Thank you! This was exactly what I needed. I understand more now.
@AntiCoruptionCentral7 ай бұрын
3:23 "... sane defaults ..." Setting up OPNsense is enough to drive you insane in the membrane.
@sysadmin1027 ай бұрын
It’s the same as pfsense, not much difference.
@AntiCoruptionCentral7 ай бұрын
@@sysadmin102 Agreed. Similarly complex and confusing for those not birthed w/ ethernet cord attached. Trying to find a comprehesive and comprehendable HTTPS/CA tutorial is like pulling teeth.
@lencumbow2 ай бұрын
Excellent. I struggled a bit with your accent, but I'd rather listen to a real person than computer generated narration. Good work. Thank you.
@mafeceng9 ай бұрын
Many thanks! Very useful tutorial....
@zyghom Жыл бұрын
great tutorial - I was looking for the same ;-)
@poise6193 ай бұрын
Hello, aside from getting rid of the annoying warning from the browser alerting of the unsigned certificate when logging into opnsense, what other benefits/ use case can this be used for? Regular home user with no website hosting etc.
@sysadmin1023 ай бұрын
You should be fine using self-signed certificate. For home use, I don’t see any benefits if you are not hosting any services or servers behind your firewall.
@jesusleguiza774 ай бұрын
How would the configuration be if I have multiple domains for different web servers? Because there you configured a specific one in the general configuration. regards
@sysadmin1024 ай бұрын
You would need to use reverse proxy such as Caddy. Currently I do not have any videos on this.
@jesusleguiza774 ай бұрын
@@sysadmin102 I say too for create ssl for each one domains, not problem?
@jimwade1416 Жыл бұрын
how do I know if I'm using DNS Validation?
@sysadmin102 Жыл бұрын
If you use the DNS-01 verification method
@jimwade1416 Жыл бұрын
@@sysadmin102 Thanks! I am using DNS-01. It did not complain when I added the wildcard as the alternate and successfully created the certificate.