• 0 Votes
    4 Posts
    1k Views
    Y

    @ericafterdark I'm actually one of the authors of ctrld. If you're into fancy DNS routing, you may dig this article on how to use ctrld with pfSense, and what you can accomplish with it, especially if you use Control D as an upstream. https://github.com/Control-D-Inc/ctrld/wiki/pfSense-and-OPNsense-Operations-Guide

  • 0 Votes
    2 Posts
    594 Views
    stephenw10S

    Not easily. That is usually accomplished by having staff and student VLANs where you can apply different firewall rules to the traffic. So if it's wifi for example you can have a separate ssid with 802.1x authentication that only staff can connect to.

    Steve

  • 0 Votes
    2 Posts
    532 Views
    M

    Also there is nothing in filtering rules to deny anything all the interfaces are allowed to pass through the traffic. Neither its showing anything on the system logs as well

  • 0 Votes
    2 Posts
    1k Views
    M

    Take a good look at what's getting blocked in your log files, it's easy to break google products because of their spyware/tracking integration.

  • 0 Votes
    3 Posts
    545 Views
    A

    Hi Gertjan,
    We forward the logs in a syslog server, and then the relevant ones in a Security Information and Event Management system (SIEM), splunk based. So we can always investigate in the syslog server (no log dropped at all), but for our security needs, internal DNS requests are irrelevant and I don't want to pay to index them in splunk.

  • Firewall rule name in logs

    Firewalling
    2
    0 Votes
    2 Posts
    1k Views
    A

    Technically, these are NOT called rule names, but descriptions instead.

    The description of my firewall rules (on LAN is where I'm logging) are in my firewall logs. If you've got no rules created, you'll have to make some that actually log the data. After that, if you look in Status -> System Logs -> Firewall in the Rule column it lists the rule description(s).

    There's also the 10 digit unique (I think) tracking ID code to make them quick to find or index.

    The only restriction listed for rule descriptions is max of 52 characters. Don't know anything about special characters, however. Here's some talk about some description stuff.

    https://forum.netgate.com/topic/92254/firewall-rule-description-length-limitation

    Jeff