User Tools

Site Tools


pfsense:pfblockerng:bypass_pfblockerng_for_specific_clients

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
pfsense:pfblockerng:bypass_pfblockerng_for_specific_clients [2020/12/07 09:07] – [PFSense - pfBlockerNG - Bypass pfBlockerNG for specific clients] peterpfsense:pfblockerng:bypass_pfblockerng_for_specific_clients [2021/01/28 09:23] (current) – [PFSense - pfBlockerNG - Bypass pfBlockerNG for specific clients] peter
Line 12: Line 12:
 Navigate to **Services -> DNS Resolver**. Navigate to **Services -> DNS Resolver**.
  
-In the **General Settings** tabchange:+In the **General Settings** tabchange:
  
   * Custom options: <code>   * Custom options: <code>
Line 44: Line 44:
 Also, do not have the word **server:** in front of the following statement **server:include: /var/unbound/pfb_dnsbl.*conf**. Also, do not have the word **server:** in front of the following statement **server:include: /var/unbound/pfb_dnsbl.*conf**.
  
-The following line may be needed above the **include: /var/unbound/pfb_dnsbl.*conf** line:  **include: /var/unbound/host_entries.conf**.+The following line may be needed above the **include: /var/unbound/pfb_dnsbl.*conf** line: <code>include: /var/unbound/host_entries.conf</code>
 </WRAP> </WRAP>
  
Line 100: Line 100:
  
 <WRAP info> <WRAP info>
-**NOTE:**  A 192.168.0.0/22 mask (CIDR) for the IPv4 subnets it does not work, I instead had to define each subnet with /24. Maybe a /16 would have worked?+**NOTE:**  A 192.168.0.0/22 mask (CIDR) for the IPv4 subnets did not work, I instead had to define each subnet with /24. Maybe a /16 would have worked?
  
 Same problem with IPv6. (note, the examples mask my real IPv6 prefix), I had to define multiple /64's as a single /62 did not work. Same problem with IPv6. (note, the examples mask my real IPv6 prefix), I had to define multiple /64's as a single /62 did not work.
Line 131: Line 131:
 </code> </code>
  
-These entries added in our “dnsbl” view force all clients in this group (192.168.20.x) to the SafeSearch address for each of the four services included.+<WRAP info> 
 +**NOTE:**  These entries added in the **dnsbl** view force all clients in this group (192.168.20.x) to the SafeSearch address for each of the four services included.
  
-We have to add them here as adding them as a Host Override on the DNS Resolver configuration page would enforce them for all clients.+These have to be added hereas adding them as a Host Override on the DNS Resolver configuration pagewould enforce them for all clients. 
 + 
 +</WRAP>
  
 ---- ----
pfsense/pfblockerng/bypass_pfblockerng_for_specific_clients.1607332037.txt.gz · Last modified: 2020/12/07 09:07 by peter

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki