Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    perikoP
    @aGeekhere dns_v4_first...have years and they still don't clean the code. But won't affect.
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB
    @NRgia said in Suricata on Pfsense: @bmeeks Thank you for what you did for Snort or Suricata. I'm not sure what you want me to do on Redmine, due to is a bug tracker. My question is for Product Management, which I will ask it here to be public: What is the plan for these 2 packages, Suricata and Snort? Thank you Yes, Redmine is for both bug reports and feature requests. Asking for the Suricata binary to be updated to the latest 7.0.11 version from upstream is a legitimate Redmine request. I would suggest simply asking for the binary version update instead of asking about future Netgate strategy (such as the support plans for the packages). Strategy discussions typically don't get very far because they deal with proprietary information or plans that a company may not want to publicly discuss. Redmine is where the Netgate developer team tracks all the code changes they make for pfSense. They will see Redmine reports much quicker than a forum post.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    dennypageD
    @Leon-Straathof Data retention settings are handled inside of ntopng. Documentation here. Pay attention to the RRD note. Also, if you've turned on some of the slice and dice time series information (is off by default), I'd suggest turning them back off. These balloon the storage requirements and are of little actual use.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    keyserK
    @jrey Thank you so much for the detailed explanation and help. I will adapt and apply the patch to move the job timing like suggested at 01:35 Are you just a user or are you also involved in package maintenance on one or more packages?
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    495 Topics
    3k Posts
    M
    @raidflex said in updating to acme 1.0 breaks system beyond repair: need to restore from backup: maybe uninstall Crowdsec when applying other updates first. It seems like it doesn't help at least from what I see on my system... it changes something.. so it must be definitely reported to their github. I have never experienced that before and crowsec was installed.. maybe with 2.8.0 something have changed
  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    yon 0Y
    said in Please update frr on Pfsense+ to FRR 10.3: https://redmine.pfsense.org/issues/15785 now frr 10.4.1
  • Discussions about the Tailscale package

    90 Topics
    597 Posts
    ryan.goodfellowR
    Upgraded 25.07 and Tailscale is broken in the way users here describe. I can manually log in using sudo /usr/local/bin/tailscale login, but the tailscale service in pfSense does not pick this up and restarting the service clobbers the login state. Given 16004 was logged 7 months ago with zero activity, this is an indication that Netgate devices no longer support Tailscale.
  • Discussions about WireGuard

    693 Topics
    4k Posts
    L
    @boyan1 said in Wireguard Gateway not coming up after reboot.: W Hey man, im trying to make the SITE A use internet of SITE B as you did, but there is no means of making that works. How did you make that works? Could you tell me please? Thanks!
  • Squid smartphones issues with youtube?

    1
    0 Votes
    1 Posts
    892 Views
    No one has replied
  • 0 Votes
    2 Posts
    1k Views
    T
    I have not seen development for over a year (1.2.X pfsense).  I think the developer moved to to his own site where he develops freeswitch on stand alone machines.
  • SquidGuard Group ACL not applying; incorrect client IP address

    3
    0 Votes
    3 Posts
    5k Views
    P
    @srk3461: Is your client source is set correct !? Did you set any order pref!? Is your "Target Categories" set properly! In your "Target Rules" under "Groups ACL" did you set your desired group to "white-list"? Is your "default access" at the bottom of the same is set to "allow"!? Did you hit "save" bottom after all your configuration and then hit "apply" on general page of squid-guard!? Try clearing your browser cache before checking! I knew I forgot to hit apply; it officially works.  I double checked my configurations to see what the heck was going on; I forgot to add the LAN IP address in the whitelist. Group ACL names and source IP addresses: Ben: 10.0.0.1-10.0.0.4 (pfSense, my laptop, server, and FreeNAS) Wireless Clients: 10.0.0.1 10.0.0.5 (pfSense; Wireless Router*) not connected yet The space in between the 10.0.0.1 and 10.0.0.5 represents a separate IP address. Thanks for the info, man. Edit: When I change my laptop's IP address from 10.0.0.2 to 10.0.0.5 with every setting as the same (subnet mask, gateway, DNS1, and DNS2), the group ACL doesn't go from Ben to Wireless Clients, just stays at Ben.  What else did I do wrong?  Must be pfSense 2.1-RC0-i386 has bugs in it; I'm going to install pfSense-2.0.3-AMD64
  • Soliciting Feedback on Snort Package 2.6.x Multi-Engine Config GUI Design

    14
    0 Votes
    14 Posts
    3k Views
    E
    @adam65535: I just tested pf with defragmentation using hping from another system and pf does normalize the traffic before sending it out.  It actually normalizes the traffic before tcpdump can even see it.  If the packets are bad enough though and pf can not or does not reassemble them then tcpdump on pfsense does see those bad fragmented packets.  It does not send them to the destination of course. I can only assume snort has an input point into the network at a lower level than tcpdump so that it can see the raw fragment packets at all times but I do not know. It seems like we should always use BSD Target Type with frag3 when the admin does not disable the pfsense 'Disable Firewall Scrub' which is the default. no the scrubbing done by pfSense firewall is not related to snort. Since tpcudmp/pcap sees packets very early, before even stack has seen them.
  • Squid proxy seems to work properly but never hits..

    2
    0 Votes
    2 Posts
    3k Views
    N
    I am having the same problem with i386 pfsense 2.0.3 and squid3. It appears that the proxy is working, however I only see tcp_miss. Oddly, if an image has been missed once, it is not missed again when attempting to reload.
  • {inet} > [Squid Proxy (Parent)] > [HAVP] > {clients} 403 forbidden error

    1
    0 Votes
    1 Posts
    4k Views
    No one has replied
  • Squid3 spitting error

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Use pfsense as snort only box

    13
    0 Votes
    13 Posts
    9k Views
    ?
    @newbieuser1234: This sounds dumb,but how would I interact with the gui? what IP's would I assign on the WAN and opt.  Would the opt1 (the other side of the bridge) be the same IP as the router behind it? just a bit confused on the IP addressing. Thanks again for all your help with this. Sorry for taking so long to respond. Been a bit busy around here  ;D Interacting with the gui is done through the LAN interface. That's why I suggested "pfsense can easily be used as a transparent bridge, see http://forum.pfsense.org/index.php/topic,20917.0.html and adapt accordingly. Don't forget allow any>any on both interfaces, and DO NOT use the lan interface as a member of the bridge." pfsense works exactly the same (from a web gui USER's point of view) whether it's running as a bridge or a routing platform. As long as the LAN interface has a valid private ip and there is a rule allowing access to the webgui port, plugging something into the LAN will allow you to administer the box. The important thing to remember is that bridged interfaces have NO IPs, which means that you have to be careful with your rules (eg I have rules disallowing traffic not belonging to an interface's subnet from passing through the firewall, which wouldn't work with a bridge). A common use case for this is a fully transparent firewalling bridge, which allows for traffic control both ways of the bridge. The bonus is that the bridge is completely invisible on both sides of it (WAN/DMZ), unless you sift through each and every packet observing changes in the packet as it goes through the bridge (which no sane person will do). The LAN interface is used to monitor and administer the bridge, just like I said above. A random tip: do NOT try setting up a bridged CARP cluster without doing your research first. Back on track: pfsense box with snort plugin no ip assigned on WAN/OPT1 Bridge WAN/OPT1 and set up LAN interface with a valid private ip. webgui allow rule on LAN. Set up snort as mentioned above Enjoy :) EDIT: hit go button too soon. A few thoughts popped up in my head after posting: A fully transparent bridge should not be able to get on the internet. This means NO communications with the "outside world" which in turn means NO updates, NO snort rule updates (no ip assigned on the WAN, remember?  ;) ) A transparent bridge with internet is a bit different. If you have multiple static IPs, just assign one to the wan and proceed with bridging (yes even if it has an IP, yes I've tested a Frankenstein hybrid routing/bridged monster and it works perfectly, even LAN to OPT1 which according to documentation shouldn't work). If you don't have multiple static IPs a bit of default routes/nat will be needed. Basically since pfsense has no sense of other networks when used as a bridge, packets coming from itself will not know where to go or where they are coming from, and need a little "push" to get "out there"  :D
  • FreeSwitch: sccp or chan_sccp: Cisco 79xx / Cisco 525g2, experiences?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Package status meanings

    4
    0 Votes
    4 Posts
    2k Views
    jimpJ
    For HAproxy, the "-devel" variety is probably more like Beta. The "-full" variety needs to go away, but some people still rely on it. Its status should really be "Deprecated" or "Retired".
  • Lightsquid 403 outstanding error!

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Dansguardian - YouTube Videos with Ads not Streaming

    3
    0 Votes
    3 Posts
    5k Views
    E
    Well, as you can tell, I'm am noobie with this stuff. I've ended up adding: .c.youtube.com to the Exception Regular Expression section of the URL lists under ACL's for Dansguardian. Videos with ads on YouTube now stream. Hoping this fixes things, and I have  not ignorantly created a security risk in doing so. If anyone has any insights into this, let me know. Cheers, Paul.
  • [SOLVED] squid does not start, missing "libgssapi.so.10"

    4
    0 Votes
    4 Posts
    2k Views
    Z
    This proble with squid start is solved after I upgraded to pfSense 2.1-RC0 build from 20130622 (http://snapshots.pfsense.org/FreeBSD_RELENG_8_3/i386/pfSense_RELENG_2_1/updates/pfSense-Full-Update-2.1-RC0-i386-20130622-1453.tgz).
  • SQUID + JAVA PROBLEM

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Squidguard3 fails to install and gb nics are shown 100mbits only

    4
    0 Votes
    4 Posts
    2k Views
    Z
    @Tikimotel: I have a dual em NIC. I've set my LAN/WAN (under the advanced button) "Speed and duplex" settings to "Default (no preference, typically autoselect)". Yep, 'Default' was what was originally selected, I tried to change only when it didn't work. I defauted back and still no go! Pressing save in the WAN/LAN menu saves some changes regarding DHCPv4 vs. DHCPv6 in the overall config of pfSense, which helps when the interface goes down and backup (If i remember correctly). So this should solve your WAN dropping and only getting back after a reboot. I have no IPV6 enabled. I changed back to 'Defualt' and saved and rebooted, yet the internet keeps on dying (but WAN interface appears to be active).
  • [SOLVED] Zabbix 2.x + pfSense 2.1RC + CPU Temperature

    4
    0 Votes
    4 Posts
    3k Views
    S
    cheers for this dude.. just helped me
  • PfJailctl

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Squid - 3.3.5 not working?

    19
    0 Votes
    19 Posts
    14k Views
    D
    Right well a reboot of the firewall sorted out the problem. Have to say I didn't get along with squid. I found the performance tweaks here on the forum and through google.  Still not good IMO. Pages were taking too long to load, youtube (and other sites) videos were also affected slightly even though I hadn't turned on dynamic caching. So I have un-installed squid for now.  I might create a stand alone squid server at some point but who knows. Thanks for your time mate :)
  • Using Squid as a Transparent Proxy! Have I done it right?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort 2.9.4.6 Pkg v 2.5.9 - New Feature Screenshots and Explanation

    5
    0 Votes
    5 Posts
    3k Views
    bmeeksB
    Snort 2.9.4.6 Pkg ver 2.5.9 Auto-Add Suppression Rules for Track By Source or Track By Destination from Alerts tab Additional icons will now show up on the Alerts tab under the SRC and DST columns for displayed alerts.  A plus (+) icon will appear under an IP address in the SRC or DST columns.  Clicking the plus (+) icon will automatically add the IP to the Suppress List for the interface using the "track by src ip" or "track by dst ip " form.  If the IP address is already present in the Suppress List, then a disabled icon will be displayed. This gives you three ways to suppress alerts.  By SRC IP, by DST IP, or by GID:SID.  The third method (by GID:SID) is global in that it will suppress the alert regardless of source or destination.  For this reason, when a global suppress list entry containing only the GID:SID with no other qualifiers is present, then no plus (+) icon will displayed for that alert under the SRC or DST columns.  This is because in the case of a globally suppressed alert, the IP addresses are irrelevant. Note also in the screen shot below that (X) icons are also displayed.  These have been available for quite some time in the GUI.  When present, they indicate the IP address is currently being blocked.  Clicking the (X) icon will remove the IP address from the blocking table. [image: NewAlertsOptions.jpg] [image: NewAlertsOptions.jpg_thumb]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.