Categories

  • 469 Topics
    1k Posts
    P
    We’re excited to announce the release of Netgate TNSR 25.10, our latest update packed with powerful new features, expanded capabilities, and over 35 bug fixes and enhancements. What’s New in version 25.10? VPF NAT Endpoint-Independent Mode - useful in large scale CGNAT scenarios VPF NAT Source-IP Hash Mode - improves behavior for protocols such as SIP VPF NAT Rule Port Ranges - dedicate outbound source port ranges different tenants VPF Filter Port Tables - define groupings of IP services ports into a VPF table WireGuard FQDN Peer Configuration - configure peers using FQDNs Legacy Dataplane NAT Removed - Legacy Dataplane NAT functionality has been removed. If you are still using legacy dataplane NAT, please convert to VPF NAT before updating to this version. Release Notes: https://docs.netgate.com/tnsr/en/latest/releases/release-notes-25.10.html Blog Post: https://www.netgate.com/blog/netgate-releases-tnsr-software-version-25.10 Video: https://youtu.be/EH1qUcsZ8do
  • 121k Topics
    771k Posts
    M
    I'm using pfBlocker to create IP table of AS3320 (Deutsche Telekom) IP range. I'm doing this to only allow connections from this network. It is working flawless on my pfSense+ but not on my pfSense CE. I'm seeing multiple connections in my IPsec log from IP addresses that are not withing that AS3320. There is no additional allow rule for WAN interface. Also the IP adddresses (networks) are updated without any problem and I can see them in the Alias. I'm running pfSense 2.8.1. pfBlocker: [image: 1763633808946-screenshot-2025-11-20-110959.png] WAN Interface rules: [image: 1763633827536-screenshot-2025-11-20-111127.png] IPsec Log: [image: 1763633846246-screenshot-2025-11-20-110910.png]
  • 20k Topics
    128k Posts
    W
    I used this simple solution: link text This can be easily done via WebUI commenting out a single line in the /usr/local/etc/rc.d/pfsense_tailscaled file: # handle the --auth-key parameter #pfsense_tailscaled_up_flags="--auth-key=${pfsense_tailscaled_authkey}"
  • 43k Topics
    267k Posts
    J
    Hallo zusammen, ich habe eine Verständnisfrage zu der Switchkonfig auf einer Netgate 7100. Auf dem Switch ist aktuell die Standardkonfig mit aktiviertem 802.1q: [image: 1763625689557-1657c676-ff17-477b-8225-8194632f4f45-grafik.png] mal als Beispiel, ich hätte in meinem Netzwerk folgende VLANs: VLAN 1 (Default untagged) VLAN 10 LAN VLAN 11 IOT VLAN 12 GUEST Ich möchte nun den Port 3 auf der Netgate für mein Default VLAN 1 (untagged) verwenden, das funktioniert im Standard bereits da ja alle Ports auf VLAN 1 als untagged konfiguriert sind. Auf der Netgate Switch wäre das VLAN 4091. So jetzt zu meiner Frage kann ich den Port 3 für alle obigen VLANs benutzen also VLAN 1 untagged und die restlichen 10, 11 und 12 als tagged? Oder muss ich dafür zwei Netzwerkverbindungen machen also VLAN 1 Port 3 als untagged, und dann z.B. Port 4 mit 10, 11 und 12 als tagged? Ich möchte wenn möglich eine Verbindung (RJ45) von dem Firewallswitch auf meinen normalen Switch machen und über diesen Trunk Port alle VLANs die ich habe darüber laufen lassen. Ich bin mir nur nicht sicher ob ich tagged und untagged mischen kann?
  • Information about hardware available from Netgate

    3k Topics
    21k Posts
    stephenw10S
    It would only be there if it was actually an SA which is unlikely for a BIOS update. I have the netgate blog page added to the RSS dashboard widget to see updates there.
  • Information about hardware available from Netgate

    44 Topics
    211 Posts
    AriKellyA
    It looks like unified web management could be coming soon. It would be great if it means easier control and management of all web services in one place. Let's see if any companies announce more details about it!
  • Feel free to talk about anything and everything here

    4k Topics
    19k Posts
    chpalmerC
    @narinesa said in Help with WG: wrt3200acm https://www.reddit.com/r/HomeNetworking/comments/uh6z14/linksys_wrt3200acm_is_it_still_viable_anyone/ I am not a Netgear fan neither. And not a fan of the VPN providers that promise to hide you for a fee.. Unless you have a specific reason.. Johnpoz is correct.. you are not going to get much help here for other platforms.. It does look like the Linksys will run https://openwrt.org/toh/linksys/wrt32x But you are on your own around here if you go that route.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.