I?d like an unbiased opinion on whether OpenBSD should be considered
a better choice as a firewall/router.>
I?m wondering whether OpenBSD would be easier to manageas a firewall/router than Debian.
Absolutely not. I?m referring to the fact that, as soon as I started
looking into firewall options on Debian, I found at least three
different systems: iptables, nftables, and ufw. It was quite confusing
to understand how they relate to each other. I now think I understand
that nftables is the newer approach, and it?s a very sophisticated and feature-rich system, probably ideal for a team of engineers, but maybe overkill for a side project like mine.
When I searched for firewall solutions on OpenBSD, the answer was much simpler: just pf.
I?d like to set up a homelab with a LAN and a DMZ. I have a PC with
three network interfaces. The idea is to separate the DMZ so I can
publish a demo website. This is not for professional use, just for
tinkering as a hobby.
If anyone has experience with firewall/router setups, would you
recommend using Debian for the firewall/router PC as well, or using
OpenBSD for the firewall/router and Debian as a KVM host for services? Alternatively, should I just use Debian for the firewall/router with nftables?
I?m asking because I have the impression that Linux has accumulated a
lot of overhead and is no longer as suitable for personal tinkering,
but is more geared toward enterprise use.
to
Can you suggest some good documentation to start with? As I mentioned,
there is a lot of outdated information, and it?s really difficult
filter out what?s essential.
On Wed, 08 Apr 2026 14:05:18 +0200
Roy <royroge@outlook.com> wrote:
Can you suggest some good documentation to start with? As I mentioned,
there is a lot of outdated information, and it?s really difficult to
filter out what?s essential.
Any tutorial based on nftables will be fairly recent and certainly applicable. Most of the obsolete stuff is going to be iptables and the
older frontends. Even so, there's a means of translating iptables code
to nftables, so if you find something really useful in iptables, it can probably be ported fairly easily.
As to frontends: I haven't tried one for a long time, but they
basically simplify the compact but not greatly readable syntax of
nftables, and iptables before it. The other edge of that blade is that
they cannot do everything you can do with the raw kernel-driving code.
It's a steep learning curve if you're not previously familiar with
iptables (and still somewhat steep if you are) but it gives you more
control.
As an aside, I don't do it much now, but I used to use iptables quite a
lot as a cheap and nasty logging tool, nowhere near as versatile as
Wireshark and the others, but if you just want to see if a particular protocol is getting in or out of somewhere, it's very quick to add a
logging rule. A little harder with nftables.
I?d like to set up a homelab with a LAN and a DMZ. I have a PC with
three network interfaces. The idea is to separate the DMZ so I can
publish a demo website. This is not for professional use, just for
tinkering as a hobby.
If anyone has experience with firewall/router setups, would you
recommend using Debian for the firewall/router PC as well, or using
OpenBSD for the firewall/router and Debian as a KVM host for services? Alternatively, should I just use Debian for the firewall/router with nftables?
I?m asking because I have the impression that Linux has accumulated a
lot of overhead and is no longer as suitable for personal tinkering,
but is more geared toward enterprise use.
Well, you kind of made my point :)
If anyone has experience with firewall/router setups, would you
recommend using Debian for the firewall/router PC as well, or using
OpenBSD for the firewall/router and Debian as a KVM host for services? Alternatively, should I just use Debian for the firewall/router with nftables?
I?m asking because I have the impression that Linux has accumulated a
lot of overhead and is no longer as suitable for personal tinkering,
but is more geared toward enterprise use.
I?d like to set up a homelab with a LAN and a DMZ. I have a PC with
three network interfaces. The idea is to separate the DMZ so I can
publish a demo website. This is not for professional use, just for
tinkering as a hobby.
If anyone has experience with firewall/router setups, would you
recommend using Debian for the firewall/router PC as well, or using
OpenBSD for the firewall/router and Debian as a KVM host for services? Alternatively, should I just use Debian for the firewall/router with nftables?
I?m asking because I have the impression that Linux has accumulated a
lot of overhead and is no longer as suitable for personal tinkering,
but is more geared toward enterprise use.
Roy <royroge@outlook.com>:
If anyone has experience with firewall/router setups, would you
recommend using Debian for the firewall/router PC as well, or using
OpenBSD for the firewall/router and Debian as a KVM host for services? Alternatively, should I just use Debian for the firewall/router with nftables?
| Sysop: | Jacob Catayoc |
|---|---|
| Location: | Pasay City, Metro Manila, Philippines |
| Users: | 5 |
| Nodes: | 4 (0 / 4) |
| Uptime: | 493851:45:56 |
| Calls: | 146 |
| Files: | 547 |
| D/L today: |
6 files (97K bytes) |
| Messages: | 76,953 |