Categories

  • 465 Topics
    1k Posts
    A
    @Said.Fathy , Hi Said .. I'd strongly recommend Lawrence Systems' youtube channel... it's the best as far as pfsense is concerned.. from beginner to pro https://www.youtube.com/@LAWRENCESYSTEMS
  • 121k Topics
    769k Posts
    O
    While I'm thinking about ZFS-related things, I have just enough modifications to pfSense that require backup that a built-in ZFS send/recv solution would be a good addition. If you're wondering what those non-packaged mods are: https://github.com/clara-j/pfsense_zfs_check wpa_supplicant setup for AT&T fiber https://github.com/LeonStraathof/pfsense-speedtest-widget I think all of these could be handled if there was a designated directory that was included in backups and/or packed into config.xml.
  • 20k Topics
    128k Posts
    Z
    @Uglybrian In this example that's not the case. The ET_Block list is still in use and continuing to block traffic as expected. Now if I download the list. I cannot find the IP or Range of IPs. So maybe it is showing that this IP/range used to be on this list but based on the latest version it's not so falls under this new list instead??
  • 43k Topics
    267k Posts
    WkrenskiW
    Saudações a todos, como estão? Pois bem, trabalho para uma indústria que cerca de 1 ano adquiriu uma central telefônica Intelbras Unit 5000 onde estava funcionando a frente o pfsense. Porem os técnicos que prestam suporte a telefonia pediram para mudar a central para trás do firewall onde consigo fazer e receber ligações em ambos os lados, porem somente o lado de fora da rede consegue ouvir. Realizei varias configurações como: NAT 1:1 para o IP da central, NAT Port Foward liberando as portas para o IP da central: TCP/UDP 10000 a 2000, TCP/UDP 5060 a 5061 e RTP 5004 Liberei estas mesmas portas em Rules / WAN e LAN Desabilitei da WAN: Block private networks and loopback addresses e Block bogon networks, mas sem sucesso! Obs. minha WAN recebe rede via DMZ da operadora Se puderem me ajudar com qualquer dica ficaria muito grato!
  • Information about hardware available from Netgate

    3k Topics
    21k Posts
    R
    Great! I see what you’ve set up. I’m using custom hardware, and in addition, I’ve taken the following steps for the configuration and works!: 1- Add the following lines to your snmpd.conf file (Multiples CPU cores): extend temp_cpu /bin/sh -c "/sbin/sysctl -n dev.cpu.0.temperature | tr -d 'C' | tr -d '\n'" extend temp_cpu /bin/sh -c "/sbin/sysctl -n dev.cpu.1.temperature | tr -d 'C' | tr -d '\n'" extend temp_cpu /bin/sh -c "/sbin/sysctl -n dev.cpu.2.temperature | tr -d 'C' | tr -d '\n'" extend temp_cpu /bin/sh -c "/sbin/sysctl -n dev.cpu.3.temperature | tr -d 'C' | tr -d '\n'" extend temp_cpu /bin/sh -c "/sbin/sysctl -n dev.cpu.4.temperature | tr -d 'C' | tr -d '\n'" extend temp_cpu /bin/sh -c "/sbin/sysctl -n dev.cpu.5.temperature | tr -d 'C' | tr -d '\n'" extend temp_cpu /bin/sh -c "/sbin/sysctl -n dev.cpu.6.temperature | tr -d 'C' | tr -d '\n'" extend temp_cpu /bin/sh -c "/sbin/sysctl -n dev.cpu.7.temperature | tr -d 'C' | tr -d '\n'" [image: 1761225286560-6590abd6-87e7-4927-a972-e15eab52c07f-image-resized.png] 2- Verify the return string information. command: snmpwalk -v2c -c public localhost NET-SNMP-EXTEND-MIB::nsExtendOutputFull Result: NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu0" = STRING: 39.0 NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu1" = STRING: 40.0 NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu2" = STRING: 37.0 NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu3" = STRING: 38.0 NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu4" = STRING: 37.0 NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu5" = STRING: 38.0 NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu6" = STRING: 41.0 NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu7" = STRING: 42.0 [image: 1761225619366-c97be0c5-31dd-4554-a4c7-27d0094a167d-image.png] 3- Get the OID value corresponding to each individual CPU core. Command: snmptranslate -On 'NET-SNMP-EXTEND-MIB::nsExtendOutputFull."temp_cpu0"' Result: .1.3.6.1.4.1.8072.1.3.2.3.1.2.9.116.101.109.112.95.99.112.117.48 [image: 1761225732181-bfc00e8f-cc48-4f31-a8d4-d53c24a88ef9-image.png] Repeat for each CPU Core to have 08 OIDs. On the PRTG side, perform the following steps: 1- Add SNMP Custom Advanced [image: 1761226218994-495d657f-8e6f-4b74-81e1-543f4dd37f29-image.png] 2- Fill up the information for each CPU: Sensor Type: SNMP Custom Advanced (supports up to 10 channels) Channel 1: Name CPU0, OID = numeric for "temp_cpu0", Unit = °C, Value Type = Float/Gauge Channel 2: Name CPU1, OID = numeric for "temp_cpu1", Unit = °C, Value Type = Float/Gauge … up to CPU7 [image: 1761226386844-db1ddb5b-ac5d-4d29-ad03-0c4b8b22c143-image.png] 3- The graph is populated for each CPU core. [image: 1761226541965-d83f6cce-b37c-48f6-af76-ed864454f72a-image.png]
  • Information about hardware available from Netgate

    44 Topics
    211 Posts
    AriKellyA
    It looks like unified web management could be coming soon. It would be great if it means easier control and management of all web services in one place. Let's see if any companies announce more details about it!
  • Feel free to talk about anything and everything here

    4k Topics
    19k Posts
    G
    @stephenw10 This is my final note since it seem you will always look at this as an endpoint. It doesn't appear, it actually is, the facts are the facts. Still, moderator usually have a way to remove posts and ban single users, not just the entire herd, or at least the ones use. Perhaps those are more advance, or perhaps netgate forums lack that functionality. I never said negate took this issue lightly, I was just looking for some feedback. I have seen this process many times and for the looks of it, pfsense CE is very much in maintenance mode. Just because netgate wants to be politically correct does not mean it is not. The fact are there and they are fallowing the same path as others did. Again, this subject is just becoming redundant and it is affecting other users in the forum.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.