I have added rules in opnsense that allow the subnets of the various VLANS access to 'any' so very little restriction.Where the infrastructure and my main computers will be. In this article we show how to connect via WireGuard to a central OPNsense-based firewall using the example of a Ubuntu 20. I want to access internet from LAN_R net and block access to LAN_T. Check the Enable box displayed to the right of pfBlockerNG.WEP or WPA – here we generally suggest using WPA and adding a pre-shared key (PSK). To create or modify a firewall rule, go to Firewall > Rules: menu Firewall > Rules. DBG (1) > pkg initialized Updating OPNsense repository catalogue. This guide will help port forward web servers in pfSense.Now you are connected to the internet throw the OPNSense firwall directly. Here is what works the best from my testing: Firewall: Rules: WAN = none for SIP or RTP. Opnsense allow internet access The NAT64 implementation currently available for OPNsense is the Tayga plugin.