u/Firewalla-Ash

We're working on a new design in 1.69 to show more details on the last hit of a rule. Is the "last destination" clear enough?

u/Firewalla-Ash — 1 day ago

New home screen layout coming soon, in App 1.69...

  • A new Rules card for more visibility
  • "Family" is now "Controls", with more quick control options for your network.

Question to you: Do you think "Ad Block" or other features should also belong in Controls?

u/Firewalla-Ash — 3 days ago

In 1.69, we're adding a new feature to block domains using non-ASCII characters (which can sometimes impersonate sites). Which name fits best?

Context: Punycode is the system that lets browsers represent non-ASCII characters (like characters in other languages) in domain names.

For example, a domain like paypal.com using a Greek 'alpha' (α) will be encoded as xn--pypl-0ldc.com.

These can sometimes be used to impersonate legit sites, but may block trusted websites in other languages.

View Poll

reddit.com
u/Firewalla-Ash — 5 days ago

Without DAP, you'd need to manually examine network flows and maintain allow rules for each of your devices. While it may work initially, it's not practical to keep up to date.

DAP does the hard work for you. Just go to Protect > Device Active Protect and turn it on.

Commonly asked questions:

Can DAP isolate my device on the local network?

  • Yes, with Firewalla AP7 and App 1.68 or later, DAP can automatically enable Device Isolation if it determines that it does not need local communication.

Why are my devices ineligible for DAP?

  • Only certain "simple" IoT devices are eligible for DAP. Devices with more complex online activities are NOT eligible, such as smartphones, computers, tablets, etc.
  • Even IoT devices that appear simple may not be eligible because of their complex behaviors.
  • Over time, DAP may eventually move ineligible devices back into the Learning phase.

For more details on how DAP works: https://help.firewalla.com/hc/en-us/articles/44061066094867-Device-Active-Protect-Dynamic-Microsegmentation-Block-everything-and-allow-only-what-s-needed

u/Firewalla-Ash — 9 days ago

Current content controls are embedded inside the "Family" button, and many important things like NRD filtering are behind "Target Lists" under Rules.

In App 1.69, we are going to make this simpler by combining all the important content filtering under "Controls" (replacing the Family button), and you can easily manage global rules.

(We are not removing anything, just making things easier to find and turn on.)

Here's a quick mock of the new design. Please let us know what you think.

u/Firewalla-Ash — 13 days ago

What else would you want to show here? It may be hard to make it configurable, so the first phase will be automatic.

(The buttons would be dynamic, based on the most recently used. The first icon is your recent device, the second is recent group/user, the third is recent feature or speed/performance related, and the fourth is a feature that is hidden or disabled.)

u/Firewalla-Ash — 13 days ago

MSP Active Protect now uses Firewalla AI and can provide more accurate key information for Security Activity or Abnormal Upload Alarms, and reduce even more false positive Alarms.

We've also added the WAN throughput, CPU, and Memory Usage on the Single Box MSP dashboard and a new Alarm AI Summary for Email Notifications.

(Note: Firewalla AI is optional. AI-generated content may not always be accurate or complete — always verify important information before taking action.)

Check out the full details here: https://help.firewalla.com/hc/en-us/articles/49811464349075-MSP-Release-2-10-New-Single-Box-View-Email-Notifications-Merge-with-My-Firewalla-more#h_01KQD24VRYEZA35PNAE765A5MP

u/Firewalla-Ash — 14 days ago

Alarms help notify you of anomalies in your network. It's important to always review these on time and to investigate the destinations your devices access.

Coming soon in MSP 2.10.2 and App 1.69, we'll be improving your Alarm experience so that Firewalla AI can better analyze Alarms and evaluate risks.

Learn more about Zero Trust: https://help.firewalla.com/hc/en-us/articles/36325500638739-A-Secure-and-Better-Network-with-Firewalla-Part-4-Zero-Trust-Network-Architecture

Learn more about Handling Alarms: https://help.firewalla.com/hc/en-us/articles/48455312216595-Handling-Specific-Firewalla-Alarms

u/Firewalla-Ash — 15 days ago

User Identity is important in Zero Trust and Enterprise Security because it helps you decide what each user can access. (MAC Address identification will work, but it is a weak way to identify users since MAC can be changed or randomized to appear as something else.)

With AP7 or Orange Wi-Fi, you can identify devices so they are dynamically sent to their User:

  1. SSID: Create separate SSIDs and passwords for each user. (Best for small setups or fewer users, since too many SSIDs will reduce performance)
  2. PPSK: Use a single SSID and unique personal keys for each user. (Doesn't support WPA3, and not supported on Orange)
  3. WPA3-Enterprise: Use a single SSID and set Usernames and Passwords for each user, properly authenticating logins with Firewalla's RADIUS server. (May not work with IoT devices)

Since networks can be very diverse, most of the time you will need to mix the above methods to fit your network.

u/Firewalla-Ash — 16 days ago