Any recommendation for a cheap, small #firewall for my #homelab ? I realized I can’t control easily what goes out of my network only via DNS block lists
Any recommendation for a cheap, small #firewall for my #homelab ? I realized I can’t control easily what goes out of my network only via DNS block lists
Go on ebay and look for refurbished PCs, it'll probably be cheaper than buying a wireless router. It'll take some setup but you will get the configurability you need, in spades.
I bought this Protectli Vault FW2B , and installed OPNSense strictly for firewall since I don't control the router in my town home.
I used this guide to set up a transparent bridge so I can filter out traffic before it gets to the subnet my property manager assigned to me.
Setting it up was a great learning experience. One thing that was odd for me though, was that I had to change the label of the interfaces in the ui to match the label on the hardware.
We probably need more details as to what exactly you're attempting to accomplish and how you're attempting to accomplish it.
The main issue is that each rule you add to a firewall has a performance penalty: each packet is checked against each rule before it's passed.
Ten rules require 10x more cpu than 1 rule, 100 rules need 10x more than 10 rules, and so on.
Depending on how much traffic and how many rules we're talking about and what kind of expectation you have for performance as well as anything else (eg. vpn endpoint), "small and cheap" may not be fast enough, and you might have to lean into higher performance hardware.
I was very vividly remembering a VERY SMART client I had a while ago that had like 600 rules blocking all manner of ports and protocols and IPs, and wondering why everything performed like dogshit.
Sure, it'll go until it hits the first match, but if you have enough rules, you're going to be churning through an awful lot of cpu getting everything to the first match.
OP may not have been intending to do something quite that uh, special, but people do funky things.
If you're considering building your own firewall, you've started down a long path of homelabbing. I'd encourage you to start with a proper setup and allow yourself plenty of room to grow. You want your setup to be extensible, and the firewall is just the beginning.
I'd grab at least a 15U rack and a Dell poweredge R210. Throw in a gigabit nic and install OPNsense. You'll have room for your switches, NAS, UPS, etc... later.
I have an N100 box for my router and it's great for singe gigabit or less. But > 1gbit and you really quickly need some serious hardware.
At work I was using a VM with 2 cores from a xeon 4215 and it struggled to get anything more than 2 gbit. As soon as I bumped it up to 4 cores I was able to get the full 4gbit speeds. If I wanted to do any traffic shaping or packet inspection speeds would tank. Also my OpenVPN speeds kinda suck on this N100 device. They're never great, but I can definitely tell I'm getting CPU bound vs when I ran it on my server. So if you plan on running extra services don't expect the greatest performance.
A lot of networking traffic is single core dependent so I've been trying to find one of those weird 5 core machines with 1 P core and 4 E cores which I think would be the perfect fit.
I'd agree the OPNsense UI is probably more intuitive if you've never touched PFSense but I found the OPNsense UI difficult coming from many years of PF.
Which is why I said that I'm a purist. But whatever works, they're both worth exploring. I got dug-in on my solution a decade ago and haven't really had a reason to change once I learned it.
I can recommend the nanopi r4s, supported by openwrt, ipfire and I think opnsense. Ive been using it as my main router for almost a year now on a symmetric 1Gb connection. Best part is it's super cheap and tiny