Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    N

    Can I use pgblockerng aliases in Haproxy?

    80758505-9bad-4dad-a80b-c159be1045a2-image.png

    If it was a firewall rule, typing pfb would produce a dropdown to select.

    Here it has to be written, but will it work? Is it supported?

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB

    I saw where the Netgate kernel developer updated the Suricata package in the pfSense 25.07 development branch to work with the new kernel PPPoE driver. But so far as I know that updated package has not been migrated to 2.8 CE.

    Here is the commit into the DEVEL branch: https://github.com/pfsense/FreeBSD-ports/commit/68a06b3a33c690042b61fb4ccfe96f3138e83b72.

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    A

    @wbmstr2000 : Thanks! I will investigate it, greetings

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    99 Topics
    2k Posts
    K

    @elvisimprsntr thanks for your suggestion. I will give it a try.

  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    johnpozJ

    @MacUsers

    https://help.zerossl.com/hc/en-us/articles/360060119933-Certificate-Revocation

    edit: oh you prob out of luck

    You can revoke any certificate issued via the ZeroSSL portal. Currently, certificates issued via ACME can not be revoked from inside the portal - please follow the instructions of your ACME client for revoking those certificates.

    the gui in pfsense does not have the ability to revoke - you prob have to move the certs to something you have certbot installed to and revoke that way.

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    R

    I had a similar issue with Routed VTI over IPsec recently. FRR lost its neighbors after rebooting or when a tunnel went down. It never re-discovered it automatically. Only restarting FRR (either in GUI or via CLI) brought the neighbors back.

    When I manually added those under the OSPF neighbors tab in the GUI it seems to solve the problem as well.

  • Discussions about the Tailscale package

    88 Topics
    573 Posts
    luckman212L

    For 25.07 RC, this worked for me (run sh first)

    [25.07-RC][root@r1.lan]/root: sh # export IGNORE_OSVERSION=yes # pkg add https://pkg.freebsd.org/FreeBSD:15:amd64/latest/All/tailscale-1.84.2.pkg # service tailscaled restart # tailscale up # tailscale version 1.84.2 go version: go1.24.4 # tailscaled -version 1.84.2 go version: go1.24.4
  • Discussions about WireGuard

    689 Topics
    4k Posts
    P

    @patient0 Thanks for further suggestions. The tunnel is definitely up and so I don't think this is a CGNAT issue after all. WAN firewall rule is in place for UDP on port 51823 (otherwise the tunnel wouldn't work, right?). I can ping from client 1 -> client 2 and visa versa and also ping all points in between like you suggest. I just can't open an HTTPS connection from pfSenseB from Client 1 using a browser. But I can do this the other way round i.e. from Client 2 to pfSenseA

    I will try and do some packet capture to see if that reveals anything.

  • Squid - diskd bug (ipcs and ipcrm not available)

    8
    0 Votes
    8 Posts
    4k Views
    T

    For Squid3 (3.4.10_2 0.2.5), on pfsense 2.2 you need ipcs and ipcrm from a 10.1 base.
    The diskd text should reflect that, now it still refers to 8.3.

    diskd uses a separate process to avoid blocking the main Squid process on disk-I/O. To use ipcs and ipcrm on squid, Download livefs.iso from ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/ mount it and copy /usr/bin/ipcs and /usr/bin/ipcrm to your system and set them as executables. diskd uses a separate process to avoid blocking the main Squid process on disk-I/O. To use ipcs and ipcrm on squid, Download livefs.iso from ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/ mount it and copy /usr/bin/ipcs and /usr/bin/ipcrm to your system and set them as executables.
  • FreeRADIUS “daily” issue

    6
    0 Votes
    6 Posts
    2k Views
    G

    Simply deleting /var/log/radacct/timecounter/db.daily and starting the service fixed the issue.

    The newly created db.daily is 64 KB, not 16 KB. So it looks like it got corrupted somehow.

    How do we prevent this from happening in the future?

    Thank you

  • About haproxy-devel

    2
    0 Votes
    2 Posts
    822 Views
    P

    First add a backend, in there you can add multiple destination servers.
    To actually use it, you also need a frontend that uses the backend and listens on a port.

  • Squidguard/Web Filtering Questions

    3
    0 Votes
    3 Posts
    951 Views
    J

    Thanks for your reply.  I definitely have some reading/digging to do but that link appears to contain helpful information for the active directory piece.

  • Snort error: Could not create configuration reload thread

    11
    0 Votes
    11 Posts
    3k Views
    bmeeksB

    @johanstrand:

    Hi!

    I had it set to AC. I changed to AC-BNFA and it Went from 1.3GB to 380MB. Maybe this was the reason for the original problem. I am still suspicious of the rules because now (after resinstall) I can activate all rules using AC as the pattern matcher and snort starts without any problem and it takes about 1.4GB of RAM.

    I can not reproduce the reconfig thread problem.

    /Johan

    The AC pattern matcher will slowly gobble up RAM as it operates.  I have seen posts on other sites where users have had it gobble up 16 GB of RAM and more with a lot of traffic and rules.

    There is no appreciable difference in the performance of any of the pattern matchers on today's hardware.  AC-BNFA or AC-BNFA-NQ is the suggested setting, and I would advise to never change it.

    Bill

  • Squid as parent for havp

    11
    0 Votes
    11 Posts
    3k Views
    marcellocM

    @webstor:

    Tried, couldn't fix it.
    Still the icap error. Maybe related only to amd64 ?

    Check your logs
    the icap is working on 0.2.4 version.

    There is a typo on clamav config check that i'll send a fix today.

  • Revamp of an old closed question regarding uPnP proxy.

    1
    0 Votes
    1 Posts
    613 Views
    No one has replied
  • Can snort be configured for a single interface or VLAN?

    5
    0 Votes
    5 Posts
    2k Views
    T

    Well I'm trying to eliminate any security measures from a certain lan due to bitching about the rules blocking stuff… so adding snort to the wan will probably cause more issues and they are not willing to troubleshoot.

  • Apply different blocking level to different VLans

    7
    0 Votes
    7 Posts
    2k Views
    jahonixJ

    Surely I know and have used Squid as cache. But never more than that.
    Thanks for pointing me to it.

  • Squid Reverse Proxy stops working when using Squid3 load balancing ACL

    2
    0 Votes
    2 Posts
    2k Views
    J

    I figured out how to fix the issue.

    First I had to learn some Squid bits and figure out how the Squid.conf is interpreted (ie. top-to-bottom for first-matched ACLs) and what some of the various "tags" mean. I found the following link quite useful to get some basics under the belt: http://www.deckle.co.uk/squid-users-guide/squid-configuration-basics.html

    After grokking the Squid.conf that was generated by pfSense, I figured out what the existing reverse-proxy configuration ACLs were (as it was needed to for the cache_peer_access tags).
    For those interested, you can use the "Edit File" function under the "Diagnostic" in the webconfigurator to browse to the generated Squid.conf file.

    In my case it was under: /usr/pbi/squid-i386/etc/squid/squid.conf
    Note: Yours may in in a different location if you use a different version or have the AMD64 version of pfSense.

    After figuring out how these are interpreted by Squid (i.e. the order, precedence, overrides, etc.) with the help of the above link, I understood what was needed.

    I looked up all the reverse-proxy ACLs generated by pfSense and create an tcp_outgoing_address tag for each using the LAN side IP (or DMZ side if that's where you are reverse-proxying to).

    For example, the following is what I ended up with. This must be placed above the bits for the random ACL to load-balance the forward-proxy. 192.168.0.254 is the IP of my LAN side interface:

    tcp_outgoing_address 192.168.0.254 OWA_URI_pfs tcp_outgoing_address 192.168.0.254 rvm_Extranet tcp_outgoing_address 192.168.0.254 rvm_Prototype tcp_outgoing_address 192.168.0.254 rvm_WebService tcp_outgoing_address 192.168.0.254 rvm_License # Put load balancing tags after setting the tcp_outgoing_address for reverse proxy tags acl fiftyPercent random 0.5 tcp_outgoing_address <<wan1-ip-here>> fiftyPercent tcp_outgoing_address <<wan2-ip-here>></wan2-ip-here></wan1-ip-here>

    The result is that for the reverse-proxy traffic goes to the specified LAN side IP , and then the remainder of all other traffic is load-balanced via the random ACL on the WAN IPs.

    Hope that helps anyone else who might run into a similar issue.

  • Shellcmd suggestion

    3
    0 Votes
    3 Posts
    934 Views
    M

    +1.

  • Are there any conflicts with running Squid + Squidguard + snort?

    4
    0 Votes
    4 Posts
    2k Views
    J

    Running one firewall with pfSense 2.1.5 (AMD64) + Squid (2.7.9) + SquidGuard (1.5_1.1 beta) + Snort + pfBlocker and have no issues. Proxy is NOT transparent.

    Running another firewall with pfSense 2.1.5 (i386) + Squid3-dev (3.3.10 pkg 2.2.8) + SquidGuard (1.4_4 pkg v.1.9.5) + Snort + pfBlocker and have no issues. Proxy is NOT transparent. ClamAV is not enabled as I get ICAP timeouts.

    Both are stable and responsive.

    Hth.

  • UPS Support - pfSense and a FreeNAS Server?

    7
    0 Votes
    7 Posts
    5k Views
    V

    Cool! Glad to hear! Those instuctions were directly from my own setup, so if you need any further assistance I'll help where I can.

  • Set up Squid proxy for different network

    4
    0 Votes
    4 Posts
    949 Views
    M

    Use the setting upstream proxy.

  • Freeradius not starting at boot when use mysql as database

    2
    0 Votes
    2 Posts
    1k Views
    N

    Can any one help me?

  • Snort OpenAppID on the GUI

    7
    0 Votes
    7 Posts
    4k Views
    bmeeksB

    By the way, if you come up with a collection of working rules for OpenAppID that you think others would find useful, please share them here on the Forum.  This is a new technology, and group collaboration would be a good thing as folks learn and try it out.

    Bill

  • Squid3 : Low downloads speeds and CPU overload

    1
    0 Votes
    1 Posts
    744 Views
    No one has replied
  • FreeRadius users

    6
    0 Votes
    6 Posts
    1k Views
    J

    I found solution! On the user check attribute add Calling-Station-Id += 'mac adress', | Calling-Station-Id += 'mac adress', | and more if need… before I try syntax := and this not working..

  • Suricata

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB

    Currently Emerging Threats offers no lower cost versions that I am aware of (excepting the free Open Source version you mentioned).

    You can use the Snort VRT rules with Suricata, but there are around 700 of those rules (if I remember the count correctly) that will not load because they contain keywords Suricata does not recognize.  They won't break Suricata, but any protection afforded by the non-loading rules will of course be sacrificed.

    Snort VRT does offer a home-use annual subscription for their latest rules.  It is $29.99 USD per year.  That's certainly cheaper than $500 USD per year.

    Many folks use a combination of the ET-Open free rules and a paid Snort VRT subscription.  Of course if you are a commercial enterprise, $500 per year is generally not considered an excessive expense for cyber security protection.

    Bill

  • Re: New Package: ntopng

    5
    0 Votes
    5 Posts
    2k Views
    H

    Mine did not install at first.
    Just hit back in the browser and installed again.
    Second time it worked.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.