OPNsense Firewall Baseline Rules (Trusted VLANs)

Establish baseline allow/deny rules for trusted VLANs to enforce enterprise-style segmentation.

Tools Used

Steps Taken

  1. Opened Firewall → Rules → [Trusted VLAN].
  2. Created allow rules for DNS (TCP/UDP 53), DHCP (UDP 67/68), and ICMP.
  3. Added an outbound allow rule to permit internet access.
  4. Added a final block-all rule with logging enabled.
  5. Applied changes and verified rule order.
  6. Validated DNS resolution, DHCP functionality, ping tests, and internet browsing.
  7. Generated intentional blocked traffic to confirm log visibility.

Screenshot: Firewall Rules (Trusted VLAN)

Firewall rules for trusted VLAN
Click to view full-size: Baseline allow/deny rules for the trusted VLAN.

Screenshot: Firewall Logs (Blocked Traffic)

Firewall logs showing blocked traffic
Click to view full-size: Blocked inter-VLAN traffic logged by OPNsense.

Screenshot: Ping Test

Ping test results
Click to view full-size: Successful ping to gateway and external IP.

Screenshot: DNS Test

DNS resolution test
Click to view full-size: DNS resolution validated via nslookup or OPNsense diagnostics.

Outcome

The trusted VLAN now enforces a clean, enterprise-style firewall baseline: essential services are allowed, outbound internet is permitted, and all other traffic is explicitly blocked and logged. Validation confirmed DNS, DHCP, ICMP, and internet access function correctly, while unauthorized traffic is denied and visible in the firewall logs. This establishes a secure foundation for further segmentation and policy development.