<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Архивы OPNsense firewall configuration - Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</title>
	<atom:link href="https://boxvirt.com/tag/opnsense-firewall-configuration/feed/" rel="self" type="application/rss+xml" />
	<link>https://boxvirt.com/tag/opnsense-firewall-configuration/</link>
	<description>Practical self-hosted infrastructure guides for Proxmox, OPNsense, and Docker.</description>
	<lastBuildDate>Sat, 19 Jul 2025 22:09:18 +0000</lastBuildDate>
	<language>ru-RU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://boxvirt.com/wp-content/uploads/2025/07/cropped-ChatGPT-Image-12-июл.-2025-г.-19_41_55-32x32.png</url>
	<title>Архивы OPNsense firewall configuration - Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</title>
	<link>https://boxvirt.com/tag/opnsense-firewall-configuration/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Secure DNS with DNS-over-TLS in OPNsense Using Unbound</title>
		<link>https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/</link>
					<comments>https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/#respond</comments>
		
		<dc:creator><![CDATA[eXtre]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 17:12:31 +0000</pubDate>
				<category><![CDATA[OPNsense]]></category>
		<category><![CDATA[OPNsense firewall configuration]]></category>
		<category><![CDATA[Private cloud with Linux]]></category>
		<category><![CDATA[Self-hosted cloud alternatives]]></category>
		<guid isPermaLink="false">https://boxvirt.com/?p=7</guid>

					<description><![CDATA[<p>Introduction DNS-over-TLS (DoT) encrypts DNS traffic, preventing third-party monitoring or tampering. OPNsense, a popular open-source firewall, supports DoT out of the box through the integrated Unbound DNS resolver. [&#8230;]</p>
<p>Сообщение <a href="https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/">How to Secure DNS with DNS-over-TLS in OPNsense Using Unbound</a> появились сначала на <a href="https://boxvirt.com">Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<p></p>



<h3 class="wp-block-heading">Introduction</h3>



<p>DNS-over-TLS (DoT) encrypts DNS traffic, preventing third-party monitoring or tampering. OPNsense, a popular open-source firewall, supports DoT out of the box through the integrated Unbound DNS resolver. This guide walks you through setting up encrypted DNS using Unbound for improved security and privacy.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">What is Unbound DNS?</h3>



<p>Unbound is a modern, high-performance recursive DNS resolver developed by NLnet Labs. Within OPNsense, Unbound acts as the system’s default DNS engine. Instead of relying on third-party resolvers like Google or Cloudflare, Unbound performs full DNS resolution by querying root servers directly.</p>



<h4 class="wp-block-heading">Core Capabilities of Unbound:</h4>



<ul class="wp-block-list">
<li>Full support for DNSSEC to validate DNS integrity</li>



<li>Local DNS overrides for internal hosts</li>



<li>Native DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) support</li>



<li>Per-client access controls</li>



<li>Fast, efficient DNS caching</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Why Use Unbound in OPNsense?</h3>



<h4 class="wp-block-heading">1. <strong>Enhanced Security</strong></h4>



<ul class="wp-block-list">
<li>Encrypted DNS queries using DoT help prevent eavesdropping and manipulation.</li>



<li>DNSSEC ensures responses are verified at every step of resolution.</li>



<li>Recursive resolution eliminates dependency on upstream DNS providers.</li>
</ul>



<h4 class="wp-block-heading">2. <strong>High Performance</strong></h4>



<ul class="wp-block-list">
<li>Lightweight and resource-efficient — ideal even for embedded systems.</li>



<li>Local caching drastically reduces latency for repeated queries.</li>



<li>Optimized for real-time performance, even under high load.</li>
</ul>



<h4 class="wp-block-heading">3. <strong>Advanced Control</strong></h4>



<ul class="wp-block-list">
<li>Full customization of DNS zones, blacklists, and redirects.</li>



<li>Restrict access by IP, interface, or query type.</li>



<li>Easily integrates with VLANs, aliases, and firewall policies.</li>
</ul>



<h4 class="wp-block-heading">4. <strong>Privacy Focused</strong></h4>



<ul class="wp-block-list">
<li>No DNS logs by default — ideal for privacy-conscious setups.</li>



<li>Completely avoids third-party DNS services unless explicitly configured.</li>
</ul>



<h4 class="wp-block-heading">5. <strong>Seamless Integration with OPNsense</strong></h4>



<ul class="wp-block-list">
<li>Managed through a simple web UI</li>



<li>Ties into DHCP static mappings</li>



<li>Works harmoniously with other OPNsense services</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Limitations to Consider</h3>



<h4 class="wp-block-heading">1. <strong>Cold Start Latency</strong></h4>



<p>Initial queries can be slower than cloud DNS providers, especially after reboots or cache clears, since Unbound must resolve each domain from scratch.</p>



<h4 class="wp-block-heading">2. <strong>Manual Configuration Needed</strong></h4>



<p>Features like DoT, DNS blocklists, or custom rules often require deeper configuration. This can be challenging for beginners.</p>



<h4 class="wp-block-heading">3. <strong>No Built-In Ad Blocking</strong></h4>



<p>Unbound doesn&#8217;t block ads out of the box. Users must manually configure and maintain DNS blocklists.</p>



<h4 class="wp-block-heading">4. <strong>Minimal Logging &amp; GUI</strong></h4>



<p>Unlike Pi-hole or AdGuard Home, Unbound lacks a rich dashboard or per-client query log. Power users may need additional tools to monitor DNS traffic.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Step-by-Step: Enabling DNS-over-TLS in OPNsense</h3>



<h4 class="wp-block-heading">Part 1: Configure DoT in Unbound</h4>



<p></p>



<ol class="wp-block-list">
<li>Go to <strong>Services → Unbound DNS → DNS over TLS</strong> in the OPNsense web GUI.</li>



<li>Click <strong>Add (+)</strong> to create a new DoT entry.</li>



<li>Enable the entry by ticking the <strong>Enabled</strong> checkbox.</li>



<li>Leave the <strong>Domain</strong> field blank to apply forwarding globally.</li>



<li>Specify the DNS server’s IP (e.g., <code>1.1.1.1</code>).</li>



<li>Set the <strong>Port</strong> to <code>853</code> — the standard for DoT.</li>



<li>Enter the DNS server&#8217;s hostname (e.g., <code>cloudflare-dns.com</code>) under <strong>Verify CN</strong> to validate the TLS certificate.</li>



<li>Save the settings. Optionally, add a second (IPv6) DoT server.</li>



<li>Click <strong>Apply</strong> to activate changes.</li>
</ol>



<h4 class="wp-block-heading">Part 2: Update General and DHCP Settings</h4>



<ol class="wp-block-list">
<li>Go to <strong>System → Settings → General</strong>.</li>



<li>Remove any predefined DNS servers to ensure Unbound handles all DNS.</li>



<li>Uncheck the option to allow DNS overrides from DHCP/PPP.</li>



<li>Save changes.</li>



<li>Navigate to <strong>Services → DHCPv4 → LAN</strong>.</li>



<li>Clear the DNS server fields to inherit the default Unbound configuration.</li>



<li>Save and restart DHCP if prompted.</li>
</ol>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Conclusion</h3>



<p>Unbound DNS with DNS-over-TLS in OPNsense delivers strong privacy and control without reliance on third-party DNS services. While setup requires a bit more effort than using external resolvers, the result is a secure, self-reliant DNS infrastructure — ideal for privacy-focused users and advanced network environments.</p>
<p>Сообщение <a href="https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/">How to Secure DNS with DNS-over-TLS in OPNsense Using Unbound</a> появились сначала на <a href="https://boxvirt.com">Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://boxvirt.com/how-to-secure-dns-with-dns-over-tls-in-opnsense-using-unbound/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Transitioning to Kea DHCP in OPNsense: A Modern Alternative to ISC DHCP</title>
		<link>https://boxvirt.com/transitioning-to-kea-dhcp-in-opnsense-a-modern-alternative-to-isc-dhcp/</link>
					<comments>https://boxvirt.com/transitioning-to-kea-dhcp-in-opnsense-a-modern-alternative-to-isc-dhcp/#respond</comments>
		
		<dc:creator><![CDATA[eXtre]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 17:35:23 +0000</pubDate>
				<category><![CDATA[OPNsense]]></category>
		<category><![CDATA[DHCP Setup]]></category>
		<category><![CDATA[Kea DHCP in OPNsense]]></category>
		<category><![CDATA[OPNsense firewall configuration]]></category>
		<guid isPermaLink="false">https://boxvirt.com/?p=14</guid>

					<description><![CDATA[<p>Introduction OPNsense has traditionally relied on the ISC DHCP server for IP address management. However, with ISC DHCP reaching its end-of-life, it&#8217;s time to consider transitioning to Kea [&#8230;]</p>
<p>Сообщение <a href="https://boxvirt.com/transitioning-to-kea-dhcp-in-opnsense-a-modern-alternative-to-isc-dhcp/">Transitioning to Kea DHCP in OPNsense: A Modern Alternative to ISC DHCP</a> появились сначала на <a href="https://boxvirt.com">Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex"></figure>



<h3 class="wp-block-heading">Introduction</h3>



<p>OPNsense has traditionally relied on the ISC DHCP server for IP address management. However, with ISC DHCP reaching its end-of-life, it&#8217;s time to consider transitioning to Kea DHCP—a modern, modular, and high-performance DHCP server developed by the same team at the Internet Systems Consortium (ISC).<a href="https://forum.opnsense.org/index.php?topic=45232.0&amp;utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">Wikipedia+2OPNsense Forum+2YouTube+2</a></p>



<p>Kea DHCP offers a contemporary approach to IP address allocation and centralized management, making it an ideal choice for both production environments and home labs.<a href="https://forum.netgate.com/topic/190516/after-kea-for-1-year-reverted-back-to-bind-isc?utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">Wikipedia+3Netgate Forum+3Reddit+3</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Advantages of Kea DHCP</h3>



<ul class="wp-block-list">
<li><strong>Dynamic Configuration Reloads</strong>: Modify lease configurations without restarting the service, ensuring uninterrupted network operations.<a href="https://de.wikipedia.org/wiki/Kea_%28Software%29?utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">Wikipedia+3Wikipedia+3Reddit+3</a></li>



<li><strong>Modular Architecture</strong>: Activate only the components you need, optimizing resource usage.</li>



<li><strong>Database Integration</strong>: Store lease information in MySQL or PostgreSQL databases for scalability and reliability.</li>



<li><strong>RESTful API</strong>: Automate and manage configurations programmatically, enhancing flexibility.</li>



<li><strong>Extensibility</strong>: Implement custom logic through hooks and scripts to meet specific network requirements.</li>



<li><strong>Active Development</strong>: Benefit from ongoing support and updates from the ISC and the broader community.<a href="https://de.wikipedia.org/wiki/Kea_%28Software%29?utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">YouTube+4Wikipedia+4Ars Technica+4</a></li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Considerations and Limitations</h3>



<ul class="wp-block-list">
<li><strong>Resource Consumption</strong>: Kea&#8217;s advanced features may demand more system resources, particularly when using REST APIs or database backends. This could impact performance on low-powered devices like Raspberry Pi or in lightweight container environments.<a href="https://forum.opnsense.org/index.php?topic=40080.0&amp;utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">OPNsense Forum</a></li>



<li><strong>High Availability (HA)</strong>: Unlike ISC DHCP, Kea&#8217;s HA capabilities are still evolving. While some HA features exist, they may not match the robustness of ISC&#8217;s failover mechanisms.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Setting Up Kea DHCP in OPNsense</h3>



<p>OPNsense has integrated Kea DHCP for some time, allowing users to configure it directly through the web interface.</p>



<p><strong>Prerequisites</strong>:</p>



<ol class="wp-block-list">
<li><strong>Disable ISC DHCP</strong>: Navigate to <em>Services → ISC DHCPv4</em> and uncheck the &#171;Enable&#187; option.<a href="https://www.reddit.com/r/opnsense/comments/1ahv8jg/dhcp_kea_configuration/?utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">Reddit</a></li>



<li><strong>Enable Kea Control Agent</strong>: Go to <em>Services → Kea DHCP → Control Agent</em>, check &#171;Enable,&#187; and save the settings.<a href="https://www.reddit.com/r/opnsense/comments/1ahv8jg/dhcp_kea_configuration/?utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">Reddit+1Wikipedia+1</a></li>



<li><strong>Configure Kea DHCPv4</strong>:
<ul class="wp-block-list">
<li>Navigate to <em>Services → Kea DHCPv4</em>.</li>



<li>Check &#171;Enable&#187; and select the appropriate interface (e.g., LAN).<a href="https://www.reddit.com/r/opnsense/comments/1ahv8jg/dhcp_kea_configuration/?utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">Reddit+1docs.opnsense.org+1</a></li>



<li>In the &#171;Subnets&#187; tab, click &#171;Add&#187; and enter the following:<a href="https://www.reddit.com/r/opnsense/comments/1ahv8jg/dhcp_kea_configuration/?utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">Reddit</a>
<ul class="wp-block-list">
<li><strong>Subnet</strong>: e.g., <code>192.168.1.0/24</code></li>



<li><strong>Pools</strong>: e.g., <code>192.168.1.100 - 192.168.1.200</code></li>



<li><strong>Router (Gateway)</strong>: e.g., <code>192.168.1.1</code></li>



<li><strong>DNS Servers</strong>: e.g., <code>192.168.1.1</code></li>
</ul>
</li>



<li>Save and apply the configuration.</li>
</ul>
</li>
</ol>



<p>Once configured, Kea DHCP will begin assigning IP addresses within the specified range. Existing leases from ISC DHCP will remain active until they expire or are renewed under Kea.<a href="https://www.youtube.com/watch?v=9yLQezDKVoY&amp;utm_source=chatgpt.com" target="_blank" rel="noreferrer noopener">Wikipedia+3YouTube+3YouTube+3</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Migration Tips</h3>



<ul class="wp-block-list">
<li><strong>Static Lease Migration</strong>: OPNsense supports exporting and importing static leases in CSV format, facilitating transitions between DHCP servers.</li>



<li><strong>DNS Integration</strong>: Ensure that static mappings are correctly reflected in your DNS resolver (e.g., Unbound) to maintain hostname resolution.</li>



<li><strong>Testing</strong>: Before deploying in a production environment, test the Kea DHCP configuration in a controlled setting to identify and resolve potential issues.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Conclusion</h3>



<p>Transitioning to Kea DHCP in OPNsense offers a modern, flexible, and scalable solution for network administrators. While it introduces new features and capabilities, it&#8217;s essential to be aware of its current limitations and plan accordingly. As Kea continues to mature, it stands as a robust replacement for the legacy ISC DHCP server.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>References</strong>:</p>



<ul class="wp-block-list">
<li><a class="" href="https://kea.readthedocs.io/en/latest/">Kea DHCP Official Documentation</a></li>



<li><a class="" href="https://opnsense.org/">OPNsense Project</a></li>



<li><a class="" href="https://github.com/isc-projects/kea">ISC Kea GitHub Repository</a></li>
</ul>
<p>Сообщение <a href="https://boxvirt.com/transitioning-to-kea-dhcp-in-opnsense-a-modern-alternative-to-isc-dhcp/">Transitioning to Kea DHCP in OPNsense: A Modern Alternative to ISC DHCP</a> появились сначала на <a href="https://boxvirt.com">Boxvirt - Proxmox &amp; OPNsense Infrastructure Guides</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://boxvirt.com/transitioning-to-kea-dhcp-in-opnsense-a-modern-alternative-to-isc-dhcp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
