scale vs wodth for images...

pull/35/merge
Ad Schellevis 6 years ago
parent 896f94e78c
commit 52aa7c2b06

@ -36,13 +36,13 @@ Sample
Lets say we want to create an alias table for **www.youtube.com** Lets say we want to create an alias table for **www.youtube.com**
.. image:: images/aliases_host.png .. image:: images/aliases_host.png
:scale: 100% :width: 100%
**Apply changes** and look at the content of our newly created pf table. **Apply changes** and look at the content of our newly created pf table.
Go to **Firewall->Diagnostics->pfTables** and select our newly created youtube table. Go to **Firewall->Diagnostics->pfTables** and select our newly created youtube table.
.. image:: images/pftable_youtube.png .. image:: images/pftable_youtube.png
:scale: 100% :width: 100%
As you can see there are multiple ip addresses for this domain. As you can see there are multiple ip addresses for this domain.
@ -73,12 +73,12 @@ GeoIP
----- -----
With GeoIP alias you can select one or more countries or whole continents to block With GeoIP alias you can select one or more countries or whole continents to block
or allow. Use the *toggle all* checkbox to select all countries within the given or allow. Use the *toggle all* checkbox to select all countries within the given
region. region.
This feature was reworked with 17.7.7 and supersedes the GeoIP blocking via IPS. This feature was reworked with 17.7.7 and supersedes the GeoIP blocking via IPS.
.. image:: images/firewall_geoip_alias.png .. image:: images/firewall_geoip_alias.png
:scale: 100% :width: 100%
-------------- --------------
Import Feature Import Feature
@ -131,12 +131,12 @@ the ipsec server for a site to site tunnel connection:
* 192.168.300.3 * 192.168.300.3
.. image:: images/alias_remote_ipsec.png .. image:: images/alias_remote_ipsec.png
:scale: 100% :width: 100%
We call our list remote_ipsec and update our firewall rules accordingly. We call our list remote_ipsec and update our firewall rules accordingly.
.. image:: images/alias_firewall_rules.png .. image:: images/alias_firewall_rules.png
:scale: 100% :width: 100%
Notice the list icon to identify a rule with an alias (list). Notice the list icon to identify a rule with an alias (list).

@ -3,7 +3,7 @@
=================== ===================
.. image:: images/eye_on_virus_new.jpg .. image:: images/eye_on_virus_new.jpg
:scale: 100% :width: 100%
**OPNsense** offers the industry standard ICAP to protect http and https **OPNsense** offers the industry standard ICAP to protect http and https
connections against ransomware, trojans, viruses and other malware . connections against ransomware, trojans, viruses and other malware .

@ -7,7 +7,7 @@ but is also widely used in corporate networks for an additional layer of securit
on wireless or Internet access. on wireless or Internet access.
.. image:: images/hotspot_login.png .. image:: images/hotspot_login.png
:scale: 100% :width: 100%
-------------------- --------------------
Typical Applications Typical Applications
@ -27,7 +27,7 @@ task. At the same time it offers additional functionalities, such as:
* Custom Splash page * Custom Splash page
.. image:: images/captiveportal_template_folder.png .. image:: images/captiveportal_template_folder.png
:scale: 100% :width: 100%
--------------- ---------------
Zone Management Zone Management

@ -21,7 +21,7 @@ GUI Layout & Main Components
The GUI consists out of the following main components: The GUI consists out of the following main components:
.. image:: images/gui_layout.png .. image:: images/gui_layout.png
:scale: 100% :width: 100%
Logo & Link to Lobby Logo & Link to Lobby

@ -11,7 +11,7 @@ with automatic and seamless fail-over. While switching to the backup network
connections will stay active with minimal interruption for the users. connections will stay active with minimal interruption for the users.
.. image:: images/light_bulbs.png .. image:: images/light_bulbs.png
:scale: 100% :width: 100%
------------------ ------------------
Automatic failover Automatic failover

@ -27,14 +27,14 @@ connection, for IPv6 using DHCP, select DHCPv6 in the IPv6 connection as
shown below. shown below.
.. image:: images/ZenUK_image1.png .. image:: images/ZenUK_image1.png
:scale: 100% :width: 100%
The next step is to configure the parameters required for DHCPv6, these The next step is to configure the parameters required for DHCPv6, these
are located in the DHCPv6 client configuration section of the WAN are located in the DHCPv6 client configuration section of the WAN
interface shown below. interface shown below.
.. image:: images/ZenUK_image2.png .. image:: images/ZenUK_image2.png
:scale: 100% :width: 100%
As stated before, Zen provide a /48 prefix, so select the prefix size As stated before, Zen provide a /48 prefix, so select the prefix size
accordingly. We directly send the solicit as in this case we do not wish accordingly. We directly send the solicit as in this case we do not wish
@ -59,14 +59,14 @@ Select Interfaces->LAN and set the IPv6 Configuration Type to Track
Interface Interface
.. image:: images/ZenUK_image3.png .. image:: images/ZenUK_image3.png
:scale: 100% :width: 100%
Finally, set the Track IPv6 Interface to WAN, unless there is a special Finally, set the Track IPv6 Interface to WAN, unless there is a special
requirement which this document does not cover, set the IPv6 Prefix ID requirement which this document does not cover, set the IPv6 Prefix ID
to 0. to 0.
.. image:: images/ZenUK_image4.png .. image:: images/ZenUK_image4.png
:scale: 100% :width: 100%
Click Save and then Apply. Click Save and then Apply.
@ -107,7 +107,7 @@ Set up the gateway like this:
.. image:: images/ZenUK_image5.png .. image:: images/ZenUK_image5.png
:scale: 100% :width: 100%
Click Save. Click Save.
@ -119,7 +119,7 @@ Select Interfaces->WAN.
Go to IPv6 Configuration Type and Select Static IPv6. Go to IPv6 Configuration Type and Select Static IPv6.
.. image:: images/ZenUK_image6.png .. image:: images/ZenUK_image6.png
:scale: 100% :width: 100%
Go to Static IPv6 Configuration and set the IPv6 Static address: Go to Static IPv6 Configuration and set the IPv6 Static address:
@ -127,7 +127,7 @@ Go to Static IPv6 Configuration and set the IPv6 Static address:
DHCPv6.** DHCPv6.**
.. image:: images/ZenUK_image7.png .. image:: images/ZenUK_image7.png
:scale: 100% :width: 100%
Select Use IPv4 connectivity, all IPv6 traffic goes via the PPPoE link. Select Use IPv4 connectivity, all IPv6 traffic goes via the PPPoE link.
@ -135,7 +135,7 @@ Finally, select the IPv6 Upstream Gateway, this is the gateway you
created earlier. created earlier.
.. image:: images/ZenUK_image8.png .. image:: images/ZenUK_image8.png
:scale: 100% :width: 100%
Click Save and Apply. Click Save and Apply.
@ -146,7 +146,7 @@ The LAN interface is very simple to set up, all we need to do is set the
IPv6 Configuration Type to Static, and enter our static address. IPv6 Configuration Type to Static, and enter our static address.
.. image:: images/ZenUK_image9.png .. image:: images/ZenUK_image9.png
:scale: 100% :width: 100%
Zen give us a /48 prefix to use on the LAN, so pick an address from that Zen give us a /48 prefix to use on the LAN, so pick an address from that
range. For example our prefix is: range. For example our prefix is:
@ -158,7 +158,7 @@ So
2a02:8242:55AB:0:4:3:2:1 would suffice. 2a02:8242:55AB:0:4:3:2:1 would suffice.
.. image:: images/ZenUK_image10.png .. image:: images/ZenUK_image10.png
:scale: 100% :width: 100%
We want to use a /64 prefix on this interface. We want to use a /64 prefix on this interface.
@ -177,7 +177,7 @@ Services->DHCPv6[LAN]
Firstly, enable the server. Firstly, enable the server.
.. image:: images/ZenUK_image11.png .. image:: images/ZenUK_image11.png
:scale: 100% :width: 100%
You will notice that the subnet already has a range, and the subnet mask You will notice that the subnet already has a range, and the subnet mask
is the /64 we set on the LAN. There is also a range we must use, the is the /64 we set on the LAN. There is also a range we must use, the
@ -192,7 +192,7 @@ Enter the upper end range that the server will use.
2a02:8231:d256::eeee:ffff:ffff:ffff 2a02:8231:d256::eeee:ffff:ffff:ffff
.. image:: images/ZenUK_image12.png .. image:: images/ZenUK_image12.png
:scale: 100% :width: 100%
This should cover most LAN subnets, the range given here gives This should cover most LAN subnets, the range given here gives
281,474.976.710,655 addresses. 281,474.976.710,655 addresses.
@ -204,7 +204,7 @@ example we will only be giving out 64 bit prefixes. We know we have been
given a /48 prefix by Zen, so we enter our prefix range like this: given a /48 prefix by Zen, so we enter our prefix range like this:
.. image:: images/ZenUK_image13.png .. image:: images/ZenUK_image13.png
:scale: 100% :width: 100%
Our prefix range is the upper 48 bits, plus some of the next 16 bits, Our prefix range is the upper 48 bits, plus some of the next 16 bits,
but we must not cross into the range we have used for our LAN addresses. but we must not cross into the range we have used for our LAN addresses.

@ -17,19 +17,19 @@ in the modem itself.
Set both IPv4 and IPv6 configuration type to DHCP and DHCPv6 respectively. Set both IPv4 and IPv6 configuration type to DHCP and DHCPv6 respectively.
.. image:: images/skyuk_wan_1.png .. image:: images/skyuk_wan_1.png
:scale: 100% :width: 100%
**Option61 - dhcp-client-identifier** **Option61 - dhcp-client-identifier**
------------------------------------- -------------------------------------
We now need to send the Sky login credentials. When using VDSL we do not We now need to send the Sky login credentials. When using VDSL we do not
need to use specific credentials, as long as they are correctly formatted need to use specific credentials, as long as they are correctly formatted
anything will do. anything will do.
Under DHCP Client Configuration select the Advanced button. Under DHCP Client Configuration select the Advanced button.
.. image:: images/skyuk_lan_2.png .. image:: images/skyuk_lan_2.png
:scale: 100% :width: 100%
There is an entry 'Send Options', enter the UserID & Password here in the There is an entry 'Send Options', enter the UserID & Password here in the
format: format:
@ -52,13 +52,13 @@ So the full entry for the 'Lease Requirements' Send Options would be:
*dhcp-client-identifier "12345678@skydsl|12345678",dhcp-class-identifier "7.16a4N_UNI|PCBAFAST2504Nv1.0"* *dhcp-client-identifier "12345678@skydsl|12345678",dhcp-class-identifier "7.16a4N_UNI|PCBAFAST2504Nv1.0"*
The next step is to configure the parameters required for DHCPv6, these The next step is to configure the parameters required for DHCPv6, these
are located in the DHCPv6 client configuration section of the WAN are located in the DHCPv6 client configuration section of the WAN
interface shown below. interface shown below.
.. image:: images/skyuk_wan_2.png .. image:: images/skyuk_wan_2.png
:scale: 100% :width: 100%
Sky provide a /56 IPv6 delegation, they do not provide a global IPv6 address Sky provide a /56 IPv6 delegation, they do not provide a global IPv6 address
on the WAN interface, this is link local only. The setting of the option on the WAN interface, this is link local only. The setting of the option
@ -81,12 +81,12 @@ again would probably result in a new prefix being given, therefore an option
to enter and store a DUID is given in the Interface:Settings menu. to enter and store a DUID is given in the Interface:Settings menu.
.. image:: images/skyuk_wan_3.png .. image:: images/skyuk_wan_3.png
:scale: 100% :width: 100%
The Identifier can either be entered manually or if the user clicks on the 'i' The Identifier can either be entered manually or if the user clicks on the 'i'
icon, the existing DUID can be automatically entered into the field by clicking icon, the existing DUID can be automatically entered into the field by clicking
on the 'Insert the existing DUID here' legend. on the 'Insert the existing DUID here' legend.
Click Save. Click Save.
**LAN Interface** **LAN Interface**
@ -97,17 +97,17 @@ Interfaces:[LAN] menu.
It is my recommendation not to use the private subnet range 192.168.*.0, as It is my recommendation not to use the private subnet range 192.168.*.0, as
this range is often used by hotels and other public networks for access, this this range is often used by hotels and other public networks for access, this
can cause issues when using a VPN. My preferred address method is using the can cause issues when using a VPN. My preferred address method is using the
10.*.*.0 subnet where the second and third quartet are birth dates or some 10.*.*.0 subnet where the second and third quartet are birth dates or some
other easily memorable number. i.e. 10.1.11.0 would be the first of November. other easily memorable number. i.e. 10.1.11.0 would be the first of November.
This is more random and the chances of the same range on a public network is This is more random and the chances of the same range on a public network is
greatly reduced, however the address range is easily memorable. greatly reduced, however the address range is easily memorable.
.. image:: images/ZenUK_image3.png .. image:: images/ZenUK_image3.png
:scale: 100% :width: 100%
.. image:: images/skyuk_lan_1.png .. image:: images/skyuk_lan_1.png
:scale: 100% :width: 100%
Once the LAN IPv4 address is set then all that remains in the LAN interface Once the LAN IPv4 address is set then all that remains in the LAN interface
is to set the interface to use the assigned IPv6 prefix. is to set the interface to use the assigned IPv6 prefix.
@ -117,7 +117,7 @@ requirement which this document does not cover, set the IPv6 Prefix ID
to 0. to 0.
.. image:: images/ZenUK_image4.png .. image:: images/ZenUK_image4.png
:scale: 100% :width: 100%
Click Save and then Apply. Click Save and then Apply.
@ -125,4 +125,3 @@ Setting up the IPv4 DHCP server is not covered in this document, but is
required. required.
It is advisable at this point to reboot the system. It is advisable at this point to reboot the system.

@ -3,7 +3,7 @@ Setup Caching Proxy
=================== ===================
.. image:: images/proxy_basics.png .. image:: images/proxy_basics.png
:scale: 100% :width: 100%
---------------- ----------------
Enable / Disable Enable / Disable
@ -36,7 +36,7 @@ To enable caching click on the arrow next to the **General Proxy Settings** to
see the dropdown menu and click on **Local Cache Settings**. see the dropdown menu and click on **Local Cache Settings**.
.. image:: images/proxy_cache.png .. image:: images/proxy_cache.png
:scale: 100% :width: 100%
Check the **Enable local cache** and click **Apply**. Check the **Enable local cache** and click **Apply**.
@ -137,7 +137,7 @@ Fill in:
Looks like (screenshots of version 16.1.4): Looks like (screenshots of version 16.1.4):
.. image:: images/proxy_blacklist.png .. image:: images/proxy_blacklist.png
:scale: 100% :width: 100%
**Save changes** **Save changes**
@ -177,7 +177,7 @@ And one more rule to block HTTPS access:
**Save** & **Apply changes** **Save** & **Apply changes**
.. image:: images/proxy_firewall.png .. image:: images/proxy_firewall.png
:scale: 100% :width: 100%
------------------------- -------------------------
Configure Browser/Firefox Configure Browser/Firefox
@ -186,7 +186,7 @@ To configure you browser for use with the proxy, just go to your network setting
and configure a proxy like this in firefox: and configure a proxy like this in firefox:
.. image:: images/proxy_firefox.png .. image:: images/proxy_firefox.png
:scale: 100% :width: 100%
For a set-for-step guide on full category based web filtering see :doc:`proxywebfilter`. For a set-for-step guide on full category based web filtering see :doc:`proxywebfilter`.

@ -15,7 +15,7 @@ will be used for the internal network and 172.8.0.0/24 will be used to
route our traffic to the internet. route our traffic to the internet.
.. image:: ./images/900px-Carp_setup_example.png .. image:: ./images/900px-Carp_setup_example.png
:scale: 100% :width: 100%
When using CARP ( `FreeBSD handbook on CARP <https://www.freebsd.org/doc/handbook/carp.html>`__ ), all When using CARP ( `FreeBSD handbook on CARP <https://www.freebsd.org/doc/handbook/carp.html>`__ ), all
fail-safe interfaces should have a dedicated ip address which will be fail-safe interfaces should have a dedicated ip address which will be

@ -40,11 +40,11 @@ If you need to enter a PIN number then click on **Advanced Options**
Click **Save** to apply the settings. Click **Save** to apply the settings.
.. image:: images/4g_configure_ppp.png .. image:: images/4g_configure_ppp.png
:scale: 100% :width: 100%
.. image:: images/ppp_celular_configured.png .. image:: images/ppp_celular_configured.png
:scale: 100% :width: 100%
--------------------------------- ---------------------------------
Step 2 - Assign the WAN interface Step 2 - Assign the WAN interface
@ -60,7 +60,7 @@ If everything went fine then your are all setup and the default gateway will be
the one of you cellular connection. the one of you cellular connection.
.. image:: images/Interface_assignment_4g.png .. image:: images/Interface_assignment_4g.png
:scale: 100% :width: 100%
------------------------- -------------------------
Step 3 - Trouble shooting Step 3 - Trouble shooting

@ -101,7 +101,7 @@ Now we can put it all together, login to your OPNsense firewall and go
to the backup feature (default : https://192.168.1.1/diag_backup.php ) to the backup feature (default : https://192.168.1.1/diag_backup.php )
.. image:: ./images/600px-Google_Drive_Backup_screenshot.png .. image:: ./images/600px-Google_Drive_Backup_screenshot.png
:scale: 100% :width: 100%
On the bottom of the page are the options for the Google Drive backup, On the bottom of the page are the options for the Google Drive backup,
enable the feature and fill in the parameters. Email address is acquired enable the feature and fill in the parameters. Email address is acquired

@ -53,7 +53,7 @@ Set the update frequency to 1 for each day.
Press **Save** and then **Apply changes**. Press **Save** and then **Apply changes**.
.. image:: images/spamhaus_drop_edrop.png .. image:: images/spamhaus_drop_edrop.png
:scale: 100% :width: 100%
--------------------------------------- ---------------------------------------
Step 2 - Firewall Rules Inbound Traffic Step 2 - Firewall Rules Inbound Traffic
@ -87,7 +87,7 @@ Enter the following configuration and leave all other parameters on default valu
=================== =============== ============================================= =================== =============== =============================================
.. image:: images/spamhaus_wan_rules.png .. image:: images/spamhaus_wan_rules.png
:scale: 100% :width: 100%
**Save** **Save**
@ -123,7 +123,7 @@ lower right corner.
**Save** and **Apply changes** **Save** and **Apply changes**
.. image:: images/spamhaus_lan.png .. image:: images/spamhaus_lan.png
:scale: 100% :width: 100%
**DONE** **DONE**
@ -134,4 +134,4 @@ To list the ip addresses that are currently in the DROP and EDROP lists go to
**Firewall->Diagnostics->pfTables** and select the list you want to see: **Firewall->Diagnostics->pfTables** and select the list you want to see:
.. image:: images/spamhaus_pftable.png .. image:: images/spamhaus_pftable.png
:scale: 100% :width: 100%

@ -16,7 +16,7 @@ Then just add you category, if this is the first rule with a category no selecti
options will be visible. options will be visible.
.. image:: images/Rule_Category.png .. image:: images/Rule_Category.png
:scale: 100% :width: 100%
--------------------------------- ---------------------------------
Firewall Rules Filter by category Firewall Rules Filter by category
@ -27,7 +27,7 @@ becomes visible at the bottom of the table.
If you click it is will look like this: If you click it is will look like this:
.. image:: images/Filter_by_Category.png .. image:: images/Filter_by_Category.png
:scale: 100% :width: 100%
If you have a large number of categories, then just start typing and in search If you have a large number of categories, then just start typing and in search
box to make a quick selection. box to make a quick selection.
@ -38,7 +38,7 @@ Before Selection
Take a look at this simple rule set before selecting our "My IP's" category. Take a look at this simple rule set before selecting our "My IP's" category.
.. image:: images/Rules_Full.png .. image:: images/Rules_Full.png
:scale: 100% :width: 100%
-------------------- --------------------
And after selection And after selection
@ -46,7 +46,7 @@ Take a look at this simple rule set before selecting our "My IP's" category.
Now when selecting our test category it will look like this: Now when selecting our test category it will look like this:
.. image:: images/Filter_Category_Result.png .. image:: images/Filter_Category_Result.png
:scale: 100% :width: 100%
That is all there is to it to organize your rules without messing anything up. That is all there is to it to organize your rules without messing anything up.
@ -59,4 +59,4 @@ This features makes it possible to select rules from more than one category.
Example: Example:
.. image:: images/fw_category_multiselect.png .. image:: images/fw_category_multiselect.png
:scale: 100% :width: 100%

@ -6,7 +6,7 @@ Guest Networks are widely used to allow guests controlled internet access at
hotels, RV Parks or businesses. hotels, RV Parks or businesses.
.. image:: images/opnsense_hotspot_controller.png .. image:: images/opnsense_hotspot_controller.png
:scale: 100% :width: 100%
.. Note:: .. Note::
For the example we expect the GUESTNET interface to be connected with your For the example we expect the GUESTNET interface to be connected with your
@ -190,7 +190,7 @@ Click **Save** and then **Apply changes**
Your rules should look similar to the screenshot below: Your rules should look similar to the screenshot below:
.. image:: images/guestnet_fwrules.png .. image:: images/guestnet_fwrules.png
:scale: 100% :width: 100%
------------------------------ ------------------------------
@ -232,13 +232,13 @@ Lets create a custom landing page, to do so click on the tab **Templates** and
click on the download icon in the lower right corner ( |download| ). click on the download icon in the lower right corner ( |download| ).
.. image:: images/template_download.png .. image:: images/template_download.png
:scale: 100% :width: 100%
Now download the default template, we will use this to create our own. Now download the default template, we will use this to create our own.
Unpack the template zip file, you should have something similar to this: Unpack the template zip file, you should have something similar to this:
.. image:: images/template_filelisting.png .. image:: images/template_filelisting.png
:scale: 100% :width: 100%
Most files of the template can be modified, but some are default and may not be Most files of the template can be modified, but some are default and may not be
changes. Upon upload any changes to the files listed in **exclude.list** will be changes. Upon upload any changes to the files listed in **exclude.list** will be
@ -247,7 +247,7 @@ ignored. Currently these include the bootstrap java scripting and some fonts.
With the captive portal enabled the default screen looks like: With the captive portal enabled the default screen looks like:
.. image:: images/default_login_no_authenticator.png .. image:: images/default_login_no_authenticator.png
:scale: 100% :width: 100%
Lets change this default with a new logo and a welcome message, to this: Lets change this default with a new logo and a welcome message, to this:
@ -305,10 +305,10 @@ Enter a **Template Name**, for this example we use **Company**.
Hit Upload ( |upload| ) Hit Upload ( |upload| )
.. |download| image:: images/btn_download.png .. |download| image:: images/btn_download.png
:scale: 100% :width: 100%
.. |upload| image:: images/btn_upload.png .. |upload| image:: images/btn_upload.png
:scale: 100% :width: 100%
To enable the captive portal on the GUESTNET interface just click on **Apply**. To enable the captive portal on the GUESTNET interface just click on **Apply**.
@ -393,7 +393,7 @@ After testing your result should be similar to this (if your internet connection
has sufficient bandwidth). has sufficient bandwidth).
.. image:: images/cp-traffic-shaping.png .. image:: images/cp-traffic-shaping.png
:scale: 100% :width: 100%
.. Note:: .. Note::
Keep in mind we have only one connected client in this test, so all reserved Keep in mind we have only one connected client in this test, so all reserved
@ -431,7 +431,7 @@ Click on **Create Vouchers** in the lower right corner of the form.
Lets create 1 Day vouchers for our guests: Lets create 1 Day vouchers for our guests:
.. image:: images/create_vouchers.png .. image:: images/create_vouchers.png
:scale: 100% :width: 100%
Enter the Validity (1 day), the number of Vouchers and a Groupname (Wifi day pass f.i.). Enter the Validity (1 day), the number of Vouchers and a Groupname (Wifi day pass f.i.).
@ -474,7 +474,7 @@ the cvs data with word, open office or any other dtp/text editor.
Create something like this: Create something like this:
.. image:: images/cp_royalhotel_voucher.png .. image:: images/cp_royalhotel_voucher.png
:scale: 100% :width: 100%
You can select a database to and remove it entirely. This way you can You can select a database to and remove it entirely. This way you can
create a voucher database for the arrival date of guest per guest group create a voucher database for the arrival date of guest per guest group
@ -501,7 +501,7 @@ When done click **Save changes** and the **Apply** to apply the new settings.
Now users will see the login form as part of your template: Now users will see the login form as part of your template:
.. image:: images/cp_voucher_login.png .. image:: images/cp_voucher_login.png
:scale: 100% :width: 100%
-------------- --------------
Check Sessions Check Sessions
@ -510,7 +510,7 @@ To check the active sessions go to **Services->Captive Portal->Sessions**
Our current session looks like this: Our current session looks like this:
.. image:: images/cp_active_sessions.png .. image:: images/cp_active_sessions.png
:scale: 100% :width: 100%
You can drop an active session by clicking on the trashcan. You can drop an active session by clicking on the trashcan.
@ -527,7 +527,7 @@ page of the captive portal (**Services->Captive Protal->Vouchers**) and select
the correct database (Wifi day pass in our example). the correct database (Wifi day pass in our example).
.. image:: images/cp_active_vouchers.png .. image:: images/cp_active_vouchers.png
:scale: 100% :width: 100%
.. Note:: .. Note::
The state valid means it is activated but still valid. The state valid means it is activated but still valid.
@ -583,7 +583,7 @@ like this (shown with a bit of context):
window.open("session_popup.html","Session Status & Logout","width=400, height=400"); window.open("session_popup.html","Session Status & Logout","width=400, height=400");
.. image:: images/captiveportal_popup.png .. image:: images/captiveportal_popup.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
Advanced - CLI Session Status Advanced - CLI Session Status
@ -601,4 +601,4 @@ Type the following on the cli prompt to do so (for zone id 0):
The output will be something similar to this: The output will be something similar to this:
.. image:: images/cli_list_captiveportalsessions.png .. image:: images/cli_list_captiveportalsessions.png
:scale: 100% :width: 100%

@ -12,7 +12,7 @@ Insight is a fully integrated part of OPNsense. Its User Interface is simple yet
powerful. powerful.
.. image:: images/insight_gui.png .. image:: images/insight_gui.png
:scale: 100% :width: 100%
Insight offers a full set of analysis tools, ranging from a graphical overview to Insight offers a full set of analysis tools, ranging from a graphical overview to
@ -40,17 +40,17 @@ to compare usage with different interfaces.
**Stacked** **Stacked**
.. image:: images/stacked_view.png .. image:: images/stacked_view.png
:scale: 100% :width: 100%
**Stream** **Stream**
.. image:: images/stream_view.png .. image:: images/stream_view.png
:scale: 100% :width: 100%
**Expanded** **Expanded**
.. image:: images/expanded_view.png .. image:: images/expanded_view.png
:scale: 100% :width: 100%
Interfaces Interfaces
---------- ----------
@ -74,10 +74,10 @@ view by clicking or double clicking on one of the shown port names/numbers.
Clicking on a piece of the pie will open a detailed view for further analysis. Clicking on a piece of the pie will open a detailed view for further analysis.
.. image:: images/pie_piece.png .. image:: images/pie_piece.png
:scale: 100% :width: 100%
.. image:: images/pie_details.png .. image:: images/pie_details.png
:scale: 100% :width: 100%
IP Addresses Pie Chart IP Addresses Pie Chart
@ -103,14 +103,14 @@ click on the tab **Details**.
When opening the details view by clicking on the tab one can make a new query. When opening the details view by clicking on the tab one can make a new query.
.. image:: images/insight_details_view.png .. image:: images/insight_details_view.png
:scale: 100% :width: 100%
After selecting a valid date range (form/to) and interface one can further limit After selecting a valid date range (form/to) and interface one can further limit
the output by filtering on port or ip address. Select the refresh icon to update the output by filtering on port or ip address. Select the refresh icon to update
the detailed output. Leave Port and Address empty for a full detailed listing. the detailed output. Leave Port and Address empty for a full detailed listing.
.. image:: images/insight_full_details.png .. image:: images/insight_full_details.png
:scale: 100% :width: 100%
----------- -----------
@ -120,7 +120,7 @@ The **Export** view allows you to export the data for further analysis in your f
spreadsheet or other data analysis application. spreadsheet or other data analysis application.
.. image:: images/insight_export_view.png .. image:: images/insight_export_view.png
:scale: 100% :width: 100%
To export data, select a **Collection** : To export data, select a **Collection** :
@ -134,4 +134,4 @@ Select the **Resolution** in seconds (300,3600,86400)
Then select a date range (from/to) and click the **export** button. Then select a date range (from/to) and click the **export** button.
.. image:: images/insight_export.png .. image:: images/insight_export.png
:scale: 100% :width: 100%

@ -2,7 +2,7 @@
Installing OPNsense AWS image Installing OPNsense AWS image
============================= =============================
.. image:: images/amazon-web-services.png .. image:: images/amazon-web-services.png
:scale: 100% :width: 100%
To apply for access to the OPNsense Amazon AWS EC2 cloud image, you need: To apply for access to the OPNsense Amazon AWS EC2 cloud image, you need:
@ -24,7 +24,7 @@ Step 2 - Select Type
Choose an instance type Choose an instance type
.. image:: images/aws_launch_new_image.png .. image:: images/aws_launch_new_image.png
:scale: 100% :width: 100%
--------------------------------- ---------------------------------
Step 3 - Configure security group Step 3 - Configure security group
@ -32,7 +32,7 @@ Step 3 - Configure security group
To configure security group, make sure you allow https access from your own network. To configure security group, make sure you allow https access from your own network.
.. image:: images/aws_configure_security_group.png .. image:: images/aws_configure_security_group.png
:scale: 100% :width: 100%
------------------------- -------------------------
@ -40,7 +40,7 @@ Step 4 - Configure a disk
------------------------- -------------------------
.. image:: images/aws_choose_disc.png .. image:: images/aws_choose_disc.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
@ -48,7 +48,7 @@ Step 5 - Review your settings
----------------------------- -----------------------------
.. image:: images/aws_review_settings.png .. image:: images/aws_review_settings.png
:scale: 100% :width: 100%
-------------------- --------------------
Step 6 - SSH keypair Step 6 - SSH keypair
@ -56,14 +56,14 @@ Step 6 - SSH keypair
Select ssh keypair or skip, the ssh key isnt used for OPNsense, ssh is disabled by default. Select ssh keypair or skip, the ssh key isnt used for OPNsense, ssh is disabled by default.
.. image:: images/aws_ssh_keypair.png .. image:: images/aws_ssh_keypair.png
:scale: 100% :width: 100%
--------------------------- ---------------------------
Step 7 - Review status page Step 7 - Review status page
--------------------------- ---------------------------
.. image:: images/aws_status.png .. image:: images/aws_status.png
:scale: 100% :width: 100%
---------------------- ----------------------
Step 8 - AWS instances Step 8 - AWS instances
@ -71,7 +71,7 @@ Step 8 - AWS instances
Go to your AWS instances Go to your AWS instances
.. image:: images/aws_instances.png .. image:: images/aws_instances.png
:scale: 100% :width: 100%
Select the image, go to “image settings” then “get system log” to obtain the Select the image, go to “image settings” then “get system log” to obtain the
initial password initial password
@ -82,14 +82,14 @@ Step 9 - Initial root password
Copy your initial root password (line ** set initial….) Copy your initial root password (line ** set initial….)
.. image:: images/aws_capture_initial_password.png .. image:: images/aws_capture_initial_password.png
:scale: 100% :width: 100%
-------------------------------- --------------------------------
Step 10 - Search current address Step 10 - Search current address
-------------------------------- --------------------------------
.. image:: images/aws_search_current_ip.png .. image:: images/aws_search_current_ip.png
:scale: 100% :width: 100%
Login to OPNsense using the address provided. Login to OPNsense using the address provided.

@ -17,7 +17,7 @@ Prerequisites
**System->Firmware: Fetch updates** **System->Firmware: Fetch updates**
.. image:: images/firmware.png .. image:: images/firmware.png
:scale: 100% :width: 100%
* Minimum Advisable Memory is 2 Gigabyte and sufficient free disk space for * Minimum Advisable Memory is 2 Gigabyte and sufficient free disk space for
logging (>10GB advisable). logging (>10GB advisable).
@ -26,7 +26,7 @@ Prerequisites
Under **Interface-Settings** Under **Interface-Settings**
.. image:: images/disable_offloading.png .. image:: images/disable_offloading.png
:scale: 100% :width: 100%
.. warning:: .. warning::
@ -48,7 +48,7 @@ detection system too run on. For our example we will use the WAN interface, as
that will most likely be you connection with the public Internet. that will most likely be you connection with the public Internet.
.. image:: images/idps.png .. image:: images/idps.png
:scale: 100% :width: 100%
------------------- -------------------
Apply configuration Apply configuration
@ -57,7 +57,7 @@ First apply the configuration by pressing the **Apply** button at the bottom of
the form. the form.
.. image:: images/applybtn.png .. image:: images/applybtn.png
:scale: 100% :width: 100%
--------------- ---------------
Fetch Rule sets Fetch Rule sets
@ -66,12 +66,12 @@ For this example we will only fetch the abuse.ch SSL & Dodo Tracker rulesets.
To do so: select Enabled after each one. To do so: select Enabled after each one.
.. image:: images/rulesets_enable.png .. image:: images/rulesets_enable.png
:scale: 100% :width: 100%
To download the rule sets press **Download & Update Rules**. To download the rule sets press **Download & Update Rules**.
.. image:: images/downloadbtn.png .. image:: images/downloadbtn.png
:scale: 100% :width: 100%
----------------------- -----------------------
Change default behavior Change default behavior
@ -80,12 +80,12 @@ Now click on the info button right after each rule and change Input Filter
from none to drop actions. from none to drop actions.
.. image:: images/changefilter.png .. image:: images/changefilter.png
:scale: 100% :width: 100%
When done it should like this: When done it should like this:
.. image:: images/rulesdrop.png .. image:: images/rulesdrop.png
:scale: 100% :width: 100%
------------------------ ------------------------
Apply fraud drop actions Apply fraud drop actions
@ -93,7 +93,7 @@ Apply fraud drop actions
Now press **Download & Update Rules** again to change the behavior to drop. Now press **Download & Update Rules** again to change the behavior to drop.
.. image:: images/downloadbtn.png .. image:: images/downloadbtn.png
:scale: 100% :width: 100%
--------------- ---------------
Keep up to date Keep up to date
@ -103,7 +103,7 @@ Now schedule a regular fetch to keep your server up to date.
Click on schedule, a popup window will appear: Click on schedule, a popup window will appear:
.. image:: images/schedule.png .. image:: images/schedule.png
:scale: 100% :width: 100%
Select **enabled** and choose a time. For the example it is set to each day at 11:12. Select **enabled** and choose a time. For the example it is set to each day at 11:12.
Select **Save changes** and wait until you have returned to the IDS screen. Select **Save changes** and wait until you have returned to the IDS screen.
@ -122,4 +122,4 @@ Currently there is no test service available to check your block rules against,
however here is a sample of an actual alert that has been blocked: however here is a sample of an actual alert that has been blocked:
.. image:: images/alerts.jpg .. image:: images/alerts.jpg
:scale: 100% :width: 100%

@ -14,7 +14,7 @@ Prerequisites
**System->Firmware: Fetch updates** **System->Firmware: Fetch updates**
.. image:: images/firmware.png .. image:: images/firmware.png
:scale: 100% :width: 100%
* Minimum Advisable Memory is 2 Gigabyte and sufficient free disk space for * Minimum Advisable Memory is 2 Gigabyte and sufficient free disk space for
logging (>10GB advisable). logging (>10GB advisable).
@ -23,7 +23,7 @@ Prerequisites
Under **Interface-Settings** Under **Interface-Settings**
.. image:: images/disable_offloading.png .. image:: images/disable_offloading.png
:scale: 100% :width: 100%
.. warning:: .. warning::
@ -51,7 +51,7 @@ Select |add| to add a new rule.
Select Country: Select Country:
.. image:: images/ips_rule_add_geoip.png .. image:: images/ips_rule_add_geoip.png
:scale: 100% :width: 100%
We selected **Netherlands(not)** as this server needs to be accessible within We selected **Netherlands(not)** as this server needs to be accessible within
The Netherlands, this will drop all other traffic in both directions. The Netherlands, this will drop all other traffic in both directions.
@ -59,12 +59,12 @@ The Netherlands, this will drop all other traffic in both directions.
Select the Action (Alert or Drop): Select the Action (Alert or Drop):
.. image:: images/ips_action.png .. image:: images/ips_action.png
:scale: 100% :width: 100%
Add a description: Add a description:
.. image:: images/ips_description_country.png .. image:: images/ips_description_country.png
:scale: 100% :width: 100%
And click **Save changes** |save| And click **Save changes** |save|
@ -79,7 +79,7 @@ detection system too run on. For our example we will use the WAN interface, as
that will most likely be you connection with the public Internet. that will most likely be you connection with the public Internet.
.. image:: images/idps.png .. image:: images/idps.png
:scale: 100% :width: 100%
------------------- -------------------
Apply configuration Apply configuration
@ -87,13 +87,13 @@ Apply configuration
If this is the first GeoIP rule you add then you need to **Download & Update Rules** If this is the first GeoIP rule you add then you need to **Download & Update Rules**
.. image:: images/downloadbtn.png .. image:: images/downloadbtn.png
:scale: 100% :width: 100%
Then apply the configuration by pressing the **Apply** button at the bottom of Then apply the configuration by pressing the **Apply** button at the bottom of
the form. the form.
.. image:: images/applybtn.png .. image:: images/applybtn.png
:scale: 100% :width: 100%
------------ ------------
@ -102,7 +102,7 @@ Sample Alert
See a sample of an alert message below. See a sample of an alert message below.
.. image:: images/ips_geoip_alert.png .. image:: images/ips_geoip_alert.png
:scale: 100% :width: 100%
.. |save| image:: images/ips_save.png .. |save| image:: images/ips_save.png

@ -13,7 +13,7 @@ Prerequisites
**System->Firmware: Fetch updates** **System->Firmware: Fetch updates**
.. image:: images/firmware.png .. image:: images/firmware.png
:scale: 100% :width: 100%
* Minimum Advisable Memory is 2 Gigabyte and sufficient free disk space for * Minimum Advisable Memory is 2 Gigabyte and sufficient free disk space for
logging (>10GB advisable). logging (>10GB advisable).
@ -22,7 +22,7 @@ Prerequisites
Under **Interface-Settings** Under **Interface-Settings**
.. image:: images/disable_offloading.png .. image:: images/disable_offloading.png
:scale: 100% :width: 100%
.. warning:: .. warning::
@ -58,13 +58,13 @@ next to the address : |lock|.
Now you will see something similar to: Now you will see something similar to:
.. image:: images/facebook_click.png .. image:: images/facebook_click.png
:scale: 100% :width: 100%
Click on the arrow ( **>** ) and then Select **More Information** Click on the arrow ( **>** ) and then Select **More Information**
Now open the certificate details and you will see something that looks like this: Now open the certificate details and you will see something that looks like this:
.. image:: images/certificate.png .. image:: images/certificate.png
:scale: 100% :width: 100%
Copy the SHA1 certificate fingerprint (A0:4E:AF:B3:48:C2:6B:15:A8:C1:AA:87:A3:33:CA:A3:CD:EE:C9:C9). Copy the SHA1 certificate fingerprint (A0:4E:AF:B3:48:C2:6B:15:A8:C1:AA:87:A3:33:CA:A3:CD:EE:C9:C9).
@ -72,17 +72,17 @@ Copy the SHA1 certificate fingerprint (A0:4E:AF:B3:48:C2:6B:15:A8:C1:AA:87:A3:33
Paste this into the new rule: Paste this into the new rule:
.. image:: images/ips_rule_details.png .. image:: images/ips_rule_details.png
:scale: 100% :width: 100%
Select the Action (Alert or Drop): Select the Action (Alert or Drop):
.. image:: images/ips_action.png .. image:: images/ips_action.png
:scale: 100% :width: 100%
Add a description: Add a description:
.. image:: images/ips_description.png .. image:: images/ips_description.png
:scale: 100% :width: 100%
And click **Save changes** |save| And click **Save changes** |save|
@ -97,7 +97,7 @@ detection system too run on. For our example we will use the WAN interface, as
that will most likely be you connection with the public Internet. that will most likely be you connection with the public Internet.
.. image:: images/idps.png .. image:: images/idps.png
:scale: 100% :width: 100%
------------------- -------------------
Apply configuration Apply configuration
@ -106,7 +106,7 @@ First apply the configuration by pressing the **Apply** button at the bottom of
the form. the form.
.. image:: images/applybtn.png .. image:: images/applybtn.png
:scale: 100% :width: 100%
---------------------------- ----------------------------
Clear Browser Cache and test Clear Browser Cache and test
@ -115,7 +115,7 @@ Since your browser has cached the ssl certificate you will need to clear your
cache first. After that you can test and will see the following in **Alerts**: cache first. After that you can test and will see the following in **Alerts**:
.. image:: images/ips_facebook_alert.png .. image:: images/ips_facebook_alert.png
:scale: 100% :width: 100%
.. Note:: .. Note::

@ -83,13 +83,13 @@ To allow IPsec Tunnel Connections, the following should be allowed on WAN.
* UDP Traffic on Port 4500 (NAT-T) * UDP Traffic on Port 4500 (NAT-T)
.. image:: images/ipsec_wan_rules.png .. image:: images/ipsec_wan_rules.png
:scale: 100% :width: 100%
To allow traffic passing to your LAN subnet you need to add a rule to the IPsec To allow traffic passing to your LAN subnet you need to add a rule to the IPsec
interface. interface.
.. image:: images/ipsec_ipsec_lan_rule.png .. image:: images/ipsec_ipsec_lan_rule.png
:scale: 100% :width: 100%
----------------------- -----------------------
Step 1 - Mobile Clients Step 1 - Mobile Clients
@ -163,12 +163,12 @@ Advanced Options
Save your setting by pressing: Save your setting by pressing:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
Now you should see the following screen: Now you should see the following screen:
.. image:: images/ipsec_road_vpn_p1a.png .. image:: images/ipsec_road_vpn_p1a.png
:scale: 100% :width: 100%
------------------------------- -------------------------------
@ -177,12 +177,12 @@ Step 3 - Phase 2 Mobile Clients
Press the button that says '+ Show 0 Phase-2 entries' Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png .. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
:scale: 100% :width: 100%
You will see an empty list: You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png .. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
:scale: 100% :width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry. Now press the *+* at the right of this list to add a Phase 2 entry.
@ -212,29 +212,29 @@ Phase 2 proposal (SA/Key Exchange)
Save your setting by pressing: Save your setting by pressing:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
Enable IPsec, Select: Enable IPsec, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png .. image:: images/ipsec_s2s_vpn_p1a_enable.png
:scale: 100% :width: 100%
Save: Save:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
And Apply changes: And Apply changes:
.. image:: images/ipsec_s2s_vpn_p1a_apply.png .. image:: images/ipsec_s2s_vpn_p1a_apply.png
:scale: 100% :width: 100%
------------------ ------------------
.. image:: images/ipsec_s2s_vpn_p1a_success.png .. image:: images/ipsec_s2s_vpn_p1a_success.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
@ -282,24 +282,24 @@ Add a new network by pressing the + in the lower left corner.
Now select **VPN** and **Cisco IPSec**, give your connection a name and press **Create**. Now select **VPN** and **Cisco IPSec**, give your connection a name and press **Create**.
.. image:: images/osx-ipsec-new.png .. image:: images/osx-ipsec-new.png
:scale: 100% :width: 100%
Now enter the details for our connection: Now enter the details for our connection:
.. image:: images/osx-ipsec-conf1.png .. image:: images/osx-ipsec-conf1.png
:scale: 100% :width: 100%
Next press **Authentication Settings** to add the group name and pre-shared key. Next press **Authentication Settings** to add the group name and pre-shared key.
.. image:: images/osx-ipsec-conf2.png .. image:: images/osx-ipsec-conf2.png
:scale: 100% :width: 100%
Press **OK** to save these settings and then **Apply** to apply them. Press **OK** to save these settings and then **Apply** to apply them.
Now test the connection by selecting it from the list and hit **Connect**. Now test the connection by selecting it from the list and hit **Connect**.
.. image:: images/osx-ipsec-connected.png .. image:: images/osx-ipsec-connected.png
:scale: 100% :width: 100%
**Done** **Done**

@ -181,7 +181,7 @@ sites:
* UDP Traffic on Port 4500 (NAT-T) * UDP Traffic on Port 4500 (NAT-T)
.. image:: images/ipsec_wan_rules.png .. image:: images/ipsec_wan_rules.png
:scale: 100% :width: 100%
.. Note:: .. Note::
@ -191,7 +191,7 @@ To allow traffic passing to your LAN subnet you need to add a rule to the IPsec
interface. interface.
.. image:: images/ipsec_ipsec_lan_rule.png .. image:: images/ipsec_ipsec_lan_rule.png
:scale: 100% :width: 100%
----------------------- -----------------------
Step 1 - Phase 1 Site A Step 1 - Phase 1 Site A
@ -245,12 +245,12 @@ Advanced Options
Save your setting by pressing: Save your setting by pressing:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
Now you should see the following screen: Now you should see the following screen:
.. image:: images/ipsec_s2s_vpn_p1a_4.png .. image:: images/ipsec_s2s_vpn_p1a_4.png
:scale: 100% :width: 100%
----------------------- -----------------------
@ -259,12 +259,12 @@ Step 2 - Phase 2 Site A
Press the button that says '+ Show 0 Phase-2 entries' Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png .. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
:scale: 100% :width: 100%
You will see an empty list: You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png .. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
:scale: 100% :width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry. Now press the *+* at the right of this list to add a Phase 2 entry.
@ -302,29 +302,29 @@ Phase 2 proposal (SA/Key Exchange)
Save your setting by pressing: Save your setting by pressing:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
Enable IPsec for Site A, Select: Enable IPsec for Site A, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png .. image:: images/ipsec_s2s_vpn_p1a_enable.png
:scale: 100% :width: 100%
Save: Save:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
And Apply changes: And Apply changes:
.. image:: images/ipsec_s2s_vpn_p1a_apply.png .. image:: images/ipsec_s2s_vpn_p1a_apply.png
:scale: 100% :width: 100%
------------------ ------------------
.. image:: images/ipsec_s2s_vpn_p1a_success.png .. image:: images/ipsec_s2s_vpn_p1a_success.png
:scale: 100% :width: 100%
**You are done configuring Site A.** **You are done configuring Site A.**
@ -382,12 +382,12 @@ Advanced Options
Save your setting by pressing: Save your setting by pressing:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
Now you should see the following screen: Now you should see the following screen:
.. image:: images/ipsec_s2s_vpn_p1b_4.png .. image:: images/ipsec_s2s_vpn_p1b_4.png
:scale: 100% :width: 100%
----------------------- -----------------------
@ -401,7 +401,7 @@ Press the button that says '+ Show 0 Phase-2 entries'
You will see an empty list: You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png .. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
:scale: 100% :width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry. Now press the *+* at the right of this list to add a Phase 2 entry.
@ -441,29 +441,29 @@ Phase 2 proposal (SA/Key Exchange)
Save your setting by pressing: Save your setting by pressing:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
Enable IPsec for Site B, Select: Enable IPsec for Site B, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png .. image:: images/ipsec_s2s_vpn_p1a_enable.png
:scale: 100% :width: 100%
Save: Save:
.. image:: images/btn_save.png .. image:: images/btn_save.png
:scale: 100% :width: 100%
And Apply changes: And Apply changes:
.. image:: images/ipsec_s2s_vpn_p1a_apply.png .. image:: images/ipsec_s2s_vpn_p1a_apply.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
.. image:: images/ipsec_s2s_vpn_p1a_success.png .. image:: images/ipsec_s2s_vpn_p1a_success.png
:scale: 100% :width: 100%
**You are done configuring Site B.** **You are done configuring Site B.**
@ -477,7 +477,7 @@ Go to **VPN->IPsec->Status Overview** to see current status.
Press on the **(i)** to see the details of the phase 2 tunnel(s), like this: Press on the **(i)** to see the details of the phase 2 tunnel(s), like this:
.. image:: images/ipsec_status.png .. image:: images/ipsec_status.png
:scale: 100% :width: 100%
.. Note:: .. Note::
@ -491,7 +491,7 @@ cross-cable between the WAN ports.
.. image:: images/OPN20322R_870px.png .. image:: images/OPN20322R_870px.png
:target: https://www.deciso.com/product-catalog/opn20322r/ :target: https://www.deciso.com/product-catalog/opn20322r/
:scale: 100% :width: 100%
To route traffic the WAN interfaces have been configured to use a /16 segment and To route traffic the WAN interfaces have been configured to use a /16 segment and
they are each others default gateway. Other than that the sample is equal to this they are each others default gateway. Other than that the sample is equal to this

@ -34,7 +34,7 @@ individual /64 slices to each network. Once configured, your tunnel settings
should look like this: should look like this:
.. image:: images/tunnelbroker_setup.png .. image:: images/tunnelbroker_setup.png
:scale: 100% :width: 100%
----------------------- -----------------------
Step 1 - Add GIF tunnel Step 1 - Add GIF tunnel
@ -61,7 +61,7 @@ Use the following settings and copy in the IPv4&6 addresses from your TunnelBrok
Make sure to include the **/64** prefixes! Make sure to include the **/64** prefixes!
.. image:: images/opnsense_add_gif.png .. image:: images/opnsense_add_gif.png
:scale: 100% :width: 100%
---------------------------------------------------- ----------------------------------------------------
Step 2 - Configure the GIF tunnel as a new interface Step 2 - Configure the GIF tunnel as a new interface
@ -88,7 +88,7 @@ have servers on LAN whereas most of my clients are on WLAN (Wireless LAN).
I block all incoming to LAN and WLAN. Of course, outbound connections are fine. I block all incoming to LAN and WLAN. Of course, outbound connections are fine.
.. image:: images/tunnelbroker_fw_rules.png .. image:: images/tunnelbroker_fw_rules.png
:scale: 100% :width: 100%
-------------------------------- --------------------------------
Step 4 - Configure LAN interface Step 4 - Configure LAN interface
@ -100,7 +100,7 @@ because it's the very same. You'll repeat the same process for further networks,
but assigning the next interface a separate **/64** address. but assigning the next interface a separate **/64** address.
.. image:: images/tunnelbroker_configure_lan.png .. image:: images/tunnelbroker_configure_lan.png
:scale: 100% :width: 100%
------------------------------- -------------------------------
Step 5 - Configure DHCPv6 SLAAC Step 5 - Configure DHCPv6 SLAAC
@ -114,7 +114,7 @@ Router Advertisements sub tab on that same page. Set the **Router Advertisements
setting to *Assisted* and the **Router Priority** setting to *Normal*. setting to *Assisted* and the **Router Priority** setting to *Normal*.
.. image:: images/tunnelbroker_dhcpv6.png .. image:: images/tunnelbroker_dhcpv6.png
:scale: 100% :width: 100%
Save your settings. Save your settings.

@ -15,39 +15,39 @@ The guide deals with just the internet connection. Setting up of TV or Phone is
Orange requires that the WAN is configured over VLAN 832. So the first step is to set up the VLAN on the intended WAN nic as shown below Orange requires that the WAN is configured over VLAN 832. So the first step is to set up the VLAN on the intended WAN nic as shown below
.. image:: images/OF_image0.png .. image:: images/OF_image0.png
:scale: 100% :width: 100%
and the WAN interface assignment should hence look something like this and the WAN interface assignment should hence look something like this
.. image:: images/OF_image1.png .. image:: images/OF_image1.png
:scale: 100% :width: 100%
**Configuring the WAN Interface** **Configuring the WAN Interface**
--------------------------------- ---------------------------------
In order to establish the IPv4 and IPv6 connection Orange requires that the correct parameters are passed for the DHCP and DHCP6 In order to establish the IPv4 and IPv6 connection Orange requires that the correct parameters are passed for the DHCP and DHCP6
requests respectively requests respectively
select options DHCP and DHCPv6 in general configuration select options DHCP and DHCPv6 in general configuration
.. image:: images/OF_image2.png .. image:: images/OF_image2.png
:scale: 100% :width: 100%
**On the DHCP request it is a requirement to pass the following:** **On the DHCP request it is a requirement to pass the following:**
* dhcp-class-identifier "sagem" * dhcp-class-identifier "sagem"
* user-class "+FSVDSL_livebox.Internet.softathome.Livebox3" * user-class "+FSVDSL_livebox.Internet.softathome.Livebox3"
* option-90 00:00:00:00:00:00:00:00:00:00:00:66:74:69:2f:65:77:74:FF:AB:XX:XX * option-90 00:00:00:00:00:00:00:00:00:00:00:66:74:69:2f:65:77:74:FF:AB:XX:XX
(hex conversion of the the userid supplied by Orange which looks like fti/xxxxxxx) (hex conversion of the the userid supplied by Orange which looks like fti/xxxxxxx)
.. Note:: .. Note::
The eleven leading hex 00 pairs to be prefixed to the converted userID The eleven leading hex 00 pairs to be prefixed to the converted userID
These parameters should be passed as comma separated options in the 'Send Options' area of there WAN DHCP request These parameters should be passed as comma separated options in the 'Send Options' area of there WAN DHCP request
.. image:: images/OF_image3.png .. image:: images/OF_image3.png
:scale: 100% :width: 100%
.. Note:: .. Note::
It is necessary to specify the following 'Request Options' It is necessary to specify the following 'Request Options'
@ -61,25 +61,25 @@ These parameters should be passed as comma separated options in the 'Send Option
* domain-name-servers * domain-name-servers
* option-90 * option-90
These parameters should be passed as comma separated options in the 'Request Options' area of there WAN DHCP request These parameters should be passed as comma separated options in the 'Request Options' area of there WAN DHCP request
Now for the regional specific part. Now for the regional specific part.
Some areas of France require that the DHCP and DHCP6 requests are made with a VLAN-PCP of 6. If you are in one of these regions then Some areas of France require that the DHCP and DHCP6 requests are made with a VLAN-PCP of 6. If you are in one of these regions then
this can be done via the 'Option Modifiers'. this can be done via the 'Option Modifiers'.
.. Note:: .. Note::
The vlan-parent is the physical WAN interface - igb0, em0 etc. The vlan-parent is the physical WAN interface - igb0, em0 etc.
.. image:: images/OF_image4.png .. image:: images/OF_image4.png
:scale: 100% :width: 100%
On the DHCP6 request we need to use raw options On the DHCP6 request we need to use raw options
Firstly select 'Advanced' and your region needs a VLAN-PCP set it via 'Use VLAN priority' Firstly select 'Advanced' and your region needs a VLAN-PCP set it via 'Use VLAN priority'
.. image:: images/OF_image5.png .. image:: images/OF_image5.png
:scale: 100% :width: 100%
then add the following options in the 'Send Options' field then add the following options in the 'Send Options' field
@ -87,7 +87,7 @@ then add the following options in the 'Send Options' field
* raw-option 6 00:0b:00:11:00:17:00:18 * raw-option 6 00:0b:00:11:00:17:00:18
* raw-option 15 00:2b:46:53:56:44:53:4c:5f:6c:69:76:65:62:6f:78:2e:49:6e:74:65:72:6e:65:74:2e:73:6f:66:74:61:74:68:6f:6d:65:2e:6c:69:76:65:62:6f:78:33 * raw-option 15 00:2b:46:53:56:44:53:4c:5f:6c:69:76:65:62:6f:78:2e:49:6e:74:65:72:6e:65:74:2e:73:6f:66:74:61:74:68:6f:6d:65:2e:6c:69:76:65:62:6f:78:33
* raw-option 16 00:00:04:0e:00:05:73:61:67:65:6d * raw-option 16 00:00:04:0e:00:05:73:61:67:65:6d
* raw-option 11 00:00:00:00:00:00:00:00:00:00:00:66:74:69:2f:65:77:74:FF:AB:XX:XX * raw-option 11 00:00:00:00:00:00:00:00:00:00:00:66:74:69:2f:65:77:74:FF:AB:XX:XX
(hex conversion of the the userid supplied by Orange which looks like fti/xxxxxxx) (hex conversion of the the userid supplied by Orange which looks like fti/xxxxxxx)
.. Note:: .. Note::
@ -96,7 +96,7 @@ then add the following options in the 'Send Options' field
Finally set the Identity Association and Prefix interface as shown Finally set the Identity Association and Prefix interface as shown
.. image:: images/OF_image6.png .. image:: images/OF_image6.png
:scale: 100% :width: 100%
Click Save and then Apply. Click Save and then Apply.
@ -109,19 +109,15 @@ Select Interfaces->LAN and set IPV4 to "Static IPv4" and IPv6 Configuration Type
Interface Interface
.. image:: images/OF_image7.png .. image:: images/OF_image7.png
:scale: 100% :width: 100%
Finally, set the Track IPv6 Interface to WAN and set the IPv4 address to your chosen address. Finally, set the Track IPv6 Interface to WAN and set the IPv4 address to your chosen address.
.. image:: images/OF_image8.png .. image:: images/OF_image8.png
:scale: 100% :width: 100%
Click Save and then Apply. Click Save and then Apply.
It is advisable at this point to reboot the system. It is advisable at this point to reboot the system.

@ -17,7 +17,7 @@ support ICAP will work just as well.
forms of infection such as through emails or usb stick. forms of infection such as through emails or usb stick.
.. image:: images/SPE_home.png .. image:: images/SPE_home.png
:scale: 100% :width: 100%
Step 1 - Setup the Proxy Step 1 - Setup the Proxy
------------------------ ------------------------
@ -36,7 +36,7 @@ full installation and configuration instructions.
We installed the Engine for Web Proxy purpose and enabled ICAP with its default settings. We installed the Engine for Web Proxy purpose and enabled ICAP with its default settings.
.. image:: images/SPE_ICAP.png .. image:: images/SPE_ICAP.png
:scale: 100% :width: 100%
Step 4 - Connect the Engine Step 4 - Connect the Engine
--------------------------- ---------------------------

@ -37,7 +37,7 @@ A simple way to add the NAT/Firewall Rule is to click on the **(i)** icon on the
left of the **Enable Transparent HTTP proxy** option and click on **add a new firewall rule**. left of the **Enable Transparent HTTP proxy** option and click on **add a new firewall rule**.
.. image:: images/screenshot_enable_transparent_http.png .. image:: images/screenshot_enable_transparent_http.png
:scale: 100% :width: 100%
**For reference, these are the default settings:** **For reference, these are the default settings:**
@ -65,7 +65,7 @@ Authority. Go to **System->Trust->Authorities** or use the search box to get the
fast. fast.
.. image:: images/search_ca.png .. image:: images/search_ca.png
:scale: 100% :width: 100%
Click on **add or import ca** in the upper right corner of the screen to create Click on **add or import ca** in the upper right corner of the screen to create
a new CA. a new CA.
@ -121,7 +121,7 @@ A simple way to add the NAT/Firewall Rule is to click on the **(i)** icon on the
left of the **Enable SSL mode** option and click on **add a new firewall rule**. left of the **Enable SSL mode** option and click on **add a new firewall rule**.
.. image:: images/screenshot_enable_transparent_http.png .. image:: images/screenshot_enable_transparent_http.png
:scale: 100% :width: 100%
**For reference, these are the default settings:** **For reference, these are the default settings:**
@ -151,13 +151,13 @@ certificate for each page manually, but for some pages that may not work well un
not bumped. not bumped.
.. image:: images/export_CA_cert.png .. image:: images/export_CA_cert.png
:scale: 100% :width: 100%
Import and change trust settings on your favorite OS. Per example on OSX it looks Import and change trust settings on your favorite OS. Per example on OSX it looks
like this: like this:
.. image:: images/Trust_Settings_OSX.png .. image:: images/Trust_Settings_OSX.png
:scale: 100% :width: 100%
.. Warning:: .. Warning::
Again be very careful with this as your system will accept any page signed with Again be very careful with this as your system will accept any page signed with
@ -171,7 +171,7 @@ like this:
connection against man in the middle attacks otherwise trusted certificates. connection against man in the middle attacks otherwise trusted certificates.
If you want to make the connection work again, you have to whitelist the following If you want to make the connection work again, you have to whitelist the following
Google domains in your "No Bump Hosts" settings. Google domains in your "No Bump Hosts" settings.
* Your local Google domain (for example: google.at for Austria, google.de for Germany, …) * Your local Google domain (for example: google.at for Austria, google.de for Germany, …)
* .google.com * .google.com
* .googleapis.com * .googleapis.com

@ -54,7 +54,7 @@ The URL of the full compressed UT1 category based list is:
ftp://ftp.ut-capitole.fr/pub/reseau/cache/squidguard_contrib/blacklists.tar.gz ftp://ftp.ut-capitole.fr/pub/reseau/cache/squidguard_contrib/blacklists.tar.gz
.. image:: images/proxy_ut1.png .. image:: images/proxy_ut1.png
:scale: 100% :width: 100%
Press **Save Changes**. Press **Save Changes**.
@ -72,13 +72,13 @@ to the description of the list. This will open the edit window again, but now yo
will see all available categories extracted from the list. will see all available categories extracted from the list.
.. image:: images/proxy_categories.png .. image:: images/proxy_categories.png
:scale: 100% :width: 100%
For our example we will filter ads and adult content. The easiest way to do so is For our example we will filter ads and adult content. The easiest way to do so is
clear the list and select the following from the drop down list: clear the list and select the following from the drop down list:
.. image:: images/proxy_catgegory.png .. image:: images/proxy_catgegory.png
:scale: 100% :width: 100%
Now **Save changes** and press **Download ACLs** again to download and reconstruct Now **Save changes** and press **Download ACLs** again to download and reconstruct
the list with only the selected categories. This will take roughly the same amount the list with only the selected categories. This will take roughly the same amount
@ -128,4 +128,4 @@ And one more rule to block HTTPS access:
**Save** & **Apply changes** **Save** & **Apply changes**
.. image:: images/proxy_firewall.png .. image:: images/proxy_firewall.png
:scale: 100% :width: 100%

@ -13,7 +13,7 @@ Look at the default install, one certificate is created for the webgui/dashboard
nothing wrong with that certificate if we use a real world CA, but we do not. We nothing wrong with that certificate if we use a real world CA, but we do not. We
create our own chain so that one has no purpose once done. create our own chain so that one has no purpose once done.
Should you even consider using **self-signed certificate chains** in this age of free available Should you even consider using **self-signed certificate chains** in this age of free available
certificates? certificates?
* Self-signed certificate are just as secure as real world certificates. * Self-signed certificate are just as secure as real world certificates.
@ -32,7 +32,7 @@ What you should know about self-signed certificates:
* They are **only** as trustworty as the person, company or organization signing it. * They are **only** as trustworty as the person, company or organization signing it.
* Using these certificates **can** be a security risk if you are the one trusting them and not a CA. * Using these certificates **can** be a security risk if you are the one trusting them and not a CA.
A chain will need at least a CA and certificate; an intermediate CA is not needed, but in case of a A chain will need at least a CA and certificate; an intermediate CA is not needed, but in case of a
compromise the CA key would be compromised too. compromise the CA key would be compromised too.
The chain we are going to create will be made with the following ingredients: The chain we are going to create will be made with the following ingredients:
@ -43,7 +43,7 @@ The chain we are going to create will be made with the following ingredients:
.. Note:: .. Note::
This document uses **CN - Common Name** should be read as: **SAN - Subject Alternative Name** and This document uses **CN - Common Name** should be read as: **SAN - Subject Alternative Name** and
will be used if present. will be used if present.
Please backup before you proceed. Please backup before you proceed.
@ -79,7 +79,7 @@ When you are done save the form, the CA is now generated.
====================== =================================== ======================================== ====================== =================================== ========================================
.. image:: images/CA.png .. image:: images/CA.png
:scale: 15% :width: 15%
.. Tip:: .. Tip::
@ -103,7 +103,7 @@ Have a look at the form, create an intermediate CA and save it.
====================== =================================== ======================================== ====================== =================================== ========================================
.. image:: images/CA-inter.png .. image:: images/CA-inter.png
:scale: 15% :width: 15%
The Certificate The Certificate
--------------- ---------------
@ -122,7 +122,7 @@ Have a look at the next form and notice the common name, create a server certifi
====================== =================================== ======================================== ====================== =================================== ========================================
.. image:: images/webgui-cert.png .. image:: images/webgui-cert.png
:scale: 15% :width: 15%
.. Tip:: .. Tip::
@ -141,7 +141,7 @@ Now we need to start using the chain:
* Go back to the dashboard & open **System/Settings/Administration** * Go back to the dashboard & open **System/Settings/Administration**
* Set **SSL-Certificate** to use the new server certificate. * Set **SSL-Certificate** to use the new server certificate.
Open your browser and open the OPNsense/webgui page. You should be presented with a certificate that is Open your browser and open the OPNsense/webgui page. You should be presented with a certificate that is
verified by your intermediate CA. verified by your intermediate CA.
@ -167,7 +167,7 @@ Go ahead and create a new chain **CA -- intermediate CA -- server cert.**.
.. Tip:: .. Tip::
| You can check if **ca-root-nss** has changed: | You can check if **ca-root-nss** has changed:
| Do a health check before you add the CA. | Do a health check before you add the CA.
| If the check was okay add the CA to the store. | If the check was okay add the CA to the store.
| Create a new checksum & save it : | Create a new checksum & save it :
@ -189,7 +189,7 @@ Go to **Trust/Authorities** create a new CA for Nextcloud and save it.
====================== =================================== ======================================== ====================== =================================== ========================================
.. image:: images/CA-cloud.png .. image:: images/CA-cloud.png
:scale: 15% :width: 15%
OPNsense needs to be made aware of the Nextcloud chain we are creating. OPNsense needs to be made aware of the Nextcloud chain we are creating.
@ -231,7 +231,7 @@ Go to **Trust/Authorities** and create an intermediate CA.
====================== =================================== ======================================== ====================== =================================== ========================================
.. image:: images/CA-cloud-inter.png .. image:: images/CA-cloud-inter.png
:scale: 15% :width: 15%
Download the intermediate CA and install it to your browser: Download the intermediate CA and install it to your browser:
@ -253,7 +253,7 @@ Go to **Trust/Certificates** create a server certificate.
====================== =================================== ======================================== ====================== =================================== ========================================
.. image:: images/cloud-cert.png .. image:: images/cloud-cert.png
:scale: 15% :width: 15%
We need to install this certificate and key to our Nextcloud server, two ways are shown here. We need to install this certificate and key to our Nextcloud server, two ways are shown here.
@ -266,10 +266,10 @@ We need to install this certificate and key to our Nextcloud server, two ways ar
openssl pkcs12 -in nextcloud-crt.p12 -nodes -out nextcloud.key -nocerts openssl pkcs12 -in nextcloud-crt.p12 -nodes -out nextcloud.key -nocerts
openssl pkcs12 -in nextcloud-crt.p12 -clcerts -nokeys -out nextcloud.pem openssl pkcs12 -in nextcloud-crt.p12 -clcerts -nokeys -out nextcloud.pem
cp nextcloud.pem nextcloud.crt cp nextcloud.pem nextcloud.crt
- * Or use the next quick and dirty method for a single key/certificate file: - * Or use the next quick and dirty method for a single key/certificate file:
* Upload the ***.p12** archive to your Nextcloud server, in a safe way.. * Upload the ***.p12** archive to your Nextcloud server, in a safe way..
* Extact the archive into a single **PEM** file and create a certificate. * Extact the archive into a single **PEM** file and create a certificate.
:: ::
@ -278,7 +278,7 @@ We need to install this certificate and key to our Nextcloud server, two ways ar
- * **/etc/ssl/localcerts** will be alright for the certificate or choose your own prefered location. - * **/etc/ssl/localcerts** will be alright for the certificate or choose your own prefered location.
* If the key was extracted separatly, **/etc/ssl/private** would be a good choice. * If the key was extracted separatly, **/etc/ssl/private** would be a good choice.
* Be sure to set sane permissions on the private directory, ``700`` would do it. * Be sure to set sane permissions on the private directory, ``700`` would do it.
* You could set ``umask`` too (see) ``man umask`` - on your Linux box. * You could set ``umask`` too (see) ``man umask`` - on your Linux box.
* Edit the webserver config to use the certificate and key or single key-cert file. * Edit the webserver config to use the certificate and key or single key-cert file.
* Sane permissions, ``400`` read only owner is sufficent. * Sane permissions, ``400`` read only owner is sufficent.

@ -176,7 +176,7 @@ Now press |apply| to activate the traffic shaping rules.
*Screenshot Rules* *Screenshot Rules*
.. image:: images/shaping_rules_s1.png .. image:: images/shaping_rules_s1.png
:scale: 100% :width: 100%
.. |apply| image:: images/applybtn.png .. |apply| image:: images/applybtn.png
@ -308,7 +308,7 @@ Now press |apply| to activate the traffic shaping rules.
*Screenshot Rules* *Screenshot Rules*
.. image:: images/shaping_rules_s2.png .. image:: images/shaping_rules_s2.png
:scale: 100% :width: 100%
------------------------ ------------------------
Limit bandwidth per user Limit bandwidth per user
@ -392,7 +392,7 @@ Now press |apply| to activate the traffic shaping rules.
*Screenshot Rules* *Screenshot Rules*
.. image:: images/shaping_rules_s3.png .. image:: images/shaping_rules_s3.png
:scale: 100% :width: 100%
----------------------- -----------------------
Prioritize using Queues Prioritize using Queues
@ -522,7 +522,7 @@ Now press |apply| to activate the traffic shaping rules.
*Screenshot Rules* *Screenshot Rules*
.. image:: images/shaping_rules_s4.png .. image:: images/shaping_rules_s4.png
:scale: 100% :width: 100%
-------------------------------------- --------------------------------------
Multi Interface shaping for a GuestNet Multi Interface shaping for a GuestNet

@ -3,7 +3,7 @@ Setup SSL VPN Road Warrior
========================== ==========================
.. image:: images/sslvpn_image_new.png .. image:: images/sslvpn_image_new.png
:scale: 100% :width: 100%
Road Warriors are remote users who need secure access to the companies infrastructure. Road Warriors are remote users who need secure access to the companies infrastructure.
OPNsense uses OpenVPN for its SSL VPN Road Warrior setup and offers OTP (One Time Password) OPNsense uses OpenVPN for its SSL VPN Road Warrior setup and offers OTP (One Time Password)
@ -107,7 +107,7 @@ and click on **Add server** in the top right corner of the form.
configuration. Try it by typing *Ac...* and see for yourself: configuration. Try it by typing *Ac...* and see for yourself:
.. image:: images/qs-access_server.png .. image:: images/qs-access_server.png
:scale: 100% :width: 100%
:align: center :align: center
Now first change the **Type** to **Local + Timebased One time Password** Now first change the **Type** to **Local + Timebased One time Password**
@ -207,7 +207,7 @@ For the first step we enter:
Click **Save** and you will be redirected to the User page. Click **Save** and you will be redirected to the User page.
Now we will activate your newly created seed with your Google Authenticator Now we will activate your newly created seed with your Google Authenticator
compatible app. To do so click in the **Click to unhide** button in the compatible app. To do so click in the **Click to unhide** button in the
**OTP QR code** row and you will get a QR code to scan with your smartphone. **OTP QR code** row and you will get a QR code to scan with your smartphone.
See also: :doc:`/manual/how-tos/two_factor` See also: :doc:`/manual/how-tos/two_factor`
@ -280,7 +280,7 @@ For our example will use the following settings:
Click **Save** to add the new server. Click **Save** to add the new server.
.. image:: images/sslvpn_server.png .. image:: images/sslvpn_server.png
:scale: 100% :width: 100%
---------------------- ----------------------
@ -293,14 +293,14 @@ port on the WAN interface. When using multiple servers we need to open up each p
For our configuration we only use one server accessible on udp port 1194. For our configuration we only use one server accessible on udp port 1194.
.. image:: images/sslvpn_wan_rule.png .. image:: images/sslvpn_wan_rule.png
:scale: 100% :width: 100%
Next we also need to allow traffic from the VPN clients to our LAN interface. Next we also need to allow traffic from the VPN clients to our LAN interface.
For our example we will allow client to access anything on our local area network, For our example we will allow client to access anything on our local area network,
however you may decide just to allow traffic to one or more servers. however you may decide just to allow traffic to one or more servers.
.. image:: images/sslvpn_openvpn_rule.png .. image:: images/sslvpn_openvpn_rule.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
@ -324,25 +324,25 @@ to open the file with search and select Viscosity.
Some sample screenshots (Mac OSX): Some sample screenshots (Mac OSX):
.. image:: images/viscosity_files.png .. image:: images/viscosity_files.png
:scale: 100% :width: 100%
**Import Configuration** **Import Configuration**
.. image:: images/viscosity_imported.png .. image:: images/viscosity_imported.png
:scale: 100% :width: 100%
**Connect & login** **Connect & login**
In the password field enter your TOTP token first followed by your password. In the password field enter your TOTP token first followed by your password.
.. image:: images/viscosity_login.png .. image:: images/viscosity_login.png
:scale: 100% :width: 100%
**Connected** **Connected**
.. image:: images/viscosity_connected.png .. image:: images/viscosity_connected.png
:scale: 100% :width: 100%
----------------------------- -----------------------------
@ -400,4 +400,4 @@ exactly the same as before, the only difference is that each user requires a Use
and therefore their own configuration. and therefore their own configuration.
.. image:: images/sslvpn_client_certificate.png .. image:: images/sslvpn_client_certificate.png
:scale: 100% :width: 100%

@ -212,7 +212,7 @@ For our example will use the following settings (leave everything else on its de
Click **Save** to add the new server. Click **Save** to add the new server.
.. image:: images/sslvpn_server.png .. image:: images/sslvpn_server.png
:scale: 100% :width: 100%
---------------------- ----------------------
@ -261,14 +261,14 @@ port on the WAN interface. When using multiple servers we need to open up each p
For our configuration we only use one server accessible on UDP port 1194. For our configuration we only use one server accessible on UDP port 1194.
.. image:: images/sslvpn_wan_rule.png .. image:: images/sslvpn_wan_rule.png
:scale: 100% :width: 100%
Next we also need to allow traffic from the VPN client network (192.168.2.0/24). Next we also need to allow traffic from the VPN client network (192.168.2.0/24).
For our example we will allow client to access anything on our local network(s), For our example we will allow client to access anything on our local network(s),
however you may decide just to allow traffic to one or more IP's. however you may decide just to allow traffic to one or more IP's.
.. image:: images/sslvpn_openvpn_rule.png .. image:: images/sslvpn_openvpn_rule.png
:scale: 100% :width: 100%
**You are done configuring Site A.** **You are done configuring Site A.**
@ -308,7 +308,7 @@ Now click on **Save** to apply your settings.
The Connection Status can be viewed under **VPN->OpenVPN->Connection Status** The Connection Status can be viewed under **VPN->OpenVPN->Connection Status**
.. image:: images/sslvpn_connection_status.png .. image:: images/sslvpn_connection_status.png
:scale: 100% :width: 100%
------------------------------ ------------------------------
Step 5 - Client Firewall Rules Step 5 - Client Firewall Rules
@ -317,7 +317,7 @@ To allow traffic from the remote network just add a rule under **Firewall->Rules
OpenVPN tab. OpenVPN tab.
.. image:: images/sslvpn_firewall_rule_client.png .. image:: images/sslvpn_firewall_rule_client.png
:scale: 100% :width: 100%
**Done** **Done**

@ -6,7 +6,7 @@ using OPNsense and Google's Authenticator. All services of OPNsense can be used
with this 2FA solution. with this 2FA solution.
.. image:: /manual/images/two_factor_authentication.png .. image:: /manual/images/two_factor_authentication.png
:scale: 100% :width: 100%
.. Note:: .. Note::
@ -52,12 +52,12 @@ To activate your new OTP seed on the Google Authenticator, first reopen the user
you just created by clicking on the pencil icon. you just created by clicking on the pencil icon.
.. image:: images/OTP_seed.png .. image:: images/OTP_seed.png
:scale: 100% :width: 100%
Now it will show a QR code: Now it will show a QR code:
.. image:: images/otp_qr_code.png .. image:: images/otp_qr_code.png
:scale: 100% :width: 100%
.. Warning:: .. Warning::
@ -72,18 +72,18 @@ directly.
In case of SailOTP the configuration works like this: In case of SailOTP the configuration works like this:
.. image:: images/sailotp_menu.jpg .. image:: images/sailotp_menu.jpg
:scale: 100% :width: 100%
Pull down to open the application menu and choose the entry to add a new Token. Pull down to open the application menu and choose the entry to add a new Token.
.. image:: images/sailotp_scan_qr.jpg .. image:: images/sailotp_scan_qr.jpg
:scale: 100% :width: 100%
In the next step, you have to scan the previously created QR code by clicking In the next step, you have to scan the previously created QR code by clicking
on the screen. on the screen.
.. image:: images/sailotp_scanresult.jpg .. image:: images/sailotp_scanresult.jpg
:scale: 100% :width: 100%
When the QR code is scanned, a new view will open where you can When the QR code is scanned, a new view will open where you can
see the details of the result. This view can be used to check if the generated see the details of the result. This view can be used to check if the generated
@ -122,7 +122,7 @@ is token and then password **in the same field**.
Hit the test button and if all goes well you should see *successfully authenticated*. Hit the test button and if all goes well you should see *successfully authenticated*.
.. image:: images/system_access_tester.png .. image:: images/system_access_tester.png
:scale: 100% :width: 100%
------------------------ ------------------------
Step 6 - Using the token Step 6 - Using the token
@ -131,8 +131,8 @@ To use the token in any application/service that you have configured, just open
the Google Authenticator and add the created token/key **before** your regular password. the Google Authenticator and add the created token/key **before** your regular password.
.. Warning:: .. Warning::
Remember, you need to enter the token **before** or **after** you password Remember, you need to enter the token **before** or **after** you password
(depending on your configuration)! And the password field should be used to enter (depending on your configuration)! And the password field should be used to enter
both token and your password, like: **Password:** 123456PASSWORD both token and your password, like: **Password:** 123456PASSWORD
@ -140,4 +140,4 @@ The code will change every 30 seconds.
Sample code: Sample code:
.. image:: images/google_token_sample.png .. image:: images/google_token_sample.png
:scale: 25% :width: 25%

@ -50,7 +50,7 @@ Enter the following information:
something similar to will show up: something similar to will show up:
.. image:: images/ldap_selectcontainer.png .. image:: images/ldap_selectcontainer.png
:scale: 100% :width: 100%
.. TIP:: .. TIP::
The **Extended Query** can be used to select users who are member of a specific The **Extended Query** can be used to select users who are member of a specific
@ -61,7 +61,7 @@ Enter the following information:
**Members**. **Members**.
.. image:: images/ldap_mygroup_properties.png .. image:: images/ldap_mygroup_properties.png
:scale: 100% :width: 100%
Step 2 - Test Step 2 - Test
@ -71,7 +71,7 @@ and select your LDAP server and enter a valid username + password. Click on
**Test** and if everything is setup correctly it will show: **Test** and if everything is setup correctly it will show:
.. image:: images/ldap_testok.png .. image:: images/ldap_testok.png
:scale: 100% :width: 100%
.. Note:: .. Note::
When limited to just one group, the group name will not be shown in the listing. When limited to just one group, the group name will not be shown in the listing.
@ -79,7 +79,7 @@ and select your LDAP server and enter a valid username + password. Click on
If not (or your entered invalid credentials) it shows: If not (or your entered invalid credentials) it shows:
.. image:: images/ldap_testfail.png .. image:: images/ldap_testfail.png
:scale: 100% :width: 100%
Step 3 - Import Users Step 3 - Import Users
--------------------- ---------------------
@ -88,7 +88,7 @@ to import the users into the local user manager. Go to **System->Access->Users**
you will see a cloud import icon at the lower right corner of the form. you will see a cloud import icon at the lower right corner of the form.
.. image:: images/user_cloudimport.png .. image:: images/user_cloudimport.png
:scale: 100% :width: 100%
Click on the cloud import icon to start importing users. Click on the cloud import icon to start importing users.
@ -105,7 +105,7 @@ notice the difference as the **User Distinguished name** will be shown from the
LDAP server, just like this: LDAP server, just like this:
.. image:: images/user_ldap_distinguishedname.png .. image:: images/user_ldap_distinguishedname.png
:scale: 100% :width: 100%
.. TIP:: .. TIP::
See :doc:`user-local` for more information on User, Groups and privileges. See :doc:`user-local` for more information on User, Groups and privileges.
@ -122,4 +122,4 @@ Go to **System->Access->Settings** and change the Authentication Server from
The test result should look like this: The test result should look like this:
.. image:: images/user_testresult_ldap.png .. image:: images/user_testresult_ldap.png
:scale: 80% :width: 80%

@ -3,7 +3,7 @@ Creating Users & Groups
======================= =======================
.. image:: images/usermanager_groups.png .. image:: images/usermanager_groups.png
:scale: 100% :width: 100%
With the local user manager of OPNsense one can add users and groups and define With the local user manager of OPNsense one can add users and groups and define
the privileges for granting access to certain parts of the GUI (Web Configurator). the privileges for granting access to certain parts of the GUI (Web Configurator).
@ -47,6 +47,6 @@ The search bottom at the top of this form can be used to quickly find the right
page. page.
.. image:: images/user_privileges.png .. image:: images/user_privileges.png
:scale: 100% :width: 100%
After making the right selection click on **Save** to store the new settings. After making the right selection click on **Save** to store the new settings.

@ -368,7 +368,7 @@ Minimum installation actions
**Enable RAM disk manually** **Enable RAM disk manually**
.. image:: ./images/Screenshot_Use_RAMdisks.png .. image:: ./images/Screenshot_Use_RAMdisks.png
:scale: 100% :width: 100%
Then via console, check your /etc/fstab and make sure your primary Then via console, check your /etc/fstab and make sure your primary
partition has **rw,noatime** instead of just **rw**. partition has **rw,noatime** instead of just **rw**.
@ -410,4 +410,4 @@ The other method to upgrade the system is via console option **12) Upgrade from
An update can be done through the GUI via **System⇒Firmware⇒Updates**. An update can be done through the GUI via **System⇒Firmware⇒Updates**.
.. image:: ./images/firmware-update.png .. image:: ./images/firmware-update.png
:scale: 100% :width: 100%

@ -3,7 +3,7 @@ Using IPv6
========== ==========
.. image:: images/IPv6.png .. image:: images/IPv6.png
:scale: 100% :width: 100%
OPNsense fully supports IPv6 for routing and firewall. However there are lots of OPNsense fully supports IPv6 for routing and firewall. However there are lots of
different options to utilize IPv6. Currently these scenario's are known to work: different options to utilize IPv6. Currently these scenario's are known to work:

@ -3,7 +3,7 @@ Mobile Networking
================= =================
.. image:: images/OPNsense_4G_new.png .. image:: images/OPNsense_4G_new.png
:scale: 100% :width: 100%
OPNsense supports 3G and 4G (LTE) cellular modems as failsafe or primary WAN OPNsense supports 3G and 4G (LTE) cellular modems as failsafe or primary WAN
interface. Both USB and (mini)PCIe cards are supported. interface. Both USB and (mini)PCIe cards are supported.

@ -3,7 +3,7 @@ Netflow Export & Analyses
========================= =========================
.. image:: images/netflow_analyzer_insight.png .. image:: images/netflow_analyzer_insight.png
:scale: 100% :width: 100%
Netflow is a monitoring feature, invented by Cisco, it is implemented in the FreeBSD Netflow is a monitoring feature, invented by Cisco, it is implemented in the FreeBSD
kernel with ng_netflow (Netgraph). Since Netgraph is a kernel implementation it kernel with ng_netflow (Netgraph). Since Netgraph is a kernel implementation it
@ -59,7 +59,7 @@ and multiple destinations including local capture for analysis by Insight (OPNse
Netflow Analyzer). Netflow Analyzer).
.. image:: images/netflow_exporter.png .. image:: images/netflow_exporter.png
:scale: 100% :width: 100%
-------------------------- --------------------------
Netflow Analyzer - Insight Netflow Analyzer - Insight

@ -3,7 +3,7 @@ System Health & Round Robin Data
================================ ================================
.. image:: images/systemhealth_sample.png .. image:: images/systemhealth_sample.png
:scale: 100% :width: 100%
System Health is a dynamic view on RRD data gathered by the system. It allows you System Health is a dynamic view on RRD data gathered by the system. It allows you
to dive into different statistics that show the overall health and performance of to dive into different statistics that show the overall health and performance of
@ -41,7 +41,7 @@ Please see the screenshot below for all element of the system health module.
Each element will be explained in the next chapters. Each element will be explained in the next chapters.
.. image:: images/systemhealth_gui.png .. image:: images/systemhealth_gui.png
:scale: 100% :width: 100%
Toggle menu collapse Toggle menu collapse
-------------------- --------------------
@ -68,7 +68,7 @@ this is especially useful for traffic flows where you can plot ingoing and outgo
in different directions. in different directions.
.. image:: images/systemhealth_inverse.png .. image:: images/systemhealth_inverse.png
:scale: 100% :width: 100%
Resolution Resolution
---------- ----------
@ -94,7 +94,7 @@ and show you the current detail level in this area.
Label filter Label filter
------------ ------------
.. image:: images/systemhealth_labelfilter.png .. image:: images/systemhealth_labelfilter.png
:scale: 100% :width: 100%
The label filter can be used to filer out data you do not want to see. Click once The label filter can be used to filer out data you do not want to see. Click once
to disable or double click to select only this set. to disable or double click to select only this set.
@ -102,13 +102,13 @@ to disable or double click to select only this set.
A nice sample can be seen here, where the *processes* obscure all other data. A nice sample can be seen here, where the *processes* obscure all other data.
.. image:: images/systemhealth_obscureddata.png .. image:: images/systemhealth_obscureddata.png
:scale: 100% :width: 100%
Just click once on *processes* to hide this data set, notice that the scales will Just click once on *processes* to hide this data set, notice that the scales will
adapt as well. adapt as well.
.. image:: images/systemhealth_filtered.png .. image:: images/systemhealth_filtered.png
:scale: 100% :width: 100%
Main graph area Main graph area
--------------- ---------------
@ -131,13 +131,13 @@ selected area.
A sample selection: A sample selection:
.. image:: images/systemhealt_selection.png .. image:: images/systemhealt_selection.png
:scale: 100% :width: 100%
And the result: And the result:
.. image:: images/systemhealth_zoomed.png .. image:: images/systemhealth_zoomed.png
:scale: 100% :width: 100%
Min/max/average table Min/max/average table
--------------------- ---------------------
@ -155,4 +155,4 @@ values and export the data to as comma separated file (.CSV).
The exported dataset can be used for your own reporting. The exported dataset can be used for your own reporting.
.. image:: images/systemhealth_excel.png .. image:: images/systemhealth_excel.png
:scale: 100% :width: 100%

@ -3,7 +3,7 @@ Two-factor authentication
========================= =========================
.. image:: images/two_factor_authentication.png .. image:: images/two_factor_authentication.png
:scale: 100% :width: 100%
Two-factor authentication also known as 2FA or 2-Step Verification is an authentication Two-factor authentication also known as 2FA or 2-Step Verification is an authentication
method that requires two components, such as a pin/password + a token. method that requires two components, such as a pin/password + a token.
@ -27,7 +27,7 @@ has a default fallback to the local database. In case of 2FA for the GUI one nee
to disable the fallback option to make sure no local user can gain access without 2FA. to disable the fallback option to make sure no local user can gain access without 2FA.
.. image:: images/auth_server_fallback.png .. image:: images/auth_server_fallback.png
:scale: 100% :width: 100%
---------------------------- ----------------------------

@ -3,7 +3,7 @@
================= =================
.. image:: images/user_manager.png .. image:: images/user_manager.png
:scale: 100% :width: 100%
The user manager of OPNsense allows for controlling access to the different The user manager of OPNsense allows for controlling access to the different
part (pages) of the configurator as well as controlling access to particular part (pages) of the configurator as well as controlling access to particular

@ -86,7 +86,7 @@ opnsense bootstrap is available for our
Amazon AWS EC2 Cloud Amazon AWS EC2 Cloud
-------------------- --------------------
.. image:: how-tos/images/amazon-web-services.png .. image:: how-tos/images/amazon-web-services.png
:scale: 100% :width: 100%
Installing OPNsense into the Amazon cloud can be a dounting task as no console is Installing OPNsense into the Amazon cloud can be a dounting task as no console is
offered. As part of Deciso's support packages (see `OPNsense commercial Support offered. As part of Deciso's support packages (see `OPNsense commercial Support

@ -7,7 +7,7 @@ extends the private network into the public network such as internet. With a VPN
you can create large secure networks that can act as one private network. you can create large secure networks that can act as one private network.
.. image:: images/Virtual_Private_Network_overview.png .. image:: images/Virtual_Private_Network_overview.png
:scale: 100% :width: 100%
(picture from `wikipedia <https://en.wikipedia.org/wiki/File:Virtual_Private_Network_overview.svg>`__) (picture from `wikipedia <https://en.wikipedia.org/wiki/File:Virtual_Private_Network_overview.svg>`__)
@ -29,7 +29,7 @@ well known IPsec as well as older (now considered insecure) legacy options such
L2TP and PPTP. L2TP and PPTP.
.. image:: images/vpn.png .. image:: images/vpn.png
:scale: 100% :width: 100%
.. Note:: .. Note::

@ -3,7 +3,7 @@ Open Source Initiative
====================== ======================
.. image:: ./images/osi_standard_logo.png .. image:: ./images/osi_standard_logo.png
:scale: 25% :width: 25%
----------------------- -----------------------

Loading…
Cancel
Save