• Now Available: pfSense Plus 25.11.1

    Pinned
    51
    3 Votes
    51 Posts
    2k Views
    G
    @stephenw10 Thank you, Stephen, for your valued feedback. Best regards, Marco
  • Announcing Netgate Nexus: Multi-Instance Management for pfSense Plus

    Pinned
    4
    1 Votes
    4 Posts
    289 Views
    N
    Nice work, please add fine‑grained RBAC to Netgate Nexus. We need a way to allow operators to manage all registered pfSense instances (view instances, use remote GUI/console) without giving them access to any Nexus controller settings or menus. A separation of “Instance Management” and “Controller Administration” privileges would enable proper role separation and significantly improve security in multi‑team environments.
  • PSA: IPv6 connection failures with TSO enabled in pfSense+ 25.11

    Pinned Locked
    1
    2 Votes
    1 Posts
    196 Views
    No one has replied
  • Now Available: pfSense® Plus 25.11-RELEASE

    Pinned
    98
    8 Votes
    98 Posts
    14k Views
    Bob.DigB
    @SteveITS Some years(?) ago I had something similar, one feed in pfBlocker couldn't be downloaded to the end and that broke the whole upgrade... have I learned from that? No.
  • Now Available: pfSense® CE 2.8.1-RELEASE

    Pinned
    27
    6 Votes
    27 Posts
    7k Views
    V
    @dennypage Create an igmp rule on your floating rules, and do not set the direction to in. Set: Interface Leave: Direction to any Set: Protocol to IGMP only Set: Source to any Set: Destination to any Set: Quick Set: Adavanced Options, Allow IP options For example if you have pfblocker dnsbl auto rules (ping auto rule, permit auto rule) on top, it can cause trouble on the states. Check: the States of this rule. You should see tcp and upd packets as well, 443. If you set the direction on your lan intarfce to in, you should see igmp only, otherwise you have to place at the very top of all your other floating rules before everything else.
  • New Netgate® Installer Version 1.1 Available

    Pinned
    2
    2 Votes
    2 Posts
    1k Views
    No one has replied
  • 7 Votes
    1 Posts
    355 Views
    No one has replied
  • A new public BETA for pfSense® Plus 25.11 is now available!

    Locked
    1
    4 Votes
    1 Posts
    849 Views
    No one has replied
  • Now Available: pfSense® Plus 25.07-RELEASE

    84
    6 Votes
    84 Posts
    21k Views
    M
    @stephenw10 Yeah, I saw that release post and that was the reason I tested the old download link
  • New pfSense Plus 25.03-BETA is here!

    56
    2 Votes
    56 Posts
    19k Views
    M
    Might be time to unpin this post, and shorten the list of pinned posts at the top of this important forum section?
  • Updates to the pf packet filter in FreeBSD and pfSense software

    2
    6 Votes
    2 Posts
    865 Views
    C
    @pfGeorge So what? What should I do or not do? Update something somewhere or just wait?
  • Now Available: pfSense® Plus 25.07.1-RELEASE

    4
    5 Votes
    4 Posts
    3k Views
    Bob.DigB
    said in Now Available: pfSense Plus 25.07.1-RELEASE: Coincidence? Yes, indeed.
  • pfSense® CE 2.8.1 Beta Now Available!

    23
    6 Votes
    23 Posts
    6k Views
    R
    Thanks for working on it.
  • Call for Testing: pfSense® CE 2.8.1 RC Now Available!

    1
    6 Votes
    1 Posts
    1k Views
    No one has replied
  • pfSense Plus 25.07 Beta Now Available

    36
    4 Votes
    36 Posts
    7k Views
    GertjanG
    @yellowRain said in pfSense Plus 25.07 Beta Now Available: Here are some tips and ideas on ipv6. You would have to start with the start : your ISP. The bad news : IPv6 isn't IPv4. After decades, for IPv4, the DHCPv4 WAN IP attribution won. Some ISPs still persist offering a PPPOE connection. What left - 1 % or so, is "totally not standard", so you have to use the ISP box, and connect pfSense as a 'LAN device' using DHCPv4 on the WAN, and you done. For IPv6 : if your ISP was respecting all IPv6 RFCs, then 'set WAN to use DHCPv6-client, and done. Maybe some ISP give you a page with IPv6 setting, but I guess that's pretty rare. Some ISP propose the awkward "Negociate IPv6 over IPv4" or some other strange method. So, normally - afaik, already this : setting a custom static ipv6 address for pfsense router is already quiet 'non standard'. The ISP or ISP box should give : An IPv6 WAN address for the pfSense WAN interface and as many 'prefixes' (/64 networks) for every pfSense LAN your pfSense has. Typically, your ISP or ISP has 256 (/56) indicate with of these prefixes for you (probably minus on, as from the first prefix, only one IPv6 is used, the one for your pfSense WAN). But, as the bad news tells us : every ISP on planet earth has probably broken something (uses their own non RFC method). I'm not staying your 'static' method isn't good, Just that it is - again afaik - not standard. Btw : SLAAC : things can be done differently, I guess, I just never used it.
  • Now Available: pfSense® CE 2.8.0-RELEASE

    115
    12 Votes
    115 Posts
    44k Views
    J
    @stephenw10 Can't we just have a full install ISO again? It seems there are too many use cases where that is either the best, or only way, for us to install instead of the 'netinstaller'.
  • pfSense Plus 25.03-BETA is here!

    40
    1 Votes
    40 Posts
    12k Views
    RobbieTTR
    @chudak said in pfSense Plus 25.03-BETA is here!: Why is 25.0x taking so long this time? Because it is a really good update. ️
  • pfSense CE 2.8 Release Candidate is Here!

    10
    3 Votes
    10 Posts
    4k Views
    dennypageD
    @Sergei_Shablovsky said in pfSense CE 2.8 Release Candidate is Here!: So, as a solution You propose me just…to stop using ntopng ? Seriously ? If the unexposed redis vulnerabilities concern you, then yes, I definitely suggest that you stop using ntopng. There are likely much worse vulnerabilities, known and unknown, in ntopng itself. Running any add-on package increases risk, and ntopng is a large and complicated piece of code which brings a higher level of risk than most. Of course, you have to decide for yourself what level of risk you are willing to operate with. FWIW, as a whole I recommend use of ntopng as a diagnostic tool only. I do not recommend it as something for continual, routine operation. @Sergei_Shablovsky said in pfSense CE 2.8 Release Candidate is Here!: I clearly understand that most of this CVEs are out of Netgate’s obligation. But is this mean the current 2.8.0 would be in BETA until all of this CVEs would be resolved by developer’s community ? No. It is not practical to stop the release of pfSense because there is a vulnerability in an add-on provided by the community. pfSense itself would never release. If you want to go down that path, a much more practical approach would be for Netgate to remove the add-on from the repository until all vulnerabilities in the component and all of its dependencies were remediated. Ouch.
  • ACB Backup Time Update

    3
    2 Votes
    3 Posts
    3k Views
    F
    I updated to pfSense 2.8.0 RC the other day and noticed when I went through the settings that the time stamp in the ACB Service (Services/Auto Configuration Backup/Restore) is behind my time by 7 hours. I check my time and it is correct for time and zone in the Dashboard. I changed the time zone temporarily but the time stamp did not change in ACB but the zone did, i.e. it was +0200 for CEST and when I changed it to ETC/UTC time zone it went to +0000 but time itself did not change. This is the issue I have on 2 pfsense setups I have running at home. I did some researching and only found this reference to the issue. So, am I doing something wrong in my setups or is this a know issue for pfSense 2.8.0 RC?
  • Important Security Updates for pfSense Plus 24.11 and CE 2.7.2 Software

    3
    5 Votes
    3 Posts
    3k Views
    N
    @pfGeorge 24.03 is listed as still being a supported version (https://docs.netgate.com/pfsense/en/latest/releases/versions.html) , but the published fixes are listed as only being for 24.11 and 2.7.2. Does that mean 24.03 doesn't have this vulnerability or is 24.03 no longer supported, or patches for 24.03 are coming out later?
Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.