• [SOLUCIONADO] IPsec No proposal chosen

    10
    0 Votes
    10 Posts
    7k Views
    O
    Vuelve a caerse el tunel  :-\ ya no se que hacer. a ver si alguien majo sabe que pasa. 8) Gracias Tengo 2 tuneles configurados Tunel con el que tengo problema, ahora está desconectado túnel 194.xx.xx.xa pero aparece como activo. Tengo cortado el acceso a la ip 195.xx.xx.xx Pero aparecen intentos de conexión. Por otro lado tengo otro pfsense al que no le hago los nateos en el router y conecta con el remoto. De hecho cuando falla la conexión desde este firewall tengo que conectar con el otro (si funciona, que no siempre, dejo la conexión así y genero reglas de enrutado. A veces conecta pero sin trafico y deshabilito y vuelvo a conectar desde el primero y entonces vuelve a funcionar durante un tiempo. Pfsense 2.2.2 May 21 19:43:36 charon: 06[IKE] <59759> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:43:36 charon: 06[IKE] <59759> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:43:36 charon: 06[ENC] <59759> generating ID_PROT response 0 [ SA V V V V ] May 21 19:43:36 charon: 06[NET] <59759> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes) May 21 19:43:41 charon: 06[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:43:41 charon: 06[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:44:02 charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:44:02 charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:44:06 charon: 16[JOB] <59759> deleting half open IKE_SA after timeout May 21 19:44:16 charon: 16[NET] <59760> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes) May 21 19:44:16 charon: 16[ENC] <59760> parsed ID_PROT request 0 [ SA V V V V V V V ] May 21 19:44:16 charon: 16[ENC] <59760> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51 May 21 19:44:16 charon: 16[IKE] <59760> received DPD vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received DPD vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received NAT-T (RFC 3947) vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received NAT-T (RFC 3947) vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:44:16 charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:44:16 charon: 16[IKE] <59760> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:44:16 charon: 16[IKE] <59760> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:44:16 charon: 16[ENC] <59760> generating ID_PROT response 0 [ SA V V V V ] May 21 19:44:16 charon: 16[NET] <59760> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes) May 21 19:44:22 charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:44:22 charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:44:42 charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:44:42 charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:44:46 charon: 16[JOB] <59760> deleting half open IKE_SA after timeout May 21 19:44:56 charon: 16[NET] <59761> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes) May 21 19:44:56 charon: 16[ENC] <59761> parsed ID_PROT request 0 [ SA V V V V V V V ] May 21 19:44:56 charon: 16[ENC] <59761> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51 May 21 19:44:56 charon: 16[IKE] <59761> received DPD vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received DPD vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received NAT-T (RFC 3947) vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received NAT-T (RFC 3947) vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:44:56 charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:44:56 charon: 16[IKE] <59761> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:44:56 charon: 16[IKE] <59761> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:44:56 charon: 16[ENC] <59761> generating ID_PROT response 0 [ SA V V V V ] May 21 19:44:56 charon: 16[NET] <59761> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes) May 21 19:44:59 charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2) May 21 19:44:59 charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2) May 21 19:45:00 charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2) May 21 19:45:00 charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2) May 21 19:45:02 charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:45:02 charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:45:22 charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:45:22 charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:45:26 charon: 11[JOB] <59761> deleting half open IKE_SA after timeout May 21 19:45:36 charon: 11[NET] <59762> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes) May 21 19:45:36 charon: 11[ENC] <59762> parsed ID_PROT request 0 [ SA V V V V V V V ] May 21 19:45:36 charon: 11[ENC] <59762> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51 May 21 19:45:36 charon: 11[IKE] <59762> received DPD vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received DPD vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received NAT-T (RFC 3947) vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received NAT-T (RFC 3947) vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:45:36 charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:45:36 charon: 11[IKE] <59762> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:45:36 charon: 11[IKE] <59762> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:45:36 charon: 11[ENC] <59762> generating ID_PROT response 0 [ SA V V V V ] May 21 19:45:36 charon: 11[NET] <59762> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes) May 21 19:45:42 charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:45:42 charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:45:47 charon: 11[NET] <59762> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes) May 21 19:45:47 charon: 11[IKE] <59762> received retransmit of request with ID 0, retransmitting response May 21 19:45:47 charon: 11[IKE] <59762> received retransmit of request with ID 0, retransmitting response May 21 19:45:47 charon: 11[NET] <59762> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes) May 21 19:46:02 charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:46:02 charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:46:02 charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2) May 21 19:46:02 charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2) May 21 19:46:03 charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2) May 21 19:46:03 charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2) May 21 19:46:05 charon: 07[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2) May 21 19:46:05 charon: 07[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2) May 21 19:46:06 charon: 07[NET] <59762> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes) May 21 19:46:06 charon: 07[IKE] <59762> received retransmit of request with ID 0, retransmitting response May 21 19:46:06 charon: 07[IKE] <59762> received retransmit of request with ID 0, retransmitting response May 21 19:46:06 charon: 07[NET] <59762> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes) May 21 19:46:06 charon: 07[JOB] <59762> deleting half open IKE_SA after timeout May 21 19:46:22 charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:46:22 charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:46:42 charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:46:42 charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:46:46 charon: 07[NET] <59763> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes) May 21 19:46:46 charon: 07[ENC] <59763> parsed ID_PROT request 0 [ SA V V V V V V V ] May 21 19:46:46 charon: 07[ENC] <59763> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51 May 21 19:46:46 charon: 07[IKE] <59763> received DPD vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received DPD vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received NAT-T (RFC 3947) vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received NAT-T (RFC 3947) vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:46:46 charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:46:46 charon: 07[IKE] <59763> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:46:46 charon: 07[IKE] <59763> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:46:46 charon: 07[ENC] <59763> generating ID_PROT response 0 [ SA V V V V ] May 21 19:46:46 charon: 07[NET] <59763> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes) May 21 19:47:02 charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:47:02 charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:47:16 charon: 07[JOB] <59763> deleting half open IKE_SA after timeout May 21 19:47:22 charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:47:22 charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:47:24 charon: 07[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2) May 21 19:47:24 charon: 07[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2) May 21 19:47:26 charon: 12[NET] <59764> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes) May 21 19:47:26 charon: 12[ENC] <59764> parsed ID_PROT request 0 [ SA V V V V V V V ] May 21 19:47:26 charon: 12[ENC] <59764> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51 May 21 19:47:26 charon: 12[IKE] <59764> received DPD vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received DPD vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received NAT-T (RFC 3947) vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received NAT-T (RFC 3947) vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-03 vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-02 vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:47:26 charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-00 vendor ID May 21 19:47:26 charon: 12[IKE] <59764> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:47:26 charon: 12[IKE] <59764> 195.xx.xx.xx is initiating a Main Mode IKE_SA May 21 19:47:26 charon: 12[ENC] <59764> generating ID_PROT response 0 [ SA V V V V ] May 21 19:47:26 charon: 12[NET] <59764> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes) May 21 19:47:42 charon: 12[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500] May 21 19:47:42 charon: 12[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]</con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586> [image: conexiones.png] [image: conexiones.png_thumb] [image: conexiones1.png] [image: conexiones1.png_thumb] [image: conexiones2Phase1.png] [image: conexiones2Phase1.png_thumb] [image: conexiones3Phase2.png] [image: conexiones3Phase2.png_thumb]
  • Reglas para Acceso entre segmentos de Pfsensen

    4
    0 Votes
    4 Posts
    1k Views
    I
    Gracias a todos por el aporte…habia olvidado lo de los cambios del "Policy Routing" Gracias @ptt @bellera
  • Idle timeout y Hard timeout

    3
    0 Votes
    3 Posts
    1k Views
    J
    Muchas gracias, intentaré instalando un radius.
  • Como saber si me suma las WAN

    13
    0 Votes
    13 Posts
    2k Views
    I
    Voy a hacer estos cambios y comento los resultados. Saludos!
  • Problemas con portal cautivo

    8
    0 Votes
    8 Posts
    1k Views
    J
    ok pues en cuanto lo tenga montado , os comento como va me pongo a ello, lo hare con 2 maquinas físicas  y os comento los resultados   muchas gracias por vuestra ayuda saludos Jesus
  • Interconexión de varios pfsense en sitios distintos

    7
    0 Votes
    7 Posts
    1k Views
    A
    Como comentario/ ilustracion adicional, seria algo mas o menos asi . Se tendria que especificar que el trafico que el trafico de las interfaces MAN no deberan de hacer NAT como lo hace de manera predeterminada.  Y hay que especificar las reglas en cada uno de los firewalls para aceptar o no el trafico que viene de estas interface. Anexo un pequeño diagrama
  • Sólo 2 segundos en Youtube. squid3 con SSL Bump + squidGuard

    4
    0 Votes
    4 Posts
    2k Views
    belleraB
    @bellera: Arriba, en Documentación o Últimas aportaciones a Documentación tienes una entrada que dice: squidGuard con squid3 Ahí tienes cómo configurar y diagnosticar tu squidGuard, paso a paso. Si los procesos squid y squidGuard están correctos postea: 32 bit –-> /usr/pbi/squidguard-squid3-i386/etc/squidGuard/squidGuard.conf 64 bit ---> /usr/pbi/squidguard-squid3-amd64/etc/squidGuard/squidGuard.conf
  • Duda comprar hardware para pfsense

    5
    0 Votes
    5 Posts
    1k Views
    E
    gracias por la respuesta, soy nuevo por estos lares y quería informarme un poco, por otro lado… es recomendable el almacenamiento extra?
  • Bloqueo facebook,, firewall o SquidGuard?

    18
    0 Votes
    18 Posts
    5k Views
    A
    envio ip que sierve aca los chilenos para bloquear el sitio facebook. atte ale.. [image: facebook.jpg] [image: facebook.jpg_thumb]
  • Logs en la nube (logging as a service)

    7
    0 Votes
    7 Posts
    1k Views
    belleraB
    Para poder hacer la conexión segura se precisa certificado: https://www.loggly.com/docs/syslog-ng-tls-configuration/
  • Error de IPSEC en actualizacion de 2.1.5 a 2.2.2

    2
    0 Votes
    2 Posts
    625 Views
    A
    Estuve leyendo un poco y al parecer necesitas borrar y crear nuevamente los túneles y reiniciar tus pfs
  • [Solucionado] Expandir sistema de ficheros nanobsd 4G 2.2

    2
    0 Votes
    2 Posts
    655 Views
    TurBossT
    Solucionado con ayuda de http://unix.stackexchange.com/questions/117023/expanding-the-disk-size-on-pfsense-under-vmware-esxi y https://www.freebsd.org/doc/en/books/handbook/disks-growing.html un saluo
  • Acceder a archivos en otra red

    13
    0 Votes
    13 Posts
    3k Views
    A
    puedes llegar a la pc con ping ? puedes hacer un traceroute ? Puedes verificar que tengas las reglas en el firewall de tu pc adecuadas para el acceso ?  Usualmente los firewalls de las pcs restringen el uso solo a las redes locales para recursos compartidos y algunos otros servicios. un nmap a esa pc que te regresa ?
  • Desintalar un paquete…

    2
    0 Votes
    2 Posts
    1k Views
    belleraB
    Puede que queden restos en el config.xml, que es el archivo que tiene toda la configuración de pfSense, paquetes incluídos. Puedes proceder para squid y squid3 como expliqué en: https://forum.pfsense.org/index.php?topic=93361.msg518078#msg518078
  • Pregunta sobre mantenimiento programado a pfsense

    2
    0 Votes
    2 Posts
    621 Views
    pttP
    No no hace falta "reiniciarlo cada cierto tiempo"…. Si utilizas el Buscador del Foro, encuentras: https://forum.pfsense.org/index.php?topic=72125.msg393461#msg393461 https://forum.pfsense.org/index.php?topic=72284.msg394459#msg394459
  • Conexiones PPTP detras de Pf Sense

    2
    0 Votes
    2 Posts
    623 Views
    A
    https://doc.pfsense.org/index.php/What_are_the_limitations_of_PPTP_in_pfSense
  • Proxy server: Cache management

    8
    0 Votes
    8 Posts
    2k Views
    perikoP
    ufs es del pasado, usa aufs Saludos.
  • Problemas con LightSquid no funciona

    4
    0 Votes
    4 Posts
    1k Views
    belleraB
    https://doc.pfsense.org/index.php/Lightsquid_Troubleshooting
  • Limitar velocidad en la wan

    4
    0 Votes
    4 Posts
    856 Views
    belleraB
    @josemanuelrm26: El problema que son estudiantes en una residencia y se le bloquean los juegos y me piden los supervisores que no los bloquee. Pues creo que tendrán que invertir en más ancho de banda. El tema de los juegos online es así…
  • Ayuda con administración remota

    3
    0 Votes
    3 Posts
    787 Views
    H
    Funciono, cambie los puertos y pase a https. Gracias!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.