Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    N

    Can I use pgblockerng aliases in Haproxy?

    80758505-9bad-4dad-a80b-c159be1045a2-image.png

    If it was a firewall rule, typing pfb would produce a dropdown to select.

    Here it has to be written, but will it work? Is it supported?

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB

    I saw where the Netgate kernel developer updated the Suricata package in the pfSense 25.07 development branch to work with the new kernel PPPoE driver. But so far as I know that updated package has not been migrated to 2.8 CE.

    Here is the commit into the DEVEL branch: https://github.com/pfsense/FreeBSD-ports/commit/68a06b3a33c690042b61fb4ccfe96f3138e83b72.

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    M

    @Laxarus This worked for me as well. Though I had to search the web how to edit the file (the easiest way).

    Therefore:

    Addition for anyone struggling to find where to edit files on your pfsense system.

    Go to Diagnostics --> Edit File --> insert the location of the file:

    /usr/local/pkg/pfblockerng/pfblockerng.sh

    Go to line number 1232 by filling it in the Go to line field.

    That line should read:

    s1="$(grep -cv ^${ip_placeholder2}$ ${masterfile})"

    replace only (leave the rest intact):

    masterfile

    to

    mastercat

    Then follow the above instructions from @Laxarus https://forum.netgate.com/post/1219635

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    99 Topics
    2k Posts
    K

    @elvisimprsntr thanks for your suggestion. I will give it a try.

  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    johnpozJ

    @MacUsers

    https://help.zerossl.com/hc/en-us/articles/360060119933-Certificate-Revocation

    edit: oh you prob out of luck

    You can revoke any certificate issued via the ZeroSSL portal. Currently, certificates issued via ACME can not be revoked from inside the portal - please follow the instructions of your ACME client for revoking those certificates.

    the gui in pfsense does not have the ability to revoke - you prob have to move the certs to something you have certbot installed to and revoke that way.

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    R

    I had a similar issue with Routed VTI over IPsec recently. FRR lost its neighbors after rebooting or when a tunnel went down. It never re-discovered it automatically. Only restarting FRR (either in GUI or via CLI) brought the neighbors back.

    When I manually added those under the OSPF neighbors tab in the GUI it seems to solve the problem as well.

  • Discussions about the Tailscale package

    88 Topics
    572 Posts
    A

    We have a very basic configuration between three locations. All are running Netgate firewalls (1x 4100, 1x 6100 & 1x 4200). All are on the latest firmware (03.00.00.01-2Ct-uc-15) and system versions (24.11-RELEASE).

    The local subnets are as follows:
    4100 - 192.168.5.0/24
    4200 - 192.168.4.0/24
    6100 - 192.168.1.0/24

    The VPN traffic between the 4100 and 4200 is functioning 100% as expected

    The traffic between 6100 and the 4100 works going from the 4100 subnet (192.168.5.0/24) to the 6100 subnet (192.168.1.0/24)

    Traffic from the firewall (i.e. the 6100 device) to the 4100 subnet works (i.e. I can ping any device on the 192.168.5.0/24 subnet from the 6100 firewall) but I cannot ping any device on the 4100 (192.168.5.0/24) subnet from any device on the 6100 subnet (192.168.1.0/24) - other than from the firewall itself.

    All routes are correct, but it seems that traffic from the 192.168.1.0/24 subnet hits the firewall and then gets lost - traceroute shows that it goes off into the internet.

    Note too that the 6100 has IPsec VPN configured on it as well

    Suggestions would be appreciated

    Attached is a zipped pdf file with the relevant screenshots
    Relevant screen shots.zip

  • Discussions about WireGuard

    689 Topics
    4k Posts
    P

    @patient0 Thanks for further suggestions. The tunnel is definitely up and so I don't think this is a CGNAT issue after all. WAN firewall rule is in place for UDP on port 51823 (otherwise the tunnel wouldn't work, right?). I can ping from client 1 -> client 2 and visa versa and also ping all points in between like you suggest. I just can't open an HTTPS connection from pfSenseB from Client 1 using a browser. But I can do this the other way round i.e. from Client 2 to pfSenseA

    I will try and do some packet capture to see if that reveals anything.

  • HAVP error page

    2
    0 Votes
    2 Posts
    975 Views
    T

    nicely done. Thank you.

    It works also.. well looks ok.. not having ClamAV running yet in 2.2rc

  • Snort whitelist IP's not working, what I my doing wrong?

    25
    0 Votes
    25 Posts
    7k Views
    P

    I also observed that most (now I am even starting to think maybe ALL) sites are generating portscans but why, that remains a mystery to me..  What I ended up doing was to lower the preproc setting sensitivity to low on the snort interface, then allow a "running-in" period where I try to visit as many sites as I usually visit and let my systems contact whatever web services they need, then when an alert is generated I add it to an alias that I assigned to Snort's interfaces…

    May not be the best but it works.  All I need now is a real attack from one of those "legit and trusted" sites and snort wont pick it up..

    Perfection doesnt exist I guess...

    This page also helped me a lot:

    http://manual.snort.org/node85.html

    Thanks Bill for your help once again!

  • MOVED: Postfix on 2.2

    Locked
    1
    0 Votes
    1 Posts
    562 Views
    No one has replied
  • 0 Votes
    1 Posts
    731 Views
    No one has replied
  • Suricata 2.0.4 fails to install

    13
    0 Votes
    13 Posts
    3k Views
    B

    Confirmed, everything runnin' now.

    Thanks again for the fast response and fix!

  • PfSense 2.1.5 + Zabbix Proxy 2.2.5 = not working?

    5
    0 Votes
    5 Posts
    2k Views
    D

    @gamefreaktegel:

    Is there a solution for this issue?
    I have a similar problem that after upgrading from 2.1.3 to 2.1.5 the Zabbix Agent on the pfSense is not working. Removing and Reinstall does not solve the issue.

    This thread is about Zabbix Proxy.

    What pfSense version are you running?
    Could you share your zabbix agent logs and your config?

    Thanks

  • Suricata 2.0.4 pkg v2.1.2 – Bug Fix Update Release Notes

    1
    0 Votes
    1 Posts
    582 Views
    No one has replied
  • Problems Configuring Squid3 for Redirects

    13
    0 Votes
    13 Posts
    3k Views
    K

    All is working fine now. As you suggested I deleted the 1:1 NAT for the Webmail site and changed the rule to point to the public IP instead of the private IP.

    Thank you for you help.

  • LightSquid Graph Report 500 error

    2
    0 Votes
    2 Posts
    902 Views
    K

    I was able to resolve the 500 error by uninstalling the conflicting Perl version 5.14.4 when installing the latest 5p-GD files which is using Perl 5.16 version

  • Long Term Solution for bind and "journal rollforward failed" ?

    1
    1 Votes
    1 Posts
    2k Views
    No one has replied
  • Avahi doesn't load service files.

    1
    0 Votes
    1 Posts
    752 Views
    No one has replied
  • Snort Unknown rule option: 'ssl_version'.

    10
    0 Votes
    10 Posts
    3k Views
    bmeeksB

    @Supermule:

    Did the same and the SSL Preproc came back online no issues.

    Glad it fixed yours as well.  Might be an issue of looking for "on" versus "enabled" in the code when checking if the preprocessor should be on or off.  I will investigate it further.

    Bill

  • Cannot remove squid

    8
    0 Votes
    8 Posts
    2k Views
    M

    Arhh, the Microsoft way 8)

  • Installing suricata never installs web menu

    7
    0 Votes
    7 Posts
    1k Views
    R

    Update: Upgraded to 2.2, and Suricata installs just fine. Thanks again.
    –------------

    Thanks for you insights. I went to Diagnostics > Tables, and there were no entries in the snort2c tables. So ...nothing to clean out.

    I bought the kit from netgate, but didn't choose for them to do my install. Been using pfsense since 2010 (just before 1.2.3 releases), so I thought that doing the installation myself wasn't too bad. Successful clean install for sure.

    What i'll try next is doing an uninstall (completely) (not a reinstall). Then checking those tables (snort2c), and clearing them if possible. I might go as far as a re-install with the memstick method, but choosing a regular installation (not embedded kernel), and give the package a go again.

    Thank you again for looking into this.

  • Unbound package 1.5.1_2 issue

    4
    0 Votes
    4 Posts
    1k Views
    M

    Thank you very much for your prompt response, Renato! Deleting unbound 1.5.1_2 and installing 1.5.1_2_1 makes unbound work again on all four servers. Regards, Michael

  • Country Blocker no supported on 2.1.5?

    3
    0 Votes
    3 Posts
    985 Views
    W

    The upcoming pfBlockerNG package could be your answer. :)

  • FreeRADIUS - pfsense user privileges

    1
    0 Votes
    1 Posts
    841 Views
    No one has replied
  • Snort fatal error on start

    63
    0 Votes
    63 Posts
    15k Views
    bmeeksB

    @amiracle:

    I found that if you disable the HTTP Inspect component, that ignores the IIS Unicode map and starts Snort without issue.

    Here's how you disable it: Snort Interface -> Edit your Interface, (mine is named WAN)-> Select the <wan>Preprocs tab, navigate to the HTTP Inspect section and UNCHECK it. That will allow your snort IDS to start back up without issue.

    I'm running pfSense 2.1.5 with Snort 2.9.7.0 pkg v.3.2.1 on a 4GB CF Card.

    Additional Troubleshooting:
    I tried to just limit the webservers in the HTTP Inspect section to just inspect an Apache Web server, and ignore IIS completely.  That did not work and it just failed again, so I just disabled the HTTP inspect section entirely.

    Error Messages:
    After enabling Snort via the WebUI, I received the following error message -

    Dec 21 23:29:57 my.pfsensefirewall.com Dec 21 23:30:00 snort[99416]: FATAL ERROR: /usr/pbi/snort-amd64/etc/snort/snort_xxxx_em0/snort.conf(166) => Did not find specified IIS Unicode codemap in the specified IIS Unicode Map file. ```</wan>

    You are going to experience more issues with disabling the HTTP_INSPECT preprocessor.  Snort and Suricata are becoming too "big" to install and update reliably on Nano installs of pfSense.  I strongly encourage Snort and Suricata users to stick with full installs on either conventional hard disks or SSD.  Both packages need plenty of free disk space to work (and free RAM).

    Bill

  • Stunnel client config in GUI.

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort on vpn connections??

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB

    You may get additional preprocessor or decoder alerts due to the packet structure.  Just add suppress list entries for those.

    Bill

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.