in an old Dell ITX case. New motherboard and cpu! I think I'll try OpenSense this time! And I got a 1U chassis for it too. I need to switch to a proper server tower and integrate my set up instead of a bunch of boxes and cabling piled on a desk.
@joebelson712210 ай бұрын
Incredibly helpful. I'm typically over cautious whenever touching my OPNsense configuration, having caused some self inflicted outages - due to ignorance & an inherent rtfm aversion. Dave, thank you for vetting IDS & IPS and ClamAV and showing us how to implement. I am hopeful that you will decide to help us with more OPNsense configuration help. I'm using my implementation for: VLAN segregation (tv, cams, laptops, iot, printers, guests), DHCP, firewall (internet, no internet, and port filtering). How would I implement country filtering?
@BaldrsFate10 ай бұрын
Thanks Dave, we need more fun and exciting cyber security videos and other ways of protecting us and our families online
@richziegler419410 ай бұрын
Upgraded from Subbed to "Notify All" This is EXCELLENT content!
@JohnPMiller10 ай бұрын
He's a "solid bell" for me too.
@Ozz46510 ай бұрын
the momment his stle sunk in , i did the same. Straight to the nitty gritt . love it
@airsay10 ай бұрын
Just upgraded to subscribe. Notify all loading
@rasmars3 ай бұрын
Please do more of these videos on OPNsense! I've appreciated this very video very much, and it helped me to figuring out how to best implement my hardware firewall. Cheers Dave!
@What_s_Neu10 ай бұрын
Dive deeper! You make great videos explaining things so good.
@3dmakerzone7510 ай бұрын
Great rapid fire information on OPNSense. I would to see a deep dive.
@RaymondJohnsonM10 ай бұрын
Installing OPNSense as a router greatly improved network performance especially when used with unbound DNS. Page loads are faster, and the Latency in games is about 20-30% better. Goodbye isp hardware. WoW latency was 56-64ms, and it now sits about 36-41ms. Love it!
@stuartedwards69969 ай бұрын
What hardware are you using for OPNSense?
@pioruns5 ай бұрын
Sorry to disappoint you, OPNSense transparent bridge cannot decrease your real gaming latency. Perceived latency because DNS caching does not affect real connection between you and Blizzard server.
@dominator211710 ай бұрын
Man, when this guy posts you know its going to be a good video!!! Very Excited for this one!!!! Thanks Dave!
@r000tbeer10 ай бұрын
More OPNSense videos, please! I would suggest: ACME client for GUI certificate automation, an overview of Aliases, and how to setup a VPN connection.
@michaeldeloatch746110 ай бұрын
Thanks Dave -- just about the best content yet among all your vids I have watched.
@larry40010 ай бұрын
Been using pfsense for years as a secondary firewall device on a backup network service, but never seen anything like this. Thanks for the new information and will put it to use very shortly. Need to get a device for home.
@truckerallikatuk10 ай бұрын
I use PFsense myself. An excellent product. Quick edit: gigabit only needs a reasonably new Atom, or a Sandy Bridge era pentium... Dave is right, faster needs more horsepower, especially with IDS/IPS. Also: PF and OPN sense are BSD based, not Linux. Not that it matters.
@JohnPMiller10 ай бұрын
It can matter for hardware support. Linux supported Intel i226 NICs before FreeBSD. I use pfSense CE, but I'm thinking of switching to OPNsense. I'm worried that pfSense CE could become paid software like pfSense Plus.
@ChrisMilton-Miltron10 ай бұрын
BSD\UNIX\LINUX same thing.
@ralmslb10 ай бұрын
Regarding being BSD based and not Linux, it does matter. The reason I stopped using PFSense, was essentially due to the extremely out of date Intel drivers. Switched to Linux (using VyOS), the exact same box, had a 4x performance improvement doing the same thing.
@darkdelta10 ай бұрын
Me too, got a Netgate 4100, mounts in my rack. pfsense, lots of packages to choose from.
@ramosel10 ай бұрын
I run pfSense+ with Snort (inline)and pfBlockerNG on a Netgate SG-4860 appliance. I rarely see CPU usage over 20%... and that is only an Atom 4 core C2558. I really like having the ZFS Boot environments.
@Suzuki_Hiakura10 ай бұрын
I remember going through the trouble of buying a cheap router with multiple antennas just to expand the Wi-Fi signal to the rest of the house... never could do much for antivirus stuff, but was nice to learn how to set up an access point for future reference and learn to navigate the router settings and the like.
@stephanszarafinski900110 ай бұрын
Interesting video, nice to watch as well. I would 100% use a dedicated management interface (on a 3rd interface). That way you don’t pollute your wan traffic with local management traffic. You also don’t have the risk of making the box unmanagable. Anwyay, transparant bridges are cool ❤ I first used one 22 years ago, on redhat linux with iptables. Bridging was just new in the kernel, exciting times 😂
@MiFonito7 ай бұрын
Very well made, please do more for OPNsense. The quality of videos you do is awesome.
@dcc116510 ай бұрын
FYI -- small technical note - OPNsense is based on freeBSD based, not Linux - big difference to guys like me who nitpick about the differences...lol...but in the *nix world these days, it hardly matters :). I currently run pfSense and for some reason, it doesn't want to update to the latest version. Some plugins, I use (especially pfBlocker) can't be upgraded because they require the updated pfSense OS, which means those plugins are no longer the latest version. Since I'm looking at a reload/rebuild to get to the latest pfSense version, I may opt for OPNsense, thanks to this video. :)
@BPL-Whipster10 ай бұрын
OPNsense is great. Deciso also offer commercial support but don't seem to be mega cash grabby yet. There's also a third party add on (Zenarmor) available that gives you ngfw features like content filtering and other fancy crap. I'd use it for customers, no problem.
@mithubopensourcelab48210 ай бұрын
If your pfsense is failing to upgrade, here is the super secret sauce to correct the situation. Just run it into pfsense shell [ press f8 on pfsense console or ssh it ] certctl rehash pkg-static update -f pkg-static install -fy pkg pfSense-repo pfSense-upgrade once completed, just visit upgrade, you will get latest updates.
@rjy896010 ай бұрын
The use of FreeBSD as a base platform is great from a stability perspective - it is pretty much bombproof as far as *nix is concerned but the community is very slow to add new device drivers and then it takes an extra age for the drivers to trickle down into pfsense and opnsense. Opnsense seem to be more responsive to adding new PHY support than pfsense but it is still a lengthy process. It's a stability vs new shiny thing support tradeoff. Not that we don't need support for new shiny things. I've been running pfsesne for a few years and I'm comfortable with it. But it comes down to what you prefer and get used to. Both forks are great.
@ppal64Ай бұрын
What difference does it make in the implementation .
@tomkimes10 ай бұрын
Great video, informative and straightforward configuration description - just how it should be done! You've got my vote for additional videos. My suggestion is a video to dive into more detail of the transparent filtering bridge in operation, such as: what does a client see when packets are rejected due to geo-ip or virus detection, etc., how to setup log monitors and notifications, backing up the configuration and any other operational suggestions.
@tomkimes9 ай бұрын
I can't see how the ClamAV works through the bridge. I'm pretty sure the configuration is correct, but when I try the Eicar test download the signature appears instead of being blocked. Any suggestions are appreciated. I suspect the ClamAV plugin depends on a Web Proxy??
@Andreas-kp9pj6 ай бұрын
14:33 Please more digging deeper into OPNsense! Thank you for your high quality content. Best regards
@rjstewart9 ай бұрын
Back around 2000 we implemented a filtering bridge (we called it a Fridge since it was an appliance lol). IIRC it was built on one of the BSDs which had the quirky feature at the time of being able to inspect IP packets with the interfaces bridged and no IP address bound. It was the outside firewall on a DMZ for a large law firm. One of the selling points was you physically had to walk up to it to do anything to it!
@scotterdog103610 ай бұрын
I could just hug you Dave! Thank you.
@paulo.valverde10 ай бұрын
Great quality tutorial! Subscribed! Maybe in the future dive into more network segmentation and combining routers and switches. I liked the way you explained things! Very clear and easy to follow.
@kmolder949910 ай бұрын
Your previous video was so popular a Telegram scammer reached out to me pretending to be you. This person told me I had won a Macbook pro and iPhone pro... all for being a such a great subscriber.
@id10433540910 ай бұрын
You are!😊
@EnVideoZone10 ай бұрын
Same thing happened to meet with Explaining Computers - they should leave our teachers alone!
@paulw740410 ай бұрын
I always ask them to send me their Credit Card Number, SS number and Mothers maiden name before any further communication from them!
@beachroadfilms3 ай бұрын
Using OPNSense as a transparent bridge is awesome Dave. This is exactly what I was looking for. Thanks Dave !
@justnicksc10 ай бұрын
Thanks for the demo. I really enjoy the content you make and have learned alot of great tips from your channel
@phxsisko9 ай бұрын
I retired a netgear R8000 3 months ago and started using a Qotom 8 core Denverton based PC /w 4x10G/5x2.5G ports as my new router/switch using Opnsense. I can testify, Opnsense is hella good. I too selected it over Pfsense for the GUI and because it supports QAT for free over Pfsense which forces you to buy a sub to enable this feature. I also bridged mine, but that's because i'm using it like a home router since it's being used in a home (lol). That being said, the power and flexibility is insane. I wish it had some basic NAS features or a NAS plugin, but other than that, it pretty much does everything I want and more. Opnsense is more popular overseas and I think that's another reason I chose it. I don't plan on retiring in the US given how fast it's declining.
@RegularCupOfJoe10 ай бұрын
Thank you, Dave. I'm the go to "network admin" for many in my family as well as a few business/organizations. I've used PiHoles, which are ok for light or low traffic networks, but i've found that I need a lot more power. Thank you for showing us this. I will start tinkering with it myself and then see if I can apply this to (especially) the businesses and organizations whose networks I help keep up to date. Please share more OPNSense stuff.
@unicaller110 ай бұрын
The Unbound DNS plugin dose a good job for DNS filtering, Pi-Hole is hard to beat from an admin and stats standpoint though.
@markusmcgee3 ай бұрын
Solid video. This has been on my mind for eons. Time to buy some stuff. Thanks Dave!
@kevinsadowy560210 ай бұрын
I appreciate your no nonsense approach to narration. Then add just a bit of humour to fill the time as needed. 👍
@BB-nn9en9 ай бұрын
Same. I can't stand modern KZbin and their rewarding of crap filler content to meet a certain video length. Thanks Dave!
@elenorsnow89707 ай бұрын
Clicked on this vid... read the description and thought "OOOH, gotta watch this!" Then I checked and it's DAVE!!! I've read his AMAZING and helpful (and fun!) book. I love his vids! I'm looking with horror and worry at the ending of Win10 support (and oh, I'm TRYING to get into Linux... but my TWO main biz programs don't DO Linux, and until I get smart enough to TRY them with WINE or Bottles or whatever... I must prepare for how to 'go on' when the evil MS shuts 10 down. Please, Amazing Dave... definitely some more vids on security going forward!! THANKS! (Everyone get his book -- it's great!)
@spuds767710 ай бұрын
This reminds me of the old Smooth Wall I had setup years ago. I had 3 NICs in it, so I can have an in, out and a DMZ.
@philrymer832510 ай бұрын
Hi Dave, just saw your tutorial, great video, would like to see a deeper dive on opnsense. You gained another suscriber and like!
@vveso10 ай бұрын
Awesome video Dave, very educational and helpful for home protection. Easy to follow along as well! Much appreciated!
@righttoitpl7482 ай бұрын
i’m 2 minutes in the video and damn i love you my dude you go directly to the point and have a way to explain thing making them easy to understand
@kstaxman29 ай бұрын
This looks like a simple way for most of us to add security and avoid the headaches of having to mess with the rest of our network. Every time I've looked at setting up something like this I've worried about just what you said, ending up with my network down and no understanding of how to get it back up. This set up doesn't leave you facing that prospect. Thanks so much for sharing this with us all. I'll be giving this a try.
@action226118 ай бұрын
I love how your literally the first KZbinr that was honest about likes and subscribes. I rarely ever like or sub but you my friend get both!
@lingfish110 ай бұрын
Critical Care Nursing Assistant... lol.
@danman3210 ай бұрын
I was wondering if he was joking or not. But, it 4/1 is it not?
@xWaLeEdOoOx10 ай бұрын
it went past me for a moment then i was wait a min... what?!
@walter.6610 ай бұрын
😂 brilliant.
@mitya10 ай бұрын
Still beats MCSA :)
@thentil10 ай бұрын
Made me actually laugh out loud 😂
@glen4cindy3 ай бұрын
I decided to give this another try. I wiped my entire first install and started again. I tried to follow every step of the instructions. I started with IN and OUT connected between my router and switch. Everything worked as expected. After "Applying changes" I was still able to access the management IP. After moving IN and OUT between my modem and router as suggested here the transparent filter appears to "work" i.e. my internet access works but I cannot access the management IP anymore.
@jimspc0710 ай бұрын
@ 6:30 in the video. I love the penultimate solution to something not working as you thought it would. “Just unplug the cable and put it back where is used to go”. That's my kind of solution, easy and not requiring a ”what the hell did I do” investigation and an undoing, before it all works as it was. We know these things often progress without notes and the odd bit of finger pokin’ logic as one get into it. The ultimate solution, of course, when it does not work as intended, being pull out the plug and go to the pub. There is always, always, someone there who has the answer, all it takes is remembering it what it was. I used my ISP router to feed my network router mainly because it was a well known load of junk. I had to use it as there is a VOIP line connection land line and they will not let out the data to enable a move. I have since reverted to the ISP router as I got a new updated one after the old one expired. I should get back to using a safer method again. Before my old management cry of "are we exposed" becomes a realty.
@Tsiikki10 ай бұрын
Dave you used to say that you do these only for subs and likes, now mostly. 😅 Please continue this series!
@lgf3002210 ай бұрын
Thanks for this. Now my next network project!
@robersonorg10 ай бұрын
Thank you. Well Done. Your presentation style makes it a pleasure to revisit old times (Tech, in my case) and still tinker with the house set up!
@Hindsight10110 ай бұрын
Yes please! More OPN videos. The only issue I have is once all this is done I can no longer get any new plugins just the ones I have. Any advice?
@roba244010 ай бұрын
Love the videos. Many isp routers have adsl/cable interface, Wi-Fi, 4port switch and dhcp all integrated. I would really like a video on how to use this transparently with such a box - so I don’t have to buy another box for all those things.
@H3cJP8 ай бұрын
a tiny correction: OPNsense is based on FreeBSD, not Linux great video, im planning to setup a router with opnsense
@krizzo10 ай бұрын
Basic but good video, FYI OPN is pronounced just like open so it's opensense like open source. You're reasoning for picking it over PF, the UI is basically the number one difference. Ran pfsense for a few years and about 2 years ago, I tried OPNsense in a VM for testing purposes, we've come along way from ipcop and others. Thanks for bringing it back to my attention I may have to try running it again.
@GeorgeMixalis10 ай бұрын
This is like the worst video thumbnail in the history of youtube, but i cant help but love it 😊. Great video and content as always
@johnnyjohnson67719 ай бұрын
Great video on a subject we all need. I love the direct, fast and no bull crap delivery. Please keep up with this type of content. Now subscribed and looking forward to more.....
@3rett11510 ай бұрын
This is a great start, but unfortunately IDS/IPS is severely limited to being almost useless because of HTTPS/TLS. A PKI can help quite a bit but is more advanced configuration and introduces issues itself with certificate pinning. I would recommend a video on EDR or even something like Crowdsec, which is more effective than an IDS transparent bridge.
@DaveGamesVT10 ай бұрын
Yeah, I was wondering about that. Surely it wouldn't be able to inspect HTTPS/TLS packets...?
@mattheww7979 ай бұрын
is it possible to test downloading the test virus from antiviurs site and seeing if ids/ips catches it?
@freespeech20079 ай бұрын
I asked AU - Certainly! Detecting viruses over HTTPS (encrypted) delivery is a crucial aspect of network security. Here’s how Intrusion Prevention Systems (IPS) handle this: Traffic Inspection: HTTPS traffic is encrypted using TLS/SSL protocols, making it challenging to inspect the payload directly. However, modern IPS solutions can perform deep packet inspection even on encrypted traffic. They achieve this by: Decrypting the encrypted traffic temporarily. Analyzing the decrypted content for malicious patterns. Re-encrypting the traffic before forwarding it to the destination. Challenges: Performance Impact: Decrypting and re-encrypting traffic adds computational overhead, affecting system performance. False Positives: Decrypting traffic may lead to false positives if the IPS misinterprets benign content as malicious. Privacy Concerns: Decrypting user data raises privacy concerns, especially in enterprise environments. TLS Inspection: Some IPS systems support Transport Layer Security (TLS) inspection. They maintain a database of trusted certificate authorities (CAs) and use it to validate server certificates during decryption. If a server certificate is not trusted or revoked, the IPS can block or alert on the traffic. Signature-Based Detection: IPS systems use signature-based detection to identify known malware patterns. They maintain a database of signatures for various threats. When inspecting decrypted traffic, they compare it against these signatures. Behavioral Analysis: Advanced IPS solutions employ behavioral analysis. They learn normal traffic patterns and detect anomalies. For example, if an encrypted connection suddenly transfers large files, it might raise suspicion. Heuristics and Machine Learning: Some IPS systems use heuristics and machine learning. They analyze traffic behavior and adaptively learn to identify new threats. Evasion Techniques: Malicious actors use evasion techniques to bypass IPS inspection. They split payloads across multiple packets or use obfuscation. Modern IPS solutions continuously evolve to counter these techniques. In summary, while detecting viruses over HTTPS is challenging due to encryption, modern IPS systems employ various techniques to inspect and protect against threats even within encrypted traffic
@jroysdon9 ай бұрын
@@DaveGamesVT - it can still tell domains/IPs and block known-bad or known-compromised sites. But, yes, to really inspect, it would need to MitM the HTTPS traffic to decrypt, inspect, and then encrypt it again. But it can still detect many types of traffic without decryption, just not payload inspection.
@DaveGamesVT9 ай бұрын
@@jroysdon I'm a newbie to this topic but wouldn't that make the virus scanning option for this completely useless?
@circleofowls9 ай бұрын
Please do more OPNSense stuff. I already had a box setup between my modem and switch using an old Dell Optiplex Micro but I hadn't been aware of the Clam AV service, now that I am and have it setup, I'm wondering what else I've missed in there. Fantastic video!
@ericandrews486110 ай бұрын
Would love to see more in-depth configuration follow up.
@RobertWallace10 ай бұрын
Thanks for this video. It's not the first video from the channel I've seen, but it's the one that made me subscribe. I'm looking forward to more OPNsense videos since I'm looking at setting it up as my main router\fw.
@l0gic239 ай бұрын
Me too, same here
@gregjones395210 ай бұрын
Appreciate the straight forward approach you use. Would love to see more content like this.
@handle_your_set8 ай бұрын
Thanks Dave. I had this in the back of my head.. yada yada., I recently started dusting off my old skills and had this concept in my head but hadn’t yet hashed out the how part. Side note, your win.ini chuckle still has me giggling.
@grantc835310 ай бұрын
Thanks Dave. You had me up till 3am as a spur of the moment setting up a new router. My boss said to tell you not to do it again. Thanks 😅
@DominicFlynn10 ай бұрын
Yes.. This is a very useful path to explore for your subscribers imo. More videos on OPNSense.
@maxs298210 ай бұрын
So turning on IDS/IDP is just a matter of checking the box? No other configuration needed? That's awesome.
@MatthewReiser1236 ай бұрын
Even more excited to try OPNsense than to open my first Playboy magazine, but that was 40 years ago, and things have changed a bit.
@mattador184610 ай бұрын
Bravo! Great content, would like to see more of a deep dive in this and more similar content. Thank you Dave!
@Blarpington10 ай бұрын
I would like to see a deeper dive because many of the features you enabled won't really work without deep packet inspection set up. I don't think deep packet inspection is possible in transparent bridge mode but I would love to be proven wrong about that.
@UnixDaemonKiller10 ай бұрын
I got it working in pfSense. Your NIC must support RSS and netmap. I always have issues with igb and em cards (probably because igb drivers are built on em.) igc and ix cards work great. There are both inline and legacy deep packet inspection ids/ips. Inline is a bit more powerful. I use the inline ips on the lan and limiters on the WAN. Also I think for the sake of the NIC memory it may be relevant to consider using two separate NICs of matching types. It is also worth noting that NICs only support certain types of ethernet cables. ie no cat8 on an i225 nic if you want everything to work perfect. cat5e or cat6a
@Nerzhina10 ай бұрын
Hi Dave. You are both brilliant & a genius at these essential, practical IT video tutorials. Magnificent content. Bravo!