![opnsense monit opnsense monit](https://securityonline.info/wp-content/uploads/2018/01/feature_firewall_categories-520x245.png)
- OPNSENSE MONIT MANUAL
- OPNSENSE MONIT PATCH
- OPNSENSE MONIT CODE
- OPNSENSE MONIT PASSWORD
- OPNSENSE MONIT SERIES
O firmware: opnsense-update now supports snapshot access via -z option O firmware: opnsense-code now uses flexible nf target from tools.git O firmware: opnsense-code now updates the current directory if nothing was specified O dhcp: fix incorrect parsing of DUID (contributed by Matt Holgate) O dhcp: fix sorting of IPv6 static mappings (contributed by vnxme)
![opnsense monit opnsense monit](https://dev.wisen.co.kr/_core/_files/naverEditor/insightvisual.png)
O captive portal: disable faulty TLS on HTTP since lighttpd 1.4.56 O reporting: persist interface selection on traffic graph page O reporting: fix name resolution filter change in insight O reporting: add top talkers to revamped traffic graph page O firewall: category selector missing caption O firewall: add readonly actions to aliases permission (contributed by Manuel Faux) O firewall: remove duplicated destination field in live log O firewall: fix all state value in pfTop (contributed by Lucas Held) O firewall: fix minor regression in maintaining target alias file O firewall: fix typo in ICMPv6 validation
OPNSENSE MONIT MANUAL
O firewall: add manual refresh button to live log O firewall: add type 128 to outgoing IPv6 RFC4890 requirements O system: set default certificate lifetime to 397 days
OPNSENSE MONIT SERIES
O system: keep compatible TLS 1 defaults for web GUI on 20.7 series O system: display destination port number in firewall log widget (contributed by Team Rebellion) O system: allow to recover from bad TLS certificate and/or bad settings in console interface assign O reporting: prevent calling top talkers when no interfaces O firewall: relax schedule name validation O firewall: display zeros and sort columns in pfTables (contributed by kulikov-a) O firewall: fix anti-spoof option for separate bridge interfaces O firewall: create an appropriate max-mss scrub rule for IPv6 O firewall: add live log "host", "port" and "not" filters O firewall: support category filters for firewall and NAT rules (sponsored by Modirum) O interfaces: support 6RD with single /64 prefix (contributed by Marcel Hofer) O interfaces: pick proper route for 6RD and 6to4 tunnels O interfaces: fix address removal in IPv6 CARP case O interfaces: read deprecated flag, allow family spec in (-)alias calls O interfaces: fix PPP links not linking to its advanced configuration page
OPNSENSE MONIT CODE
O interfaces: no longer assume configuration-less interfaces can reach static setup code O interfaces: defer IPv6 disable in interface code to ensure PPP interfaces do exist O system: choose a better bind candidate for IPv4 in dpinger O system: ignore disabled gateways in dpinger services
OPNSENSE MONIT PASSWORD
O system: optionally allow TOTP users to regenerate a token from the password page O system: first backup is same as current so ignore it on GUI and console O system: allow subdirectories in NextCloud backup (contributed by Lorenzo Milesi) O system: allow self-signed renew for web GUI default (using "configctl webgui restart renew") O system: generate a better self-signed certificate for web GUI default O system: harden web GUI defaults to TLS 1.2 minimum and strong ciphers O system: removed spurious comma from certificate subject print and unified underlying code O system: removed unused gateway API dashboard feed O system: allow case-insensitive matching for LDAP user authentication O system: use authentication factory for web GUI login
OPNSENSE MONIT PATCH
Here are the full patch notes against 20.7.8: For each major release a roadmap is put in place to guide development and set out clear goals. A fixed release cycle of 2 major releases each year offers businesses the opportunity to plan upgrades ahead. OPNsense offers weekly security updates with small increments to react on new emerging threats within in a fashionable time. A strong focus on security and code quality drives the development of the project. The project has evolved very quickly while still retaining familiar aspects of both m0n0wall and pfSense. OPNsense started as a fork of pfSense® and m0n0wall in 2014, with its first official release in January 2015. It brings the rich feature set of commercial offerings with the benefits of open and verifiable sources. OPNsense includes most of the features available in expensive commercial firewalls, and more in many cases. OPNsense is an open source, easy-to-use and easy-to-build FreeBSD based firewall and routing platform. Home Submit Browse Projects by Tag Search About Links Meta