Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS Puzzle

    Scheduled Pinned Locked Moved DHCP and DNS
    29 Posts 4 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @provels
      last edited by johnpoz

      @provels did you setup a domain override or something.

      Out of the box unbound resolves, so there would be no way it would be asking pihole sitting on your lan network for anything unless you setup a domain override or something hey unbound if you want to lookup domain xyz or some reverse zone go ask the IP of pihole.

      Or you have some NS record for some public domain pointing to your pihole IP or some sort of nat reflection?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      provelsP 1 Reply Last reply Reply Quote 0
      • Bob.DigB
        Bob.Dig LAYER 8
        last edited by Bob.Dig

        I just "installed" AdGuard Home the other day. I let clients connect to it. AdGuard itself connects to unbound on pfSense and that is asking upstream, works flawlessly.
        Also I made a Port Forward for every network that should ask AdGuard so there is no work to do for any rules, love it.

        To bad that pfBlockerNG still has a hourly config change for saving DNSBL changes, although DNSBL in it is disabled...

        1 Reply Last reply Reply Quote 0
        • provelsP
          provels @johnpoz
          last edited by

          @johnpoz @AndyRH pfSense is in Resolver mode, just using the root servers. No overrides. Even if a device was set to use pfS .1 as the DNS, it should just go out to the roots. Weird.

          @Bob-Dig That's how my Pi is setup. Until now, the only device I've seen rate limited is the very chatty Samsung TV.

          This is just a flat home net, single user. I think I enabled DNSSEC in Resolver recently, could that cause it?

          Peder

          MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
          BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

          Bob.DigB 1 Reply Last reply Reply Quote 0
          • Bob.DigB
            Bob.Dig LAYER 8 @provels
            last edited by Bob.Dig

            @provels Maybe show your port forward and groups for internal DNS. With only one LAN you probably don't have any groups set though.

            provelsP 1 Reply Last reply Reply Quote 0
            • provelsP
              provels @Bob.Dig
              last edited by provels

              @Bob-Dig I only have one port forward, for OpenVPN, and that's not enabled unless I'm out of town.

              I finally remembered to look at the Query Log on the Pi. 🙄
              Looks like it's

              d1oxlq5h9kq8q5.cloudfront.net
              

              and related to the TV. Github
              1768a336-afe4-4c6f-8fa0-6c1905795b56-image.png
              but still no clue why things are going backwards. I guess I can just WL it and move on. But still...

              Peder

              MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
              BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

              Bob.DigB johnpozJ 2 Replies Last reply Reply Quote 0
              • Bob.DigB
                Bob.Dig LAYER 8 @provels
                last edited by Bob.Dig

                @provels This is AAAA, so it is IPv6. You have to watch out that DNS is not going different routes for IPv4 and IPv6. I disabled IPv6-DNS in DHCPv6 and RA. Although, source is IPv4 so this also doesn't seem to be the problem here... It is a puzzle for sure.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @provels
                  last edited by

                  @provels there is no way that pfsense would ask 192.168.0.1 for dns if its resolving, and did not setup a domain override.. Are you doing some dns redirection? Or nat reflection and some client asking and its being reflected to your pihole.

                  You sure you just don't have some box on your network with a dupe IP of that 0.1 ? What I would do is sniff on your pihole - what mac address are you seeing that traffic from, or maybe you can just see that in your network tab on your pihole

                  Are you doing any source natting where if device on another segment gets routed through pfsense and you nat it to pfsense IP.. I do this to talk to my IP cameras because they point to a different gateway then pfsense because they are behind the nvr.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  provelsP 1 Reply Last reply Reply Quote 1
                  • provelsP
                    provels @johnpoz
                    last edited by provels

                    @johnpoz @Bob-Dig Both DHCPv6 Server and RA are disabled. The FW is trying both IPv4 and v6.
                    61142e36-62e1-48fe-9fd9-ea1ec470fef7-image.png
                    My net is quite simple, it's like 1998... No DNS redirection, NAT reflection. I do use a couple HOSTS entries on a couple Windows boxes, but that should just blow past both machines.
                    No dupe IP because I'd probably be dead in the water w/o any gateway.
                    ARP table from the Pi below. The highlighted address is the LAN Bridge. It appears today's flood occurred between 07:33:46 and 07:33:47, hundreds of packets. Weird.
                    8e2fa6ac-ccba-4d0d-9dfd-968804975a42-image.png

                    Peder

                    MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                    BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @provels
                      last edited by johnpoz

                      @provels that it odd that that mac shows up as FreeBSD Foundation? Don't think have ever seen that before. Are you running Bhyve, I think that might be a mac used in Bhyve??

                      Do you have any packages running on pfsense?

                      What box are you running pfsense on.. Can you post up an ifconfig output of that interface..

                      [24.11-RELEASE][admin@sg4860.home.arpa]/root: ifconfig igb0
                      igb0: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 1500
                              description: LAN
                              options=4e100bb<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWFILTER,RXCSUM_IPV6,TXCSUM_IPV6,HWSTATS,MEXTPG>
                              ether 00:08:a2:0c:e6:24
                              inet 192.168.9.253 netmask 0xffffff00 broadcast 192.168.9.255
                              inet6 fe80::208:a2ff:fe0c:e624%igb0 prefixlen 64 scopeid 0x1
                              inet6 2001:470:<snipped> prefixlen 64
                              media: Ethernet autoselect (1000baseT <full-duplex>)
                              status: active
                              nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                      [24.11-RELEASE][admin@sg4860.home.arpa]/root: 
                      

                      If you look through the full output of ifconfig - what shows up with that 58:9c:fc mac?

                      Are you running pfsense as VM in bhyve?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      provelsP 1 Reply Last reply Reply Quote 0
                      • provelsP
                        provels @johnpoz
                        last edited by provels

                        @johnpoz It's running in hardware, on an Adlink Intel box, not VM . The MAC is the result of the bridge. When a bridge starts up it gets assigned a random virtual MAC by BSD. I've added that MAC into the bridge config so it's fixed. I run pfBlockerNG as the only DNS related thing. Doesn't seem to be a scheduled job, as it happened at 14:45 and 19:48 the day previous. Same flood to the same destination address.

                        bridge0: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 1500
                                description: LAN_BRIDGE0
                                options=0
                                ether 58:9c:fc:10:ff:88
                                inet 192.168.0.1 netmask 0xffffff00 broadcast 192.168.0.255
                                inet6 2601:240:4e81:61a3:5a9c:fcff:fe10:ff88 prefixlen 64
                                id 00:00:00:00:00:00 priority 32768 hellotime 2 fwddelay 15
                                maxage 20 holdcnt 6 proto rstp maxaddr 2000 timeout 1200
                                root id 00:00:00:00:00:00 priority 32768 ifcost 0 port 0
                                member: ath1_wlan0 flags=143<LEARNING,DISCOVER,AUTOEDGE,AUTOPTP>
                                        ifmaxaddr 0 port 11 priority 128 path cost 22222
                                member: ath0_wlan0 flags=143<LEARNING,DISCOVER,AUTOEDGE,AUTOPTP>
                                        ifmaxaddr 0 port 10 priority 128 path cost 33333
                                member: rum0_wlan0 flags=143<LEARNING,DISCOVER,AUTOEDGE,AUTOPTP>
                                        ifmaxaddr 0 port 9 priority 128 path cost 370370
                                member: igb0 flags=143<LEARNING,DISCOVER,AUTOEDGE,AUTOPTP>
                                        ifmaxaddr 0 port 1 priority 128 path cost 20000
                                groups: bridge
                                nd6 options=1<PERFORMNUD>
                        
                        

                        Peder

                        MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                        BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @provels
                          last edited by johnpoz

                          @provels so your running wifi bridged to your lan interface.

                          That could be problematic.. I have not spent any time with trying to use freebsd as wifi - just makes zero sense to me - freebsd and wifi are not a good fit..

                          Your problem could be related to that - not sure exactly how.. But what I can tell you is if your resolving - pfsense would have no way to even know to ask your pihole IP for dns. It uses roots to resolve, so unless something resolves to a NS it should ask to your pihole IP - unbound on pfsense would have no way or reason to ever send dns query to your pihole IP.

                          If I had to guess its client set to use pihole IP running through the bridge and for whatever reason the bridge mac is being used.. When talking to pihole - and pihole sees that at your pfsense IP.

                          You might want to look in the unbound status - this should list all the name servers that unbound knows to talk to for different domains or tlds, etc..,

                          example

                          dnsstatus.jpg

                          Do you see your pihole IP listed in there? If not pfsense would have zero reason to ever send a dns query to your pihole IP, be it was pfsense itself looking for something, or some client asking unbound to resolve something. Unless you have something on pfsense that is set to use your pihole.. But I don't know what that could be?

                          You could look in resolv.conf

                          [24.11-RELEASE][admin@sg4860.home.arpa]/root: cat /etc/resolv.conf 
                          nameserver 127.0.0.1
                          search home.arpa
                          [24.11-RELEASE][admin@sg4860.home.arpa]/root:
                          

                          In case what your showing in gui is not showing all of it?? Do you have the setting to let dhcp override dns?

                          dns.jpg

                          Do you have any sort of vpn setup on pfsense? Where there could be another dns setup? That happens to point to your pihole IP?

                          Unless you have something else on pfsense running that can be told to query your pihole IP address? I can not think of anything that would do that.. And you say your not running any packages anyway, other than pfblocker.

                          If me I would prob sniff on pfsense on your bridge to see if you can see a client asking for what your seeing in the mass query.

                          edit:
                          if you don't want to scan through the gui output.. You could grep it for the IP of your pihole.

                          Example - I just picked a random IP I saw in the output

                          [24.11-RELEASE][admin@sg4860.home.arpa]/root: unbound-control -c /var/unbound/unbound.conf dump_infra | grep 23.61.199.65
                          23.61.199.65 60.3.103.in-addr.arpa. ttl 394 ping 24 var 120 rtt 504 rto 504 tA 0 tAAAA 0 tother 0 ednsknown 1 edns 0 delay 0 lame dnssec 0 rec 0 A 0 other 0
                          23.61.199.65 220.175.66.in-addr.arpa. ttl 688 ping 24 var 119 rtt 500 rto 500 tA 0 tAAAA 0 tother 0 ednsknown 1 edns 0 delay 0 lame dnssec 0 rec 0 A 0 other 0
                          [24.11-RELEASE][admin@sg4860.home.arpa]/root: 
                          

                          You could do that for the IP of your pihole..

                          If I do that on mine - you will see there is nothing that would talk to my pihole IP

                          [24.11-RELEASE][admin@sg4860.home.arpa]/root: unbound-control -c /var/unbound/unbound.conf dump_infra | grep 192.168.3.10
                          [24.11-RELEASE][admin@sg4860.home.arpa]/root: 
                          

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • provelsP
                            provels
                            last edited by

                            @johnpoz
                            Pihole IP not found in Status/Infra.

                            [24.11-RELEASE][root@fw.workgroup]/root: cat /etc/resolv.conf
                            nameserver 127.0.0.1
                            nameserver ::1
                            search workgroup
                            

                            Yeah, I know about Wi-Fi and FreeBSD, but it's just a lab. And actually, none of those adapters are in use regularly. The one I use is a free-standing AP. Has my phone, laptop, and thermostat on it.
                            21280785-763a-4ca0-a569-b6e25282870d-image.png

                            But back to the weirdness, it's just that one external host that gets pinged backwards and floods. I wonder if the "smart" tv is smart enough to sniff for DNS servers? But why would .01 even look at .08?
                            It should just shrug it off. TV is wired, not Wi-Fi, address/DNS from DHCP. Weird. Done for tonight. Thanks for all the thoughts.

                            Peder

                            MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                            BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                            johnpozJ 1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @provels
                              last edited by johnpoz

                              @provels said in DNS Puzzle:

                              Pihole IP not found in Status/Infra.

                              Well then its not pfsense (if all you have setup in dns is to talk to loopback) or anything asking unbound for dns that is causing it. So its something else that somehow is using the mac of your bridge you setup. Or something else running on pfsense talking to it directly.. Because the infra cache would show you all the NS that unbound has talked too.. if possible I would check that cache as soon after you see a mass query, they can fall off or if you have restarted unbound the infra cache would get flushed.

                              But if your not seeing it listed in the infra cache - then unbound didn't talk to it.

                              So you have tracked to a smart TV? Why would it be seen as your bridge mac? It is a wireless client and when pfsense bridges this traffic to your lan, its putting it on the wire as coming from the bridge mac?

                              Proxy Arp could do that, and have seen that in the past with like wireless extenders - but normally you should see the actual mac if on the same layer 2, even through a bridge.. Unless pfsense was routing that traffic - then your pihole could see traffic from some remote IP as the mac of the pfsense interface that sent the traffic too it.

                              But you should see the remote IP, just the mac of pfsense interface that routed it.. Unless pfsense was also natting the traffic.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              provelsP 1 Reply Last reply Reply Quote 0
                              • provelsP
                                provels @johnpoz
                                last edited by

                                @johnpoz said in DNS Puzzle:

                                But if you're not seeing it listed in the infra cache - then unbound didn't talk to it.

                                Understood, agreed

                                So you have tracked to a smart TV?

                                Only from Googling the target hostname.
                                d1oxlq5h9kq8q5.cloudfront.net
                                All seem to ref Samsung TVs.

                                Why would it be seen as your bridge mac? It is a wireless client and when pfsense bridges this traffic to your lan, its putting it on the wire as coming from the bridge mac?

                                Yeah, no clue. But it is a wired client. I just cleared the log and will watch for it again. Thanks for all you input. I'll reply back when I see it again.

                                Peder

                                MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                                BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                                johnpozJ 1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @provels
                                  last edited by

                                  @provels wired client - wow that makes it weirder even - wireless ok something odd with the bridge and the wireless card in pfsense.

                                  So the TV is on 1 side of the bridge and the pihole is on the other side? I mean if they are on the same side - then how would pfsense even be involved in the conversation, so there would be no way for your pihole to see the mac from the bridge. Is the pihole wired as well? And they are on different sides of the bridge?

                                  Hmmm - wonder if mask could be wrong, and traffic is being sent to pfsense because TV thinks the IP its pointing to is on different network. I mean possible the TV could be trying to talk to say googledns or something - but you said you have no redirections or anything setup so even if it asked 8.8.8.8 pfsense wouldn't be sending that to the pihole. But if pfsense is seeing traffic to it with destination of IP of the pihole, could it maybe send that on, but from the mac of the bridge?

                                  If you believes its the TV generating the dns queries - I would packet capture to validate that and see exactly what is going on, where is the traffic being sent, what IP and mac coming off the TV.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  provelsP 1 Reply Last reply Reply Quote 0
                                  • provelsP
                                    provels @johnpoz
                                    last edited by

                                    @johnpoz

                                    then how would pfsense even be involved in the conversation

                                    Good question! TV and Pi are on the same flat net behind the bridge. Pi runs as a VM on a Windows server. Mask is right , TV gets DHCP. But would anyone be surprised if Google DNS was hard coded into the TV? After all, they try to make these things as stupid-proof as possible. I do attempt to block DoH in pfB. And I force all normal 53 DNS to the FW. But still, pfS shouldn't even know there is another DNS server on the net. As far as pfS knows, Pi is just another client. I'll watch it and post back if I have any revelations. Thanks again.

                                    Peder

                                    MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                                    BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                                    Bob.DigB johnpozJ 2 Replies Last reply Reply Quote 0
                                    • Bob.DigB
                                      Bob.Dig LAYER 8 @provels
                                      last edited by Bob.Dig

                                      @provels said in DNS Puzzle:

                                      And I force all normal 53 DNS to the FW

                                      I think you have said you don't. So what do you do exactly.

                                      @provels said in DNS Puzzle:

                                      @Bob-Dig I only have one port forward, for OpenVPN, and that's not enabled unless I'm out of town.

                                      I also would argue that this is not a port forward, just an open port. 😉

                                      provelsP 2 Replies Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @provels
                                        last edited by johnpoz

                                        @provels said in DNS Puzzle:

                                        And I force all normal 53 DNS to the FW.

                                        Yeah with @Bob-Dig here - you stated here that you don't do any redirection.

                                        My net is quite simple, it's like 1998... No DNS redirection, NAT reflection.

                                        If you redirect dns, and your TV is trying to talk to say 8.8.8.8 - where are you redirecting it too.. If the pihole than that explains your flood. If you were forwarding it to unbound, which resolves then it doesn't.. Even if redirected unbound would never ask pihole for anything unless you setup a domain override pointing to pihole, and you showed that is not happening when you stated you don't see the pihole IP in your infra cache. I haven't actually validated such a override would be in the infra cache - but I would think it would be.

                                        Many iot devices these days hard code dns entries - I think it's horrible for them to do that, but yeah lots of them do.. The only way to try and stop that is with redirection, or just a block - and many of them will scream and holler and fail to move forward in a setup if they can't talk to their overlords via dns query to the outside.. Shoot some of them have started doing doh, which you can't really redirect and pita to block via whack-a-mole lists of known doh servers, even if you could like with the case with dot on its own port of 853, any sane client would be able to tell its been redirected because the cert being served wouldn't validate.

                                        Good question! TV and Pi are on the same flat net behind the bridge.

                                        Ok on the same side - because one side of your bridge is the wireless, and only 1 wired interface in the bridge.. So yeah same side makes sense - doh ;)

                                        If that is the case then there is no freaking way pihole could ever see the mac of your bridge - unless you are actually redirecting traffic on pfsense and the TV is talking to something that would need to go through its gateway via the bridge connection on pfsense and your redirecting it to the pihole.

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        1 Reply Last reply Reply Quote 1
                                        • provelsP
                                          provels @Bob.Dig
                                          last edited by

                                          @Bob-Dig I do, but the only client pfS's DNS should see is the Pihole.

                                          f038920f-574e-474a-ba58-b6c429415e01-image.png
                                          i turned on the TV at 06:06 local and then saw this.

                                          80b38843-529a-4476-8525-0b92e58d3ce6-image.png

                                          OK, so it looks like the TV is trying to go out the gateway and being bounced back to Pi. .74 is the TV, .01 is the pfS. Think that's it?

                                          Peder

                                          MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                                          BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                                          johnpozJ 1 Reply Last reply Reply Quote 0
                                          • provelsP
                                            provels @Bob.Dig
                                            last edited by

                                            @Bob-Dig said in DNS Puzzle:

                                            I also would argue that this is not a port forward, just an open port.

                                            I guess technically it is, since it's a random high port forwarded to 1194?

                                            Peder

                                            MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                                            BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.