Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    N

    Can I use pgblockerng aliases in Haproxy?

    80758505-9bad-4dad-a80b-c159be1045a2-image.png

    If it was a firewall rule, typing pfb would produce a dropdown to select.

    Here it has to be written, but will it work? Is it supported?

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    cyb3rtr0nianC

    @bmeeks So after upgrading to the newest PfSense 2.8.0 everything is now working like a charm!

    Suricata no longer seems to strip off tags like it did before! Which means I can now use my network segmented by VLANs and still use the benefits of Suricata Inline IPS! Very niiize!

    I checked in the Alerts section and it is indeed generating the correct alerts from the different VLAN sections, I put Inline IPS on the parent interface of all the VLANs.

    I assume this is because the FreeBSD version is also updated with the new PfSense 2.8.0 version?

    Because before, as soon as I selected Inline IPS mode, my entire VLAN tagging would break and nothing was reachable until I switched back to Legacy mode.

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    reza3swR

    @Gertjan
    Hello,
    Thank you.
    I had exactly the same issue, and your solution helped me fix it.

    Ask ChatGPT

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    J

    @dennypage Here it is, complete (rather long)

    [2.8.0-RELEASE][admin@janus.jhmg.pvt]/root: pkg info | grep nut nut-2.8.2 Network UPS Tools pfSense-pkg-nut-2.8.2_5 Network UPS Tools

    Here's what Package Manager has:

    nut-pkg-manager.png

    [2.8.0-RELEASE][admin@janus.jhmg.pvt]/root: usbconfig dump_all_desc ugen0.1: <Intel XHCI root HUB> at usbus0, cfg=0 md=HOST spd=SUPER (5.0Gbps) pwr=SAVE (0mA) bLength = 0x0012 bDescriptorType = 0x0001 bcdUSB = 0x0300 bDeviceClass = 0x0009 <HUB> bDeviceSubClass = 0x0000 bDeviceProtocol = 0x0003 bMaxPacketSize0 = 0x0009 idVendor = 0x0000 idProduct = 0x0000 bcdDevice = 0x0100 iManufacturer = 0x0001 <Intel> iProduct = 0x0002 <XHCI root HUB> iSerialNumber = 0x0000 <no string> bNumConfigurations = 0x0001 Configuration index 0 bLength = 0x0009 bDescriptorType = 0x0002 wTotalLength = 0x001f bNumInterfaces = 0x0001 bConfigurationValue = 0x0001 iConfiguration = 0x0000 <no string> bmAttributes = 0x0040 bMaxPower = 0x0000 Interface 0 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0000 bAlternateSetting = 0x0000 bNumEndpoints = 0x0001 bInterfaceClass = 0x0009 <HUB> bInterfaceSubClass = 0x0000 bInterfaceProtocol = 0x0000 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0081 <IN> bmAttributes = 0x0003 <INTERRUPT> wMaxPacketSize = 0x0002 bInterval = 0x00ff bRefresh = 0x0000 bSynchAddress = 0x0000 Additional Descriptor bLength = 0x06 bDescriptorType = 0x30 bDescriptorSubType = 0x00 RAW dump: 0x00 | 0x06, 0x30, 0x00, 0x00, 0x00, 0x00 ugen0.2: <Hub Terminus Technology Inc.> at usbus0, cfg=0 md=HOST spd=HIGH (480Mbps) pwr=SAVE (100mA) bLength = 0x0012 bDescriptorType = 0x0001 bcdUSB = 0x0200 bDeviceClass = 0x0009 <HUB> bDeviceSubClass = 0x0000 bDeviceProtocol = 0x0001 bMaxPacketSize0 = 0x0040 idVendor = 0x1a40 idProduct = 0x0101 bcdDevice = 0x0111 iManufacturer = 0x0000 <no string> iProduct = 0x0001 <USB 2.0 Hub> iSerialNumber = 0x0000 <no string> bNumConfigurations = 0x0001 Configuration index 0 bLength = 0x0009 bDescriptorType = 0x0002 wTotalLength = 0x0019 bNumInterfaces = 0x0001 bConfigurationValue = 0x0001 iConfiguration = 0x0000 <no string> bmAttributes = 0x00e0 bMaxPower = 0x0032 Interface 0 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0000 bAlternateSetting = 0x0000 bNumEndpoints = 0x0001 bInterfaceClass = 0x0009 <HUB> bInterfaceSubClass = 0x0000 bInterfaceProtocol = 0x0000 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0081 <IN> bmAttributes = 0x0003 <INTERRUPT> wMaxPacketSize = 0x0001 bInterval = 0x000c bRefresh = 0x0000 bSynchAddress = 0x0000 ugen0.3: <Dell MS116 Optical Mouse Dell Computer Corp.> at usbus0, cfg=0 md=HOST spd=LOW (1.5Mbps) pwr=ON (100mA) bLength = 0x0012 bDescriptorType = 0x0001 bcdUSB = 0x0200 bDeviceClass = 0x0000 <Probed by interface class> bDeviceSubClass = 0x0000 bDeviceProtocol = 0x0000 bMaxPacketSize0 = 0x0008 idVendor = 0x413c idProduct = 0x301a bcdDevice = 0x0100 iManufacturer = 0x0001 <PixArt> iProduct = 0x0002 <Dell MS116 USB Optical Mouse> iSerialNumber = 0x0000 <no string> bNumConfigurations = 0x0001 Configuration index 0 bLength = 0x0009 bDescriptorType = 0x0002 wTotalLength = 0x0022 bNumInterfaces = 0x0001 bConfigurationValue = 0x0001 iConfiguration = 0x0000 <no string> bmAttributes = 0x00a0 bMaxPower = 0x0032 Interface 0 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0000 bAlternateSetting = 0x0000 bNumEndpoints = 0x0001 bInterfaceClass = 0x0003 <HID device> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0002 iInterface = 0x0000 <no string> Additional Descriptor bLength = 0x09 bDescriptorType = 0x21 bDescriptorSubType = 0x11 RAW dump: 0x00 | 0x09, 0x21, 0x11, 0x01, 0x00, 0x01, 0x22, 0x2e, 0x08 | 0x00 Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0081 <IN> bmAttributes = 0x0003 <INTERRUPT> wMaxPacketSize = 0x0004 bInterval = 0x000a bRefresh = 0x0000 bSynchAddress = 0x0000 ugen0.4: <Multimedia Keyboard Lite-On Technology Corp.> at usbus0, cfg=0 md=HOST spd=LOW (1.5Mbps) pwr=ON (100mA) bLength = 0x0012 bDescriptorType = 0x0001 bcdUSB = 0x0110 bDeviceClass = 0x0000 <Probed by interface class> bDeviceSubClass = 0x0000 bDeviceProtocol = 0x0000 bMaxPacketSize0 = 0x0008 idVendor = 0x04ca idProduct = 0x003a bcdDevice = 0x0115 iManufacturer = 0x0001 <Lite-On Technology Corp.> iProduct = 0x0002 <USB Multimedia Keyboard> iSerialNumber = 0x0000 <no string> bNumConfigurations = 0x0001 Configuration index 0 bLength = 0x0009 bDescriptorType = 0x0002 wTotalLength = 0x003b bNumInterfaces = 0x0002 bConfigurationValue = 0x0001 iConfiguration = 0x0000 <no string> bmAttributes = 0x00a0 bMaxPower = 0x0032 Interface 0 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0000 bAlternateSetting = 0x0000 bNumEndpoints = 0x0001 bInterfaceClass = 0x0003 <HID device> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Additional Descriptor bLength = 0x09 bDescriptorType = 0x21 bDescriptorSubType = 0x10 RAW dump: 0x00 | 0x09, 0x21, 0x10, 0x01, 0x00, 0x01, 0x22, 0x41, 0x08 | 0x00 Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0081 <IN> bmAttributes = 0x0003 <INTERRUPT> wMaxPacketSize = 0x0008 bInterval = 0x000a bRefresh = 0x0000 bSynchAddress = 0x0000 Interface 1 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0001 bAlternateSetting = 0x0000 bNumEndpoints = 0x0001 bInterfaceClass = 0x0003 <HID device> bInterfaceSubClass = 0x0000 bInterfaceProtocol = 0x0000 iInterface = 0x0000 <no string> Additional Descriptor bLength = 0x09 bDescriptorType = 0x21 bDescriptorSubType = 0x10 RAW dump: 0x00 | 0x09, 0x21, 0x10, 0x01, 0x00, 0x01, 0x22, 0x4e, 0x08 | 0x00 Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0082 <IN> bmAttributes = 0x0003 <INTERRUPT> wMaxPacketSize = 0x0008 bInterval = 0x000a bRefresh = 0x0000 bSynchAddress = 0x0000 ugen0.5: <PR1500LCDRT2U UPS Cyber Power System, Inc.> at usbus0, cfg=0 md=HOST spd=FULL (12Mbps) pwr=ON (2mA) bLength = 0x0012 bDescriptorType = 0x0001 bcdUSB = 0x0200 bDeviceClass = 0x0000 <Probed by interface class> bDeviceSubClass = 0x0000 bDeviceProtocol = 0x0000 bMaxPacketSize0 = 0x0040 idVendor = 0x0764 idProduct = 0x0601 bcdDevice = 0x0200 iManufacturer = 0x0003 <CPS> iProduct = 0x0001 <CP1500PFCLCDa> iSerialNumber = 0x0002 <CXXJV2014210> bNumConfigurations = 0x0001 Configuration index 0 bLength = 0x0009 bDescriptorType = 0x0002 wTotalLength = 0x0029 bNumInterfaces = 0x0001 bConfigurationValue = 0x0001 iConfiguration = 0x0000 <no string> bmAttributes = 0x00c0 bMaxPower = 0x0001 Interface 0 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0000 bAlternateSetting = 0x0000 bNumEndpoints = 0x0002 bInterfaceClass = 0x0003 <HID device> bInterfaceSubClass = 0x0000 bInterfaceProtocol = 0x0000 iInterface = 0x0000 <no string> Additional Descriptor bLength = 0x09 bDescriptorType = 0x21 bDescriptorSubType = 0x10 RAW dump: 0x00 | 0x09, 0x21, 0x10, 0x01, 0x21, 0x01, 0x22, 0xd1, 0x08 | 0x02 Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0081 <IN> bmAttributes = 0x0003 <INTERRUPT> wMaxPacketSize = 0x0040 bInterval = 0x000a bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0002 <OUT> bmAttributes = 0x0003 <INTERRUPT> wMaxPacketSize = 0x0040 bInterval = 0x0014 bRefresh = 0x0000 bSynchAddress = 0x0000 ugen0.6: <AX201 Bluetooth Intel Corp.> at usbus0, cfg=0 md=HOST spd=FULL (12Mbps) pwr=ON (100mA) bLength = 0x0012 bDescriptorType = 0x0001 bcdUSB = 0x0201 bDeviceClass = 0x00e0 <Wireless controller> bDeviceSubClass = 0x0001 bDeviceProtocol = 0x0001 bMaxPacketSize0 = 0x0040 idVendor = 0x8087 idProduct = 0x0026 bcdDevice = 0x0002 iManufacturer = 0x0000 <no string> iProduct = 0x0000 <no string> iSerialNumber = 0x0000 <no string> bNumConfigurations = 0x0001 Configuration index 0 bLength = 0x0009 bDescriptorType = 0x0002 wTotalLength = 0x00c8 bNumInterfaces = 0x0002 bConfigurationValue = 0x0001 iConfiguration = 0x0000 <no string> bmAttributes = 0x00e0 bMaxPower = 0x0032 Interface 0 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0000 bAlternateSetting = 0x0000 bNumEndpoints = 0x0003 bInterfaceClass = 0x00e0 <Wireless controller> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0081 <IN> bmAttributes = 0x0003 <INTERRUPT> wMaxPacketSize = 0x0040 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0002 <OUT> bmAttributes = 0x0002 <BULK> wMaxPacketSize = 0x0040 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 2 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0082 <IN> bmAttributes = 0x0002 <BULK> wMaxPacketSize = 0x0040 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Interface 1 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0001 bAlternateSetting = 0x0000 bNumEndpoints = 0x0002 bInterfaceClass = 0x00e0 <Wireless controller> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0003 <OUT> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0000 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0083 <IN> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0000 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Interface 1 Alt 1 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0001 bAlternateSetting = 0x0001 bNumEndpoints = 0x0002 bInterfaceClass = 0x00e0 <Wireless controller> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0003 <OUT> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0009 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0083 <IN> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0009 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Interface 1 Alt 2 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0001 bAlternateSetting = 0x0002 bNumEndpoints = 0x0002 bInterfaceClass = 0x00e0 <Wireless controller> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0003 <OUT> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0011 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0083 <IN> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0011 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Interface 1 Alt 3 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0001 bAlternateSetting = 0x0003 bNumEndpoints = 0x0002 bInterfaceClass = 0x00e0 <Wireless controller> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0003 <OUT> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0019 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0083 <IN> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0019 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Interface 1 Alt 4 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0001 bAlternateSetting = 0x0004 bNumEndpoints = 0x0002 bInterfaceClass = 0x00e0 <Wireless controller> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0003 <OUT> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0021 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0083 <IN> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0021 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Interface 1 Alt 5 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0001 bAlternateSetting = 0x0005 bNumEndpoints = 0x0002 bInterfaceClass = 0x00e0 <Wireless controller> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0003 <OUT> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0031 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0083 <IN> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x0031 bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Interface 1 Alt 6 bLength = 0x0009 bDescriptorType = 0x0004 bInterfaceNumber = 0x0001 bAlternateSetting = 0x0006 bNumEndpoints = 0x0002 bInterfaceClass = 0x00e0 <Wireless controller> bInterfaceSubClass = 0x0001 bInterfaceProtocol = 0x0001 iInterface = 0x0000 <no string> Endpoint 0 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0003 <OUT> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x003f bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000 Endpoint 1 bLength = 0x0007 bDescriptorType = 0x0005 bEndpointAddress = 0x0083 <IN> bmAttributes = 0x0001 <ISOCHRONOUS> wMaxPacketSize = 0x003f bInterval = 0x0001 bRefresh = 0x0000 bSynchAddress = 0x0000
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    GertjanG

    @EChondo

    What's your pfSense version ?
    The instructions are shown here :

    1acdc586-cb29-4148-9e36-81ade4e5e60c-image.png

    A restart of a service will start by re creating their config files. If a certificate changed, it will get included. When the process starts, it will use the new certificate.

    @EChondo said in Issue with ACME Certificates Refresh & Restarting HAProxy:

    I haven't been able to confirm if the above works(mine just renewed, don't feel like doing it again just to test), so we'll see in 60 days I guess.

    No need to wait x days.
    You can re test / renew right away, as you are 'allowed' to renew a couple (5 max ?) of times per week.

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    R

    I had a similar issue with Routed VTI over IPsec recently. FRR lost its neighbors after rebooting or when a tunnel went down. It never re-discovered it automatically. Only restarting FRR (either in GUI or via CLI) brought the neighbors back.

    When I manually added those under the OSPF neighbors tab in the GUI it seems to solve the problem as well.

  • Discussions about the Tailscale package

    89 Topics
    574 Posts
    A

    Hello,
    I am unable to get the Tailscale package to work. The page at VPN > Tailscale > Authentication is stuck. It displays the error "Tailscale is not online," but also shows a "Logout and Clean" button, with no option to log in.
    link text

    This state persists even after performing the following troubleshooting steps:

    Rebooting the pfSense router.

    Completely uninstalling and reinstalling the Tailscale package multiple times.

    Clearing browser cache and using a private browser window.

    Toggling the main "Enable Tailscale" checkbox in the settings.

    Checking the logs, which show the service gets a "terminate" signal and shuts down cleanly; it does not crash.

    Manually trying to delete the state file with rm /var/db/tailscale/tailscaled.state, which failed because the file does not exist.

    It appears that the package's configuration is corrupted in a way that persists even after reinstallation. Can anyone advise on how to perform a complete manual cleanup of all Tailscale files and settings?

  • Discussions about WireGuard

    690 Topics
    4k Posts
    J

    I've read through some other posts about this, but they either didn't say whether the proposed solution worked or they were very convoluted and difficult to understand. Here is our scenario: We have 6 locations--Las Cruces (LC), Sunland Park (SP), El Paso (EP), Abilene (ABI), Fort Worth (FW), and Plano (PL). LC and ABI have software that is accessed by the other 4 locations via VPN. There are WireGuard VPNs set up between LC and those 4 locations (SP, EP, FW, PL), and ABI and those 4 locations (SP, EP, FW, PL). There is also a WireGuard VPN connection between LC and ABI. LC and ABI have 2 internet connections. SP, EP, FW, and PL each have one internet connection.

    If the primary internet connection goes down at either LC or ABI and failover occurs to the secondary internet connection, is there a way to set up the WireGuard VPN connections so that they also failover without purchasing some 3rd party application?

    Thanks.

  • Squidguard Auto Blacklist Updating

    6
    0 Votes
    6 Posts
    3k Views
    C

    "if I am not completly wrong your cron job updates the blacklist every 10min" : i know, it was just for test with update blacklist.
    First time, when i installed pfsense 2.1 , i choose squid3 et squidguard for squid3 but i had many problemes (impossible reload of squid or squidguard for example). I installed and uninstalled them , reinstalled but i always had problems with them. This the reason i chose v2.02 and upgrade v2.1.

    I don't understand why squidGuard_blacklist_update.sh don't work completely with my version 2.02 and work with 2.1 without I do anything more

    best regards

  • Squid continuously ask me the upstream proxy password…

    1
    0 Votes
    1 Posts
    922 Views
    No one has replied
  • Apinger / openvpn nanobsd 2.1

    1
    0 Votes
    1 Posts
    761 Views
    No one has replied
  • Snort: edit ftp preprocessor configuration

    13
    0 Votes
    13 Posts
    5k Views
    D

    Bill thanks for your help.

    Yes I've checked the configuration file too. But now I think it's my bad. Sorry. Snort is running on WAN and DMZ interface. All my playing around with the FTP preprocessor setting I have done on the WAN interface, not thinking about that maybe I have to do this also on the DMZ interface. The Block list didn't gave me any infromation from which interface the block was set.

    I have now disables on both interfaces the FTP preprocessor and insert the custum setting on the bottom of the first side ON BOTH interfaces. Now I'm waiting for the result and will inform you shortly. Sorry again - my bad.

    best regards
    Frank

  • NRPE Monitoring CARP Status?

    2
    0 Votes
    2 Posts
    2k Views
    M

    I believe I ended up finding a solution.  I found a third-party bash script called check_carp_if that checks output of ifconfig to see if the VIPs are set as master or backup.  I added it to the /usr/pbi/nrpe-i386/libexec/nagios folder, made a couple of modifications to it to fix some broken paths, and voila, I now have an nrpe check that tells me for each box whether the VIPs are master/slave.

    I would have liked for this to be a module that was already built-in to the NRPE package so that I could minimize what needs to be done if I have to restore from backups to a new pfsense box, but c'est la vie.

  • Bug: Package Quagga_OSPF: startup after pfSense boot failed

    3
    0 Votes
    3 Posts
    2k Views
    R

    mmh, sorry. Our firewalls are running weeks/months without reboot since 2.1 is out and some reconfiguring is done…
    So I must see when I can help with more debugging... Do you have special logs for such case?

    I checked for ospf / zebra entries and found only these ones:

    /var/log/routing.log:
    Dec  4 12:53:55 fw2 ospfd[16271]: nsm_change_state(192.168.6.2, Loading -> Full): scheduling new router-LSA origination
    Dec  4 12:53:56 fw2 ospfd[16271]: DR-Election[1st]: Backup 192.168.6.12
    Dec  4 12:53:56 fw2 ospfd[16271]: DR-Election[1st]: DR    192.168.6.2
    Dec  8 11:17:15 fw2 zebra[23085]: Zebra 0.99.22.3 starting: vty@2601
    Dec  8 11:17:15 fw2 ospfd[23308]: ASBR[Status:1]: Update
    Dec  8 11:17:15 fw2 ospfd[23308]: ASBR[Status:2]: Update
    Dec  8 11:17:15 fw2 ospfd[23308]: ASBR[Status:2]: Already ASBR
    Dec  8 11:17:15 fw2 ospfd[23382]: OSPFd 0.99.22.3 starting: vty@2604
    Dec  8 11:17:15 fw2 zebra[23085]: client 17 says hello and bids fair to announce only ospf routes

    Firewall was rebootet

    /var/log/system.log:
    Dec  8 11:05:13 fw2 syslogd: kernel boot file is /boot/kernel/kernel
    Dec  8 11:05:13 fw2 syslogd: sendto: Network is unreachable

    Dec  8 11:05:14 fw2 kernel: ifa_del_loopback_route: deletion failed
    Dec  8 11:05:14 fw2 kernel: ifa_add_loopback_route: insertion failed
    ... many of such del/add failures...
    ...
    Dec  8 11:05:27 fw2 php: rc.start_packages: Restarting/Starting all packages.
    Dec  8 11:05:31 fw2 php: rc.start_packages: XML error: SYSTEM or PUBLIC, the URI is missing at line 1 in /usr/local/pkg/iftop.xml
    Dec  8 11:05:31 fw2 php: rc.start_packages: XML error: SYSTEM or PUBLIC, the URI is missing at line 1 in /usr/local/pkg/iftop.xml
    Dec  8 11:05:33 fw2 php: rc.start_packages: XML error: SYSTEM or PUBLIC, the URI is missing at line 1 in /usr/local/pkg/ipmitool.xml
    Dec  8 11:05:33 fw2 php: rc.start_packages: XML error: SYSTEM or PUBLIC, the URI is missing at line 1 in /usr/local/pkg/ipmitool.xml
    Dec  8 11:05:37 fw2 php: rc.start_packages: [Squid] - Squid_resync function call pr: bp:1 rpc:no
    Dec  8 11:05:38 fw2 check_reload_status: updating dyndns WAN_TDSLGW
    Dec  8 11:05:38 fw2 check_reload_status: Restarting ipsec tunnels
    Dec  8 11:05:38 fw2 check_reload_status: Restarting OpenVPN tunnels/interfaces
    Dec  8 11:05:38 fw2 check_reload_status: Reloading filter
    Dec  8 11:05:38 fw2 check_reload_status: updating dyndns IPSec
    Dec  8 11:05:38 fw2 check_reload_status: Restarting OpenVPN tunnels/interfaces

    Dec  8 11:11:40 fw2 php: rc.start_packages: Restarting/Starting all packages.
    Dec  8 11:11:44 fw2 php: rc.start_packages: XML error: SYSTEM or PUBLIC, the URI is missing at line 1 in /usr/local/pkg/iftop.xml
    Dec  8 11:11:44 fw2 php: rc.start_packages: XML error: SYSTEM or PUBLIC, the URI is missing at line 1 in /usr/local/pkg/iftop.xml
    Dec  8 11:11:46 fw2 php: rc.start_packages: XML error: SYSTEM or PUBLIC, the URI is missing at line 1 in /usr/local/pkg/ipmitool.xml
    Dec  8 11:11:46 fw2 php: rc.start_packages: XML error: SYSTEM or PUBLIC, the URI is missing at line 1 in /usr/local/pkg/ipmitool.xml
    Dec  8 11:11:50 fw2 php: rc.start_packages: [Squid] - Squid_resync function call pr: bp:1 rpc:no

  • No packages?

    3
    0 Votes
    3 Posts
    908 Views
    jimpJ

    Your platform is still "cdrom". If you installed, you didn't eject the CD from the VM or adjust the boot order so that the HDD is first.

  • Squid 2.x + Dansguardian never ending webpage

    4
    0 Votes
    4 Posts
    1k Views
    marcellocM

    @grinderfurax:

    is there a tweak to check it ?

    It's during install.

    Or you can try this by you own risk

    1. Boot server with FreeBSD or pfSense livecd
    2. enable soft-updates using 'tunefs -n enable /dev/xxxx'
    3. run fsck on / partition
    4. reboot and check what you get with cmd mount on console/ssh

    -> /dev/ad0s1a on / (ufs, local, soft-updates)

  • Snort 2.9.4.6 pkg v. 2.6.1 cannot get VRT updates

    18
    0 Votes
    18 Posts
    4k Views
    bmeeksB

    @shpokas:

    "Problematic" one is fresh install :)

    Now I have discovered that symlink to /usr/local/bin/snort is gone  :-[
    But that's not all. When I execute /usr/pbi/snort-i386/.sbin/snort, nothing happens. With switches or without, just nothing. Size of the file is the same as on the other machine where snort is working.
    Time to reinstall again.
    Will be back with update  8)
    [/quote]

    That really sounds like the PBI package manager is hosed up somehow.  The new 2.1 pfSense uses PBI packages that more or less put each installed package in its own chroot environment.  This way the packages can't interfere with each other's shared libraries and such.  As you have noticed, there should be a working symlink from /usr/local/bin/snort pointing to /usr/pbi/snort-i386/.sbin/snort.  If that symlink won't properly execute the command "snort -V", then that is what is wrong with the update process.  Can also be why Snort won't start properly either.

    Bill

  • CANNOT START BARNYARD..please help me!

    12
    0 Votes
    12 Posts
    4k Views
    bmeeksB

    @sinikel:

    Yeah, I read through all of your other posts.  Would be cool if the devs made a feature to allow us to add that src IP to the firewall rules section..

    Again, thanks for all of your help!!!

    I might be able to do that from the Snort side by copying some functionality available from the Firewall Log page.  Not sure, as I have not investigated in detail; just thinking off the top of my head.

    Of course something like that might have limited usefulness because many times "bad actor host IP addresses" frequently change, so an IP block today may well be worthless tomorrow.  Or worse yet, if it was a dynamically assigned IP and now a "good guy" has it, he will be permanently blocked from your network.  Better in my view to use the automatic 1-hour clearing of Snort-blocked IPs.  You can set this on the Global Settings tab.  Right now, with the random early clearing of the block table, you may not see a true 1-hour interval, though.

    Bill

  • Varnish 3: Can't create director

    4
    0 Votes
    4 Posts
    1k Views
    marcellocM

    Sorry for the late reply. I've found the bug.
    It's fixed on 0.2.1

  • Squid 3.1.20 pkg 2.0.6 header issue?

    7
    0 Votes
    7 Posts
    3k Views
    marcellocM

    I'll include it on squi3-dev. Thanks for the feedback.

  • Postfix secure SMTP should use PFSense certs

    2
    0 Votes
    2 Posts
    1k Views
    marcellocM

    Post here your config modification.

    This way I can try to include on package gui.

  • P5-Mozilla-CA-20130114.tbz not avail on download site

    1
    0 Votes
    1 Posts
    826 Views
    No one has replied
  • Snort and Chinese attackers

    11
    0 Votes
    11 Posts
    4k Views
    ?

    Unless there are 5 zeros after a number, no government will bother with it. If tomorrow (or next week, since it's a weekend) pfsense starts selling for a 6 digit number, every single government on the entire planet will write laws requiring its use.
    Then there will be the "Security Experts" that studied "Information Systems Security" and took a couple of "Security in an Inter-connected World" seminars. Those insert a not-so-flattering comment here will come along, sign a contract for "Systems Support and Maintenance" and will take 3 years to install a patch. During those years every (as the saying here goes) dog will piss on the systems. Disclaimer: This paragraph has been an actual fact. A well known middle-East ISP, whose name shall not be mentioned, in order to protect the guilty, took 3 years to patch a damned system. In the meantime, every single username and password of every single customer was leaked on the internet. Anyone with a computer that knew how to download an exploit (ie most "hackers") was granted free access to it. Last time I checked, the list is still there.
    You can now understand why I sound so angry on these forums (usually) because I have to deal with the "Security Experts" that studied "Information Systems Security" and took a couple of "Security in an Inter-connected World" seminars, daily.
    For example last week I called a guy, which I'm sure has 20 years experience in IT. I can actually vouch,without ever talking to him before, that he is the best there is in this country. "Hi, this is ….. you talked with ..... to get a domain transfered. Have you prepared the domain for the transfer?" The 20-years-of-experience guy's response was "I don't need to prepare anything, you just initiate the transfer and I get an email to accept it." My response "no, actually the transfer will fail, unless the domain status is ACTIVE or OK. You can check it with a whois on the domain. Right now it says...clickety-click Registrar-lock. Can you please remove the transfer lock and get back to me?"
    A week later, and I'm still waiting for the "Expert" to remove a domain's transfer lock. A process which takes exactly 17 seconds to complete. sigh
    Nobody bothers with security or learning something new each day to be honest. Most "Experts" are happy to know how to turn on a system and get on fb and that's it. That actually makes them the very best there is in multiple countries, the geek-elite.
    I could go on all day, but it's getting off-topic. My apologies to the OP for going off-topic.

  • Snort Blocked Host

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB

    @jdeloach:

    Does Snort Block Hosts work?

    In Snort Interfaces, Alert settings, I have "Block offenders" checked.  Since I'm still learning my way around PfSense and it's packages, is there some other place that I need to enable something so Snort will block offenders or at least list them under the Block tab?

    I have several entries in Alerts but Blocked is always empty.

    Couple of things to check.  First, examine the IP addresses of the entries on the Alerts tab and see if they are part of any whitelist.  Snort automatically whitelists any locally-attached IP networks and the WAN interface IP and far-end gateway.  Second, it could be that the hosts are blocked but the "clearing the block table" issue discussed here frequently is removing them before you see them.  This refers to an issue that cropped up in the 2.1 release of pfSense where any thing that causes a reload of the firewall filter clears the Snort block table.  However, as has also been written about here on the Forum many times; clearing the block list is not a huge deal because the offending host will be "re-blocked" when more traffic is observed by Snort.

    Bill

  • When new snort?

    2
    0 Votes
    2 Posts
    951 Views
    bmeeksB

    @simby:

    Hi!

    when will you release new v. Snort? :)

    It is currently under review by the Core Team developers.  They have been quite busy lately with the firewall code itself I understand, so some of the package reviews have suffered as a result and they are behind.  If you want a preview of what's coming, here is the GitHub link to the Pull Request:  https://github.com/pfsense/pfsense-packages/pull/552.  This updates the Snort binary to 2.9.5.5 and adds a number of additional configuration features for the preprocessors including multi-engine targets.

    Bill

  • Squid on 2.1 amd64 not working or I'm retarded

    6
    0 Votes
    6 Posts
    1k Views
    N

    As far as I know unser system - advanced there is the possibility to change these locations, isn't it? I am not sure at all.

  • Dansguardian - Squid Issue?

    4
    0 Votes
    4 Posts
    1k Views
    L

    Thanks phil

    Can someone move this post please??

  • Sarg - How to generate weekly/monthly reports

    8
    0 Votes
    8 Posts
    13k Views
    H

    Sorry,

    On Squid logging its enable and log rotate, 30d configured.

    i'll keep the log rotate on squid empty, and daily reports disabled since my disk is almost full…

    Thanks for the help!!!

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.