Home Network Guy
Home Network Guy
  • 77
  • 850 710
A Raspberry Pi 5 OpenWRT Router with 2.5Gbps LAN!
In this video, I demonstrate the viability of using the Raspberry Pi 5 with a 2.5 Gbps HAT as a OpenWRT router.
Spoiler alert!: It works great! It is the first Raspberry Pi model in my opinion that makes a solid basic home router or even a travel router without as many compromises.
Because OpenWRT is very lightweight, you would only need the 2GB model of the Raspberry Pi5 since less than 100 MB of RAM is necessary for the base install. In addition, you do not need much disk space as OpenWRT defaults to only allocating 100 MB of disk space.
The cost of the 2 GB model, 52Pi 2.5Gbps HAT, and a Raspberry Pi power cord is close to $100 USD ($50 for the RPi 5, $30 2.5Gbps HAT, and about $20 for the power cord). You would, of course, need to decide if it makes sense for your use case as a home router vs purchasing a cheap Intel N100 mini PC.
Amazon affiliate links:
Raspberry Pi 5: amzn.to/3D7rdNq
Raspberry Pi power supply: amzn.to/3ZAUEPG
Non-affiliate links:
Raspberry Pi 5 2GB: www.pishop.us/product/raspberry-pi-5-2gb/
52Pi 2.5Gbps HAT: 52pi.com/collections/hat-addons/products/raspberry-pi-5-b12-double-fpc-pcie-hat
52Pi 2.5Gbps + NVMe HAT: 52pi.com/collections/hat-addons/products/52pi-w01-u2500-usb-2-5g-ethernet-nvme-for-raspberry-pi-5
EP62
#RaspberryPi #OpenWRT
Join this channel to get access to perks:
ua-cam.com/channels/vdHQkQv8KpwMnKkitmUVTQ.htmljoin
Переглядів: 6 350

Відео

Light Base PC Cases from be quiet!
Переглядів 824Місяць тому
be quiet! sent me their new Light Base PC cases to check out: the Light Base 600 LX and the Light Base 900 DX. These cases offer high visibility inside the cases since both the front and side panels are tempered glass. In addition, you have the option to stand the cases vertically or horizontally on your desk or floor. It is great to have flexibility in how you wish to orient the case. The Ligh...
OPNsense Transparent Filtering Bridge
Переглядів 7 тис.Місяць тому
A frequently requested guide on how to create a transparent filtering bridge in #OPNsense! A transparent filtering bridge allows you to use OPNsense purely as a firewall on your network using your existing network hardware. Because a transparent filtering bridge is physically inserted between 2 devices on your network, you can place the filtering bridge in multiple areas of your network where y...
7.9 Inch Ultra Wide Portable Touch Screen
Переглядів 1,7 тис.Місяць тому
I took a look at the Elecrow 7.9" long strip touch screen display in this video to see how one might want to use such a panel in their homelab. One could use it on the wall, desk, inside a PC, on or in a server rack, and more. In addition to the Home Assistant dashboard, I tried a couple other dashboard apps to see how they would work with this screen. You would need to do some tweaking to get ...
JetKVM - Budget Friendly Remote Administration via KVM over IP
Переглядів 13 тис.Місяць тому
JetKVM is a new KVM over IP device which is aimed at being a high quality, budget friendly product for homelab enthusiasts. In this video, I take a detailed look at the device to show you its capabilities. I really love the build of the JetKVM it feels like premium hardware. They used a die cast ZAMAK 7 zinc alloy for the case. The web interface looks modern and sleek. It also has nearly all of...
An Intel Atom C3000 Series Proxmox Server!
Переглядів 3,4 тис.2 місяці тому
I took another look at the Tometek TC300-TTG to use as a Proxmox server now that a longstanding Linux kernel v6.x bug has been fixed. Prior to August 2024 and kernel version 6.8.12-1, connecting the X553 SFP 10G interface to a network switch would not work properly (but connecting another PC directly to the X553 worked properly). To work around this issue, you would have to compile the Intel X5...
DIY Intel N100 Rackmount OPNsense Router Firewall (or Lightweight Server)!
Переглядів 14 тис.2 місяці тому
Let's build an Intel N100 2U rackmount system that can be used for OPNsense or as a lightweight server! If you are looking to build a custom, energy efficient, rackmount system, this video shows one example you could consider! I plan to use this build in a future video when I do an updated full network build guide. In the long term, I plan to use 2 of these rackmount systems as 2.5/10G throughp...
A Raspberry Pi Sized x86-64 SBC / OPNsense Example using a Single NIC!
Переглядів 7 тис.3 місяці тому
Wish you could have a single board computer (SBC) with the same form factor as the Raspberry Pi but was x86-64 instead of ARM? Radxa has created the first x86-64 SBC (that I am aware of) that mimics the form factor of the Raspberry Pi 4 with their X4 model. I thought it would be fun to demonstrate using OPNsense with a single NIC since I have not yet created any guides using a single network in...
Full Stack Grandstream Network!
Переглядів 1,5 тис.3 місяці тому
In this video I take a look at a full stack Grandstream network to demonstrate how you can manage all of Grandstream devices from a single pain of glass similar to other vendors. With Grandstream, you can manage the hardware using their new convergence devices such as the GCC6010, but you have other options as well: cloud managed, self-hosted software controller, local web interface on each dev...
XikeStor 12-Port 2.5G 10G L2 Managed Switch!
Переглядів 3 тис.4 місяці тому
If you are looking to get a L2 managed switch with 2.5/10G interfaces which has more than 6 ports at a budget friendly price, you may want to check out the 12-port XikeStor 2.5/10G managed switch! This switch is a rack mount switch but you can also use it on a desktop or mounted to the wall. In this video, I discuss various details about the network switch and show some of the more important fe...
Securely Access Your Home Network with WireGuard VPN on OPNsense
Переглядів 25 тис.4 місяці тому
If you wish to access apps, services, and other devices on your home network remotely, you may set up a VPN server on your network. #OPNsense includes options for IPsec, OpenVPN, and WireGuard VPN. In this video, I will be demonstrating how to set up Wireguard VPN using the latest version of OPNsense and WireGuard. I will also show how to access a hosted web app behind the virtualized instance ...
ZimaBlade - TrueNAS Replication Target
Переглядів 2,3 тис.5 місяців тому
Have you wanted to set up a low power, TrueNAS replication target so you may have an additional replicated backup on your network? In this video, I demonstrate how to set up a second TrueNAS Scale installation and configure it to be used as a replication target. IceWhale Tech sent me their #ZimaBlade 7700 to try out. The ZimaBlade is essentially a smaller form factor, lower cost version of the ...
Creating a Basic 3 Node Proxmox Cluster!
Переглядів 8 тис.5 місяців тому
In this video, I finally finish creating a basic 3 node Proxmox cluster! It has been on my todo list for a while so I am glad the project is completed. I already had 2 independent Proxmox servers on my network (one hosting all my apps/services and one hosting primarily Home Assistant so it would stay online when I took my main server down). Therefore, it made sense to add a 3rd node to create a...
Build a Standalone Plex Media Server/Media Player for Your TV!
Переглядів 13 тис.6 місяців тому
If you have wanted to build a Plex Media Server but want to use the same system to also view the media on a TV, I walk through the process in this video using the Protectli V1210! I will demonstrate how to set up Plex Media Server as well as the Plex HTPC app on Ubuntu 24.04. The V1210 has the Intel N5105 CPU and 4 GB of soldered RAM (so it's not expandable). However, the N5105 supports hardwar...
Prepping for the transition to a Proxmox cluster!
Переглядів 2,2 тис.6 місяців тому
For those interested in creating a Proxmox cluster, I thought some intermediate steps I am taking to migrate to a Proxmox cluster comprised of several mini-PCs which will be replacing my old, more power hungry Proxmox server. I realize that clusters aren't for the average home network, but I'm planning to keep it relatively simple for now with Proxmox by only leveraging some replication of my O...
Tometek TC300 TTG Mini-PC/Server
Переглядів 1,4 тис.6 місяців тому
Tometek TC300 TTG Mini-PC/Server
Budget Friendly 2.5/10G SODOLA Switches!
Переглядів 7 тис.7 місяців тому
Budget Friendly 2.5/10G SODOLA Switches!
Speed Testing the EnGenius EWS276-FIT Wireless Access Point!
Переглядів 7087 місяців тому
Speed Testing the EnGenius EWS276-FIT Wireless Access Point!
PC Builds with be quiet! Cases, CPU Coolers, and Power Supplies
Переглядів 7277 місяців тому
PC Builds with be quiet! Cases, CPU Coolers, and Power Supplies
Addendum: Virtualizing OPNsense on Proxmox as Your Primary Router
Переглядів 7 тис.8 місяців тому
Addendum: Virtualizing OPNsense on Proxmox as Your Primary Router
Virtualizing OPNsense on Proxmox as Your Primary Router
Переглядів 99 тис.8 місяців тому
Virtualizing OPNsense on Proxmox as Your Primary Router
Introducing the Protectli VP6650!
Переглядів 6 тис.8 місяців тому
Introducing the Protectli VP6650!
EnGenius ECP106 PDU
Переглядів 6399 місяців тому
EnGenius ECP106 PDU
Caddy Reverse Proxy using DNS Challenges and CrowdSec Multi-Server Config with OPNsense
Переглядів 14 тис.9 місяців тому
Caddy Reverse Proxy using DNS Challenges and CrowdSec Multi-Server Config with OPNsense
Configuring a Management VLAN
Переглядів 21 тис.9 місяців тому
Configuring a Management VLAN
EnGenius 1G PoE Managed Switches (ECS1112FP & EXT1105P)
Переглядів 54010 місяців тому
EnGenius 1G PoE Managed Switches (ECS1112FP & EXT1105P)
Grandstream GWN7806P/GWN7806 48-Port Switches
Переглядів 1,1 тис.10 місяців тому
Grandstream GWN7806P/GWN7806 48-Port Switches
Fundamental Network Interface Configuration in Proxmox
Переглядів 34 тис.10 місяців тому
Fundamental Network Interface Configuration in Proxmox
The ZimaBoard 832!
Переглядів 1,4 тис.11 місяців тому
The ZimaBoard 832!
Captive Portal Configuration in OPNsense
Переглядів 9 тис.11 місяців тому
Captive Portal Configuration in OPNsense

КОМЕНТАРІ

  • @btaranto
    @btaranto 23 години тому

    Very nice! Old linksys! Cool!

    • @homenetworkguy
      @homenetworkguy 23 години тому

      Haha yeah. It still works! I like using it for illustration purposes sometimes since it’s so recognizable as an old school consumer WiFi router.

  • @Chris_Heath
    @Chris_Heath День тому

    @HomeNetworkGuy maybe I missed it, but when you are assigning the two VLANs to the eth1 2.5gig LAN what did you do to get the clients to be on their respective VLANs vs the main (dot 2) subnet?

    • @homenetworkguy
      @homenetworkguy День тому

      I also have the network switch configured for the 2 VLANs. The 2.5G interface is connected to the switch as a trunk port allowing all VLANs to pass. I configured 2 other ports to be on the 2 VLANs I set up in OpenWRT. The focus of the video was just a quick proof of concept of installing OpenWRT and being able to get full 2.5G throughput across 2 VLAN interfaces so I didn’t show all of the other details to keep the video at a reasonable length.

    • @Chris_Heath
      @Chris_Heath День тому

      @@homenetworkguy ok great, thanks for clarifying ... so the switch is managed and the ports were specifically configured for VLAN 10 and 20 ... got any recommendations for managed switches? I've got few 8 and 5 port unmanaged that I'm looking to replace so I can do VLANs ... also, can this be done over WiFi ? (most of my VLAN needs are for IoT WiFi devices) TYIA

    • @homenetworkguy
      @homenetworkguy 23 години тому

      A lot of people love UniFi but I’ve been getting into Grandstream network hardware because they are more affordable and have more management options (every device has its own local web UI and you can centrally manage all of the Grandstream devices from a locally hosted controller, their cloud management platform, and their router/convergence devices- not to mention their APs can manage other APs).

  • @KDural
    @KDural 2 дні тому

    Lol.Total idiot - Sorry..

  • @jasonmehlhoff8877
    @jasonmehlhoff8877 2 дні тому

    I am directly connected to my OPNSense VM but when I go to the GUI to login it does not except my password. The password works in the Proxmox console though?? Do you know what's going on? I have reset the password multiple times to no avail. Thanks!!! Jason M

    • @homenetworkguy
      @homenetworkguy День тому

      That’s odd because the username and password should be the same for the same user when logging in via the OPNsense console or the web GUI. I’m not sure why there would be a difference. If you’re using two factor authentication you will need to include your 6 digit code at the beginning or end of the password depending on how you configured it.

  • @lckillah
    @lckillah 2 дні тому

    This is exactly what I was looking for. Would you recommend going this route and using my TP Link AX11000 router as an access point and have the pi 5 as a router/homelab for personal cloud storage and route all traffic through the PI? Or is using the Pi 5 connected to the AX11000 and have the Pi 5 handle the VPN, Adguard, and other homelabs function? I just got the pi 5 and was thinking of going this route: ISP Modem > Pi 5 > AX11000 router. I'm probably going to end up getting the GL.Inet flint 3 when it comes out. But just wondering what are the possibilities of the Pi 5 since I just got the Pi 5 with 8gb ram while there is a micro center nearby where I am vacationing for the holidays.

    • @homenetworkguy
      @homenetworkguy 2 дні тому

      I haven’t tested the full performance of the Pi 5 other than the basic setup which seems to handle routing across VLAN interfaces at 2.5G. The TP-Link would likely be the better all in one solution for router/WiFi but now there’s talk of banning TP-Link (just routers?) in the US due to vulnerabilities, potential ties to the Chinese government, etc so maybe it’s not a good idea to have the TP-Link router on the edge of your network. You could use it just as an AP if you’re trying to make use of hardware you already have instead of buying dedicated wireless access points. You may even install OpenWRT on the TP-Link as well if it’s supported. At least you could feel better about the firmware and keep it more up to date. If you went that route, you could use the TP-Link with OpenWRT installed on the edge of your network. A Pi 5 could be used to handle VPN, AdGuard, etc although I’m not quite sure of the VPN performance of the Pi 5. You might be happier using the Pi 5 for various homelab services as you mentioned (AdGuard, etc). Perhaps use Docker, etc to get some stuff up and running. For those type of services, I imagine the Pi 5 will do quite well. You could still use the 2.5G HAT if you think you need the extra bandwidth on your Pi 5 server. 52Pi makes a different version of the HAT I have which has both NVMe and the 2.5G NIC. Of course it share the PCIe lane so it’s possible you could lose some storage or network performance if you got that HAT but it should still be much better than using a microSD and the onboard 1G NIC.

    • @lckillah
      @lckillah 2 дні тому

      @@homenetworkguy I see. I am using the 4b 4gb right now with wireguard and adguard with the AX11000 but the AX11000 acting as the router and I am routing my traffic from the router to the 4b. I am probably just gonna go that route with the Pi5 until the flint 5 comes out. Unfortunately, I can't install openwork on the ax11000 and the VPN capabilities of that router is only openVPN (along with ipsec and another one that's an old protocol). I tried openVPN and it's just so slow, that's why I went with the pi route. I might still give it a shot with the pi being the router and use the ax11000 as an access point or my other router, which is a real access point, netgear WAX204. Until the flint 3 arrives. Yeah probably going to get rid of the AX11000 with reports saying they send traffic to 3rd party servers. I saw this NVME + M.2 hat on amazon (just like what you have) by geekpi and I might go that route. I just like tinkering with the pi now that I got started with it lol. I know, an x86 NUC box would probably perform better and cheaper but it's more so the learning journey for me with the Pi and Linux. Crazy what this little thing can do!

  • @timrichards8636
    @timrichards8636 2 дні тому

    finnaly ~! thank you ive done about 70% of this self taught but its nice to see a step by step reminder!

  • @mjy
    @mjy 2 дні тому

    The preferred default for CPU Type should be 'host'. All features of the host CPU would be visible and available to the VM. If your CPU supports AES-NI instructions (which most CPUs produced within roughly the last decade should), then the VM will see that. You don't have to do anything else to enable that.

    • @homenetworkguy
      @homenetworkguy 2 дні тому

      If you’re in a cluster of different CPU types, then that is a situation where you don’t want ‘host’ if you plan to migrate the VM between nodes. The default CPU type in Proxmox enables AES-NI (that may not have been the case on older Proxmox versions).

    • @mjy
      @mjy 2 дні тому

      @@homenetworkguy Ah, yes... very true. Good point. Thanks!

    • @homenetworkguy
      @homenetworkguy 2 дні тому

      I can’t recall if I mentioned in the video that you could use ‘host’ if you’re only standing up a single Proxmox system or not so that is a good point that’s worth mentioning if I forgot. I was planning to set up a mixed cluster when I did this video even though I was focused setting this system up like a standalone Proxmox server.

  • @gustavcarlsson343
    @gustavcarlsson343 3 дні тому

    Thank you for this step by step tutorial! I had trouble applying the Wireguard config, but after rebooting opnsense, Wireguard is now running smoothly. One thing I'm trying to understand is the Allowed IPs fields. The one in peer generator gives the 0.0.0.0/0,::/0 to my wg-client. I click Store and generate next. Now under the Peers-tab, the same client is showing Allowed IPs 10.11.11.2/32. Are these two different options with the same name?

    • @homenetworkguy
      @homenetworkguy 3 дні тому

      Yeah, that confused me too for a while. I believe the way you can look at it is this- it’s from 2 different perspectives. After saving the peer info, it is the allowed IPs of the peer connecting to the WireGuard server instance (it’s like a static IP address) but when you are creating the peer configuration, it essentially is the list of IPs that the peer is connecting to which are allowed through the WireGuard tunnel. The default of 0.0.0.0/0,::/0 means to tunnel all traffic from the peer through the WireGuard VPN. I used to do this on my phones but I noticed that on slow cellular connections, routing all traffic through my WireGuard VPN at home slows down the throughput that I could barely connect to anything unless I turned off connecting to the VPN. Now I just route my private IPs (10.1.1.1/24, 192.168.0.0/16) of my home network through the WG VPN so I can still connect back home securely but everything else uses the cellular connection. This is called split tunneling. It means that I won’t have the same network wide protections on my home network while I’m away but it helps with improving throughput while roaming. In this scenario you can decide to include your WG interface IPs (such as 10.1.1.1) or not for DNS resolution (you won’t be able to use hostnames on your home network via the WG tunnel if you don’t tunnel the WG interface IP running the DNS service).

    • @gustavcarlsson343
      @gustavcarlsson343 День тому

      ​ @homenetworkguy Thank you for this explanation! After doing some testing with this in mind it all makes sense. Split tunneling really is very useful. And so easy to set up via the clients config. Cheers 🙏

  • @chuxxsss
    @chuxxsss 3 дні тому

    Big question, can I set this up without the WAN connected till the end? As my daughters partner plays games. Plus the dashboard does not come up for some reason? I booted from an sdcard does it install on to the internal nvme drive?

    • @homenetworkguy
      @homenetworkguy День тому

      Yeah I often like to set up the basics before connecting the WAN although it should be pretty safe to connect it to the existing especially if it using different IP address ranges (NAT helps minimize IP conflicts but if your WAN gateway is the same as your local LAN/VLAN interfaces on your OPNsense box, your WAN connection will not work properly because the interfaces directly attached to OPNsense take priority- it will try to use the LAN/VLAN interface IP instead of the WAN gateway IP).

    • @chuxxsss
      @chuxxsss День тому

      @homenetworkguy I couldn't get it right still block, so just set up the third router as a static address, turn dns off. I would still like to connect opnsense. Anyway Merry Christmas.

  • @philyuan583
    @philyuan583 3 дні тому

    Almost perfect! After following your tutorial and set up everything, I had to use the hosts file to resolve to the local IP address. I saw in your reply to earlier comments that UnboundDNS should do the correct resolution. Maybe a particular setting is needed? Nonetheless, thank you for this great tutorial!

    • @homenetworkguy
      @homenetworkguy 3 дні тому

      Thanks! I have a note about this in my written guide (I can’t recall if I mentioned it in the video or not). I think it primarily occurs if you’re trying to access your router’s interface from a different interface/VLAN because by default it will use the IP address of the interface of the network where your PC is on. So if I’m on the network 192.168.20.x accessing the router’s interface of 192.168.1.1 using the domain name, it will default to using 192.168.20.1 instead of 192.168.1.1 (the router’s hostname has the IPs of all of the interfaces defined on the OPNsense system). Someone a while ago tried to described all of the complicated technical details of how he worked around that issue and I wasn’t fully able to understand what he was saying. Haha

    • @philyuan583
      @philyuan583 3 дні тому

      @homenetworkguy thanks for the reply. In my case, I don't have any additional VLAN setup. I recycled the unbound service and everything started working. Lol. I don't know if this is just a delay on the unbound side.

  • @philyuan583
    @philyuan583 4 дні тому

    Thank you for producing this awesome tutorial. I will rate this one as 'hard' for my network skills level. The setup of DDNS can be a big distraction, which could be a totally separate tutorial on its own. I recommend that you link to an OPNSENSE<->DDNS tutorial video if you have one. After each firewall update, the 'Apply' button has to be clicked on the top-right corner, which I missed a few times. Over all, great tutorial! Happy to have my WireGuard working.

    • @homenetworkguy
      @homenetworkguy День тому

      Yeah there are a lot of tangents one could go down. Some people like more tangents and some prefer less tangents. I try to find a balance that most will prefer but I don’t always get the right balance. I totally forgot to mention clicking apply after making changes once the WiteGuard instance is set up. I only mentioned clicking apply after doing all of the initial setup. I realized that shortly after creating the video but I can’t go back and edit it. Glad the video was helpful!

  • @Williamjjp
    @Williamjjp 4 дні тому

    Great video, I couldn't work out why I could not write the IPs in the alias box, it was set to default as hosts not networks. After googling and checking I am writing the IPs correctly, I now feel rather stupid :)

    • @homenetworkguy
      @homenetworkguy 4 дні тому

      Thanks. Glad it was helpful!

    • @Williamjjp
      @Williamjjp 4 дні тому

      Yes great. You wouldn’t know if a guide exists of how to connect to a proxy server on one LAN network. (Transparent forward proxy)? This was my main reason to isolate the network.

  • @praetorxyn
    @praetorxyn 4 дні тому

    Just rediscovered this. I'm finally at the "actually do it" phase, as I'm soon putting in a rack for a HL15, and I want to get some rack mounted networking gear, so now I'm at the phase of trying to pick all the hardware. I was going to go all Unifi, but the more research I do, it seems like Unifi's gateway / firewall functionality just pales in comparison to Opnsense and that if you have an Opnsense appliance already, it apparently makes no sense to get say, a Dream Machine Pro, as you will end up dealing with hassles like double NAT or working around double NAT to run the DMP through the Opnsense box if you do, so it seems pretty superfluous. But then, I'm not sure how well the rest of Unifi's kit will work if you aren't using one of their gateways (e.g., the Pro Max "Etherlight" switches are only $100 more than the regular Pro versions and have PoE++ instead of PoE+, so they just seem like betters buys.... but would Etherlight work without a Unifi gateway?) Every home network guide I can find is using Unifi stuff, so that makes it hard to even pick what switches to get. I have a Mikrotik 2.5 Gbps switch to mount under my desk I like pretty well, so maybe I could get more of their switches for the rack. Router wise, I did end up buying a Minisforum MS-01 and putting a 2x 2.5 Gbps RJ45 PCIe card in it, so it should be setup like the Protectli VP6670, except it has a 13th gen mobile i9 instead of a 12th gen mobile i7, so the CPU is significantly more powerful, and minus coreboot, obviously. I'm already running Proxmox on that, and my plan was always to virtualize Opnsense on it, though I've dithered. Would you recommend just virtualizing Opnsense on that? Your website has a guide to virtualizing Opnsense on Proxmox on the Protectli VP6670 that I think would mostly translate to the MS-01 as it now has the same two 10 Gbps SFP+ ports and 4 2.5 Gbps RJ45 ports. Or would you recommend getting a dedicated device like the Protectli VP2420? Can you speak to how well Unifi gear works without one of their gateways? Are there any particular brands' switches and APs you recommend to go along with Opnsense? Not sure you'll see a comment on a year old video, but I appreciate your content either way.

  • @suvomaz
    @suvomaz 5 днів тому

    very useful. thank you

  • @a.dursun7581
    @a.dursun7581 5 днів тому

    thank you, great tutorial

  • @vishwanathbondugula4593
    @vishwanathbondugula4593 5 днів тому

    how can you configure the wireless intel wifi card I have to pcie passthrough to opnsense and use that as a Wi-Fi instead of using an external access point connected on LAN interface?

  • @vishwanathbondugula4593
    @vishwanathbondugula4593 5 днів тому

    how can you configure the wireless intel wifi card I have to pcie passthrough to opnsense and use that as a Wi-Fi instead of using an external access point connected on LAN interface?

    • @homenetworkguy
      @homenetworkguy 5 днів тому

      You should be able to pass it through like any other NIC as long as Proxmox recognizes it. However, the experience with a wireless adapter and OPNsense will likely not be the best experience. Driver support isn’t great for wireless. Not all adapters support ad hoc/hotspot mode and I believe only WiFi 4 (Wireless N) is supported as far as I know.

    • @vishwanathbondugula4593
      @vishwanathbondugula4593 5 днів тому

      @homenetworkguy is openwrt better with this? Compared to opnsense?

  • @cyrilpinto418
    @cyrilpinto418 6 днів тому

    Great video as always; but your tree is missing a star.

    • @homenetworkguy
      @homenetworkguy 6 днів тому

      Thanks! Yeah.. I just got whatever leftover tree my kids didn’t want in their rooms (they each get a small tree to put on their nightstands). My wife and I go Covid before Thanksgiving and then it was cold nasty weather outside so I barely got decorations up outside. My wife had a surgical procedure earlier this week so I was working hard to get the video done before all that and Christmas in case I didn’t have time to do much else before the end of the year. Lots of school parties and Christmas plays.

    • @cyrilpinto418
      @cyrilpinto418 6 днів тому

      Hope you guys are better now; once again thanks for everything.

  • @ElCid_86
    @ElCid_86 6 днів тому

    Chamberlain sucks

    • @homenetworkguy
      @homenetworkguy 6 днів тому

      They definitely did not make their customers happy with the decisions they made. That is why I strive for local only devices that work with open software like Home Assistant. Longevity is much more assured.

  • @ewsly
    @ewsly 6 днів тому

    Incredible video and very well explained. Really appreciate that you went from the physical world and then into the software side of things, spending a good amount of time on each part without babying the viewer. Most informative video I have been able to find on my journey down this path. Thank you!

    • @homenetworkguy
      @homenetworkguy 6 днів тому

      You’re welcome! It’s hard to find a balance of being too basic or being too technical when explaining a relatively complex technical topic (when you are new to it).

  • @kevinexit12
    @kevinexit12 6 днів тому

    "Without breaking the bank," That statement always amuses me😁

    • @homenetworkguy
      @homenetworkguy 6 днів тому

      Haha yeah. It’s fun to say when talking about budget friendly things. I’ll be taking a look at another switch soon which has almost the same number of ports but also has PoE. The price is not much more than the PoE version of this switch and has a more refined user interface. It can also be centrally managed like UniFi products.

  • @puneetbhandal8981
    @puneetbhandal8981 6 днів тому

    Fantastic video! Thank you so much for taking the time to put this together! I am excited to get my own OPNsense appliance configured and will definitely have this video to follow along with again when I do.

    • @homenetworkguy
      @homenetworkguy 6 днів тому

      Thanks! I’m planning a new one soon which will have an updated version of OPNsense as well as different network hardware and slightly different network architecture. It should be higher quality because I have more experience creating videos and I’ve been working to improve video and audio quality over time

  • @NthgToFear
    @NthgToFear 6 днів тому

    Thank you so much!!!! Been messing with OPNsense for a couple days and couldn't for the life of me figure out why my rules weren't working right.

    • @homenetworkguy
      @homenetworkguy 6 днів тому

      Great! I’m glad the video helped you figure out your rules!

  • @AugmentedKing
    @AugmentedKing 7 днів тому

    Is that Dark Power psu 175mm length? I have a PSU that is 210mm, and am trying to figure out if it could fit in Light Base 600. Their specs say <200mm, but looked like more than enough room at 08:27.

    • @homenetworkguy
      @homenetworkguy 6 днів тому

      The Dark Base 13 PSU is 170mm. At 08:27, it is the Light Base 900 which is deeper and taller than the 600. I let my brother try the 600 case since I don't need to the extra case right now so I can't say 100% that a 210mm PSU will fit in that one. However, there is no brackets in the case preventing deeper PSUs. With the 900, it will definitely fit because I just measured it. It might be a little bit of a tighter fit on the 600 since the PSU/power cables will eventually smash into the bracket separating the compartment in the back and the AIO/fans on the left side of the case (when looking from the back side).

    • @AugmentedKing
      @AugmentedKing 5 днів тому

      @@homenetworkguy I had a hunch it was too good to be true, I was hoping that the cable management flapper door could be persuaded with a little die grinder. Maybe Be Quiet! will have a workaround. thanks for reply.

    • @homenetworkguy
      @homenetworkguy 5 днів тому

      Well it should fit just fine in the larger Light Base 900 case since it has a good bit of room for everything. There’s no bracket that gets in the way for deeper PSUs- only the divider bracket between the left and right side but i measured 210mm and I don’t foresee any issues. I just don’t currently have the 600 model to measure to see if it fits but I do know that the case is not as deep or tall as the 900. They’re nice cases for sure though! I really like my be quiet! cases.

    • @AugmentedKing
      @AugmentedKing 3 дні тому

      @@homenetworkguy I just can't accomidate that extra 24L of volume in the space i need it to live in. Heck, I'm not even sure if I can get away with going from 45L to 60L. Sigh, back to the whiteboard, thanks for your reply.

  • @msnippe3750
    @msnippe3750 8 днів тому

    Hi man nice tutorial but can you tell me how to get the Cloudflare dns challenge to work nowadays?? Because i cannot get it to work anymore

    • @homenetworkguy
      @homenetworkguy 7 днів тому

      I’m not sure why anything would need to change since mine is still renewing and I’ve had it set up for the last year or longer.

    • @msnippe3750
      @msnippe3750 7 днів тому

      @homenetworkguy a really of topic question do you now an good tutorial ( a home user can follow) to accomplish a working caddy in opnsense with external and internal proxies ? I now do it with nginx in a lcx container but this adds an additional service to run. Would be nice to integrate it in opnsense. I know that nginx is also available in nonsense but dahm so much more settings 😂😂

    • @msnippe3750
      @msnippe3750 7 днів тому

      @homenetworkguy i got the certificate to work. Found out in the logs that i had fill in a domain name in the certificate section under common name.

  • @drbyte2009
    @drbyte2009 8 днів тому

    Can i also use pi-hole in the same way as in this video on a OPNsense bridged setup?

    • @homenetworkguy
      @homenetworkguy 7 днів тому

      If you’re using OPNsense as a transparent filtering bridge it likely means you are using a separate router on your network so if you want to use Pi-hole you would configure your router’s DHCP server to use the Pi-hole server. The transparent filtering bridge allows all of the traffic that you specify to pass through.

    • @drbyte2009
      @drbyte2009 7 днів тому

      @@homenetworkguy In the modem i got from the cable company there is also a dhcp server wich i can disable, and than use pihole for it . Thnx!

  • @drbyte2009
    @drbyte2009 8 днів тому

    Just another question, not related to this video. I've read an article on your website about Duplicacy as a "replacment" for Duplicatie. Are you still using Duplicacy, or did you go for an other solution. The reason i ask you is because i'am rebuilding my homelab, and i also need another backup solution.

    • @homenetworkguy
      @homenetworkguy 8 днів тому

      I liked Duplicacy a lot better than Duplicati because I had issues with database corruption with Duplicati. It was also pretty slow to backup/recover in my experience but that was several years ago. Perhaps it is better now than it was back then. After I built a dedicated TrueNAS box instead of having my bulk storage hosted on my Proxmox host, I decided to move to Storj (which is owned by the same company as TrueNAS) since it was cheaper to store data than Backblaze B2 (but there is a small fee for downloading lots of data but it is still less than the amount you save per month for storage). Storj integrates nicely with TrueNAS and I just set certain datasets in TrueNAS to backup to Storj at various intervals.

    • @drbyte2009
      @drbyte2009 7 днів тому

      ​@@homenetworkguy I don't have a truenas server at the moment, but that may come in the future. I'm going to use duplicatie until I find something else. Thnx!

  • @mikeloose9270
    @mikeloose9270 8 днів тому

    Hey thanks for walkinh through the details of your vlans and network setup. Really helpful!

  • @hardwares
    @hardwares 8 днів тому

    If someone is thinking about turning a pi5 into a router, I'd recommend to reconsider the idea. It might be better to buy some compact travel router which has a stable build of openwrt for it, and it would be better because: - it would have a decent case - it wouldn't heat as a rpi5 - it would have a stable build of openwrt - it would have better WiFi - it's a ready to use solution, you won't need to buy additional hardware - rpi5 requires a 5a power adapter, how many of which do you have lying around? - it would be cheaper and faster to get everything working The only reason to turn a rpi5 into a router is that if you have a lot of free time, and desire to play with hardware/software in other words, just for fun. There are traveling routers which are of the same size, have all popular power plugs included, with a nice carrying case.

    • @homenetworkguy
      @homenetworkguy 8 днів тому

      Valid points. I just like making projects and tinkering so it was fun for me to see what is possible. What I demonstrated was not very feasible on older Raspberry Pi’s. This is what homelabbing is all about. I certainly would not recommend this solution for the average user. That is why I never say in my project videos, “you should do this!” but rather it’s like “look at what you could do if you like to build things!” I just like to demonstrate things I find interesting in hopes others will find it interesting too! 🙂

  • @bilalltas
    @bilalltas 8 днів тому

    Thanks for the great content Dustin! I have a question about isolating network within the VMs in same Linux Bridge. If we use Proxmox VMs or containers in same Linux Bridge with same VLAN ID, they don't communicate with their gateway (OPNsense VLAN interface IP) when they need to connect each other. So the firewall rules are not applied for them if we want to block access between them. Is there any way to manage their internal network with the firewall rules while they're in same VLAN? I would like to create isolated VMs without creating new VLAN + network configuration for each on OPNsense, if possible.

    • @homenetworkguy
      @homenetworkguy 8 днів тому

      You are correct. Any device on the same network/VLAN will be able to communicate freely since that is how networks were designed to function. If you want to limit further access there are a couple of options: 1. Use a firewall on each host. For example on some Linux distributions such as Ubuntu, you can make use of ufw firewall to limit access by creating firewall rules on the system. I do this in addition to firewall rules on OPNsense to have multiple layers of security (defense in depth). 2. You can create VLANs inside VLANs. They are sometimes called private VLANs or Q-in-Q VLAN tunnels/stacking. I haven’t tried it but this would require additional switch and OPNsense configuration which is not what you’re looking for. 3. For physical clients on the network that are wired to your network switch, you can make use of port isolation which allows you to limit which ports a particular port isolation allowed to communicate with. You basically only allow the port of the client device to communicate with the trunk port connected to OPNsense which effectively means the device cannot communicate with other devices within the same network. The traffic is blocked at Layer 2 (I believe) by the network switch.

  • @JeffGeerling
    @JeffGeerling 8 днів тому

    Thanks for this video; I may test out WisdPi's 5 Gbps HAT too, maybe it can do some fun speeds as well!

    • @homenetworkguy
      @homenetworkguy 8 днів тому

      Thanks! I thought you might find it interesting. I saw your video where you tested the 5 Gbps NIC which got me thinking if there was only a dual 2.5G NIC HAT then you could have 2.5G for both WAN and LAN which would be great. With only a single 2.5G NIC, you can only take full advantage of the throughput on a router if you have it as the LAN (with VLANs configured). It was nice to see 2.5G routed between the VLANs. Anyway, I searched for dual 2.5G NICs and found this: a.co/d/eKP6AT0 Also found this GeekPi one but it uses the USB ports for the extra bandwidth so it would be interesting to see the throughput when all of the interfaces are utilized: a.co/d/hMgyZTa

  • @nianhbg
    @nianhbg 9 днів тому

    Thanks :)

  • @tristanthiee298
    @tristanthiee298 9 днів тому

    I only have 1 network interface, what do i do now?

    • @homenetworkguy
      @homenetworkguy 8 днів тому

      It’s less than ideal and requires a more complex configuration. This is roughly what you need to do: 1. You need a managed network switch capable of supporting VLANs. You would create a separate VLAN just for the WAN interface on your network switch. 2. You need to ensure that VLAN ID is passed through the switch port (referred to as a trunk port) where your Proxmox server is connected. 3. Make sure the default bridge that’s created during the Proxmox installation is set to being VLAN aware. 4. When assigning network interfaces to the OPNsense VM, for the WAN interface of the OPNsense VM, create a bridge with the VLAN tag set to the same one you used on the network switch for the WAN interface. 5. Add more network interfaces to the VM after you create the VM (don’t start the VM until you add all the desired network interfaces). For the 2nd network interface for the VM, simply add the default bridge for the untagged LAN network (it’s likely vmbr0). 6. If you plan to have more VLANs you can create them in OPNsense like you normally would with a bare metal installation. Make sure you have the network switch configured for the appropriate VLAN IDs. If you’re new to everything, this configuration is not for the faint of heart. It takes time and effort to learn all the concepts necessary to implement this sort of thing. It took me a few years to grasp it all, but I learned it by making slow incremental steps.

  • @Shl0mpi
    @Shl0mpi 9 днів тому

    I feel hopeless. Have no idea what is wrong. I have handshake and see the device connected on Opnsense but I can't access local devices or browse the internet. I have only the WG rules for WAN and WG interfaces and also allow DNS 53 but nothing other than that. What I'm going wrong? the port is the default one 51820 not soothing special

    • @homenetworkguy
      @homenetworkguy 8 днів тому

      Without seeing more specific configuration, it sounds like a firewall rule issue but I’ve seen some people have trouble getting network access even though they have a proper handshake, which always make me wonder what the issue(s) could be. When you say you have only the WG rules, what do you mean exactly? You can basically mimic your other rules for other network interfaces which allow access to the Internet assuming all of the other configuration is correct.

  • @rpcbd
    @rpcbd 10 днів тому

    Hi.First, I would like to thanks for this awesome video. I have a lab with 2 different hypervisors. The first one is an Alma8 with a KVM virtualization layer with 2 network bridges. The first bridge is for the internet access for the VMs and the Node itself, and the second bridge is for private address between the 1st and 2nd hypervisor. The second one is a proxmox with the same design. Now I'm able to reach the OPNsense installed in the KVM from the Proxmox, using a private switch on an specific VLAN. I'm trying now to config rules into the OPNsense, to allow the VMs that are sitting on the internal bridge from the proxmox which is the same network for both HVs, to access the internet. Is there any hint on how to do it? Thanks in advance.

    • @homenetworkguy
      @homenetworkguy 8 днів тому

      I’m not quite sure I fully grasp all of the details you are describing and you didn’t mention which bridges are used by the OPNsense VM. If you created a bridge on the hypervisor where OPNsense is and you don’t assign that bridge to be used by OPNsense, you won’t be able to control access via firewall rules because it’s not being managed by OPNsense. I’m afraid you’re trying to have a private network via bridges on the hypervisor that aren’t being managed by OPNsense. If OPNsense is not aware of that network bridge and configured appropriately, you can’t control access via firewall rules.

  • @biggyk87
    @biggyk87 10 днів тому

    No concerns with quick sdcard degration?

    • @homenetworkguy
      @homenetworkguy 10 днів тому

      Believe it not, I’ve never had a microSD card fail but I don’t typically use the microSD in high write scenarios on the Pi. If you use the squashFS version, it’s a read only filesystem so there will be no additional writes after you image the microSD card! But you would need to compile your own firmware to include all the packages you will want installed ahead of time.

  • @g76312459777865m
    @g76312459777865m 10 днів тому

    super awesome video. i wish pi's weren't so expensive, can't justify the price for using it only as an instance of opnwrt

    • @homenetworkguy
      @homenetworkguy 10 днів тому

      Thanks! Yeah even the cheapest one at $50 USD is a bit high once you start adding HATs, etc.

  • @52Pi_Maker_Education
    @52Pi_Maker_Education 10 днів тому

    what? you've built a Router via this 2.5Gbps hat board with Raspberry Pi 5 ? awesome !! that's cool ! thanks dude! your video is awesome!

    • @homenetworkguy
      @homenetworkguy 10 днів тому

      Yep! Works great. I realized that you have a 2.5G NIC + NVMe HAT which is nice. Also I saw a dual 2.5G + NVMe but one of the NICs uses the USB ports so I’m curious how much throughput you could get when utilizing all of the network interfaces at the same time.

    • @52Pi_Maker_Education
      @52Pi_Maker_Education 10 днів тому

      @@homenetworkguy The test result from this colleague is 800Mbps, but it's experimental data. The testing environment at the time was likely a gigabit switch and approximately 20cm of Category 6 Ethernet cable, using iperf3. However, I'm not sure about the performance of the two network cards under full load simultaneously, but it can be inferred that it might be similar to the throughput of a single network card, as the Raspberry Pi's own PCIe interface speed limit is already capped there.

    • @homenetworkguy
      @homenetworkguy 10 днів тому

      Cool. I was thinking it would be nice if there was a dual 2.5G (with nothing else sharing the bandwidth) because Jeff Geerling tested a 5 Gbps NIC and could get near full 5 Gbps throughput (when PCIe gen 3 is enabled). A dual 2.5G NIC HAT would allow nearly full 2.5G WAN and LAN and not just LAN (you can’t use it for 2.5G WAN when you have a single 2.5G NIC because the LAN is limited to 1G using the onboard NIC- so you can only take advantage of the 2.5G NIC when used as a LAN interface on a router when using VLANs).

    • @52Pi_Maker_Education
      @52Pi_Maker_Education 10 днів тому

      ​@@homenetworkguy Absolutely, a dual 2.5G NIC setup without sharing bandwidth would indeed be ideal for maximizing throughput. Jeff Geerling's test results with a 5 Gbps NIC are quite impressive, showing that with PCIe gen 3 enabled, you can achieve near full 5 Gbps speeds. A dual 2.5G NIC HAT would offer the advantage of utilizing both WAN and LAN at nearly full 2.5G speeds, which is a significant upgrade from the 1G limit of the onboard NIC. This setup would allow for more efficient use of high-speed internet connections, especially when VLANs are employed to separate traffic on a router. It's a great way to future-proof your network infrastructure for higher bandwidth demands.

  • @drbyte2009
    @drbyte2009 11 днів тому

    Great video again!. At the moment i am also playing with openWRT to use it as an OpenVPN for the arr stack. For so far it works, but i need to make some firewal rules or something else to stop the traffic when te vpn connection drops........

    • @homenetworkguy
      @homenetworkguy 11 днів тому

      Thanks! Sounds like you are wanting to implement a ‘kill switch’ when not on the VPN. I know many OPNsense users discuss setting that up. I haven’t tried it since I don’t use external VPNs.

    • @drbyte2009
      @drbyte2009 11 днів тому

      @@homenetworkguy That is exactly what i mean. I will search the internet for that, and hope i find something😀 Maybe an idea for an next video🤔

  • @bcboncs
    @bcboncs 11 днів тому

    I saw wireless option in settings... does this pi5 work as wifi access point in bridge mode within your opnsense network?

    • @homenetworkguy
      @homenetworkguy 11 днів тому

      When I was having trouble getting the package built on the OpenWRT website (because the custom firmware builder tool sometimes breaks), I temporarily set up a WAN interface using the onboard WiFi as a client on my primary network so I could download the driver package for the 2.5Gbps interface. There are options in OpenWRT to use the WiFi as an access point but I haven’t tested it on the Pi 5. I’m not sure how well that would work but if you only need to connect couple of WiFi devices it might be ok.

  • @Glasairmell
    @Glasairmell 11 днів тому

    Hello again. When using the hostname url for the router after following this guide, I get a white page with the login at the upper left. So no regular gui login. Or it just does not load at all. Also this page will not allow login. IP works fine and the new certificate shows in use. I can ping the router url just fine. Thoughts please?

    • @homenetworkguy
      @homenetworkguy 11 днів тому

      I’m not sure why this process doesn’t work for everyone because I’ve had some that say it works great and others say they have trouble with it. My only caveat I can think of is if you’re trying to access the web UI from a different VLAN than the one you’re currently in because the router hostname has all of the interface IPs associated with it so it defaults to using the IP address of your VLAN interface. So you could add an entry to the hosts file on your computer to point to that IP or just allow access to the web UI from the VLAN your PC is on.

    • @Glasairmell
      @Glasairmell 10 днів тому

      @@homenetworkguy It resolving my isp back to router url. I used host file to fix it thank you

  • @karlgimmedatforfreemarx
    @karlgimmedatforfreemarx 12 днів тому

    Whats the difference between OpenWRT and OPNsense?

    • @homenetworkguy
      @homenetworkguy 12 днів тому

      Lots! OpenWRT is based on Linux while OPNsense is built on top of FreeBSD. OpenWRT is very lightweight and was originally designed to installed on consumer grade routers to replace the stock firmware. OPNsense can run on any general purpose PC. OpenWRT can be run on ARM based hardware and OPNsense doesn’t have official ARM support. Much more could be said.

  • @kalvinparker
    @kalvinparker 12 днів тому

    Within 15 seconds, you totally talked me out of my crazy Proxmox idea. 🤯 Thanks for saving me from a potential disaster! I guess I'll just keep my OPNsense setup on its own little island then. 😅

    • @homenetworkguy
      @homenetworkguy 12 днів тому

      You’re welcome! Haha. It definitely helps to be very familiar with how OPNsense and Proxmox functions. I would not personally attempt to virtualize OPNsense without a solid understanding of how both software platforms function. I only attempted after years of experience with both. It has been solid. I currently have a basic Proxmox cluster which allows me to live migrate the OPNsense VM to another node without losing my network connectivity when I need to reboot the Proxmox node that OPNsense is on.

  • @SB-qm5wg
    @SB-qm5wg 13 днів тому

    I hope some carrier boards come out with switch ports for the Pi5.

    • @homenetworkguy
      @homenetworkguy 12 днів тому

      For the CM5? It would be nice to see at least dual 2.5G Ethernet interfaces (even on a Pi 5 HAT) because I know Jeff Geering tested a 5Gbps NIC and it got almost the full 5 Gbps on the PCIe bus. Of course if you are sharing that with NVMe bandwidth, performance won't be so great but if using the device more for the higher network throughput, a USB drive or microSD card could still be used.

  • @arturorubio-w1m
    @arturorubio-w1m 13 днів тому

    Great content , it’s important to separate networks ,so we can maintain the integrity of data

    • @homenetworkguy
      @homenetworkguy 13 днів тому

      Thanks! Yeah definitely a good idea to do even on home networks to minimize the attack surface and the impact of exploits of vulnerabilities.

  • @SmalltimR
    @SmalltimR 13 днів тому

    This is great! Any idea if this could be used in a fail-over situation along with Opsense ?

    • @homenetworkguy
      @homenetworkguy 13 днів тому

      Thanks! It was a fun experiment to mess around with. Jeff Geerling tried a 5 Gbps NIC and could get almost 5 Gbps so someone needs to make a dual 2.5Gbps HAT so you can have 2.5Gbps for both WAN and LAN! Edit: I just checked real quick and found this dual 2.5Gbps HAT (www.amazon.com/PCIE-2-5G-Ethernet-HAT-High-Speed/dp/B0CZHZJ89S)! I need to try that out sometime! haha. Ideally it's probably better just to set up 2 OPNsense boxes in HA or have a virtualization cluster where you can failover the VM to another node.

  • @betterwithrum
    @betterwithrum 13 днів тому

    I hate that people saying, "for the homelab community.' There are serious business and gov't agencies using Proxmox.

    • @homenetworkguy
      @homenetworkguy 13 днів тому

      I don’t recall saying that since it’s been a while but that is where my focus is. I know it’s used by serious organizations. A lot of homelab community software and hardware is used by serious businesses so I think it’s ok to focus on the homelab community even though it is also used by serious businesses and government agencies. It doesn’t diminish the software/hardware simply because it is used by homelabbers.

  • @jimscomments
    @jimscomments 16 днів тому

    Finished the Beginners video and all the Full Network videos. Holy cow what a huge undertaking especially with the documentation! The documentation is really nice to refer back to for a memory update. I learned about Trunk ports and Access ports initially on Cisco 3560 switches. After 15 years I'm now relearning about them on a SG300 switch but it also has a General port. I haven't found a descent explanation on when to use a General vs Trunk port. If you have some time could you summarize the difference? Also you used a LAG setup which didn't require an IP address for the LAG and if I create a new single interface with a GUEST VLAN for an AP that allows access out to the Internet only the VLAN requires an IP address and a DHCP scope. I'm just learning firewall rules so I was going to add the two rules you suggest, PrivateNetworks and DNS to the VLAN. Is it correct to open the single interface to the management interface? I could just add the GUEST VLAN to the LAN interface like your Beginners Video but I thought if I want to add more VLANs at a later date I'd have the single interface available.

    • @homenetworkguy
      @homenetworkguy 15 днів тому

      Yeah it is a relatively large undertaking. This was basically summarizing years of learning into about 1.5 hours of video. I’m planning to do a more refined version soon (in a single video) so keep an eye for that. I won’t be including LAGG configuration since I’ll be using higher bandwidth network interfaces instead. As for general ports, I’m not sure of their purpose. It basically is similar to a trunk port but it can operate as either an access port or a trunk port (some switch vendors such as Grandstream call those ports hybrid ports). It’s better to set the port to access when you know it’s a client device that’s going to live on a particular VLAN and use trunk between all of your network infrastructure/servers that need to handle multiple VLANs. Are you wanting to put VLANs on the same interface used as the management interface? Basically a router on a stick configuration? That does work ok. OPNsense generally recommends separating the untagged and tagged traffic on 2 separate interfaces to improve overall security (but the insecure scenario seems very rare if you have both untagged and tagged traffic on the same network interface). You can always reassign VLANs to a different physical interface if you wish to move it later (just make sure you have the switch configuration correct if you move to different physical interfaces on the OPNsense system).

    • @jimscomments
      @jimscomments 15 днів тому

      I'm going to try a separate interface with the guest VLAN first. I tried it earlier on a separate interface but I think my issue was not having the switch configured correctly. On the separate interface is there any reason why I shouldn't use a firewall rule to allow 'any' since the VLAN is going to have more restrictive rules?

    • @homenetworkguy
      @homenetworkguy 13 днів тому

      @ yeah switch configuration can be the hardest part of configuring VLANs. It’s pretty simple to do in OPNsense. Generally speaking it’s best to have firewall rules as restrictive as possible. I prefer to use the source of LAN net (or whatever the interface name is) rather than a source of ‘any’ even if there is only one network on the interface.

    • @jimscomments
      @jimscomments 11 днів тому

      Thanks for all the suggestions, good learning curve on firewall rules I'm new to using. I found my issue of not connecting to the Internet from the new interface I created. The log error I was seeing pointed to the Firewall NAT Outbound rules section. OOPS no NAT rule for the new interface to be allowed to connect to the WAN/LAN router I have between the Internet and the two HA OPNsense WAN ports. Hope the weekend is going well for you. Onto part 4 and connect my Grandstream you suggested to the new interface