Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    tinfoilmattT
    @johnpoz said in Please help to configure HAProxy to serve certifficate on internal LAN too: Yeah - what part do you not understand if you always resolve nextcloud.domain.tld so that it hits your haproxy on your pfsense wan IP are you not getting? You have 2 options - use a different domain internally and always go to nextcloud.publicdomain.tld, or use the same domain internally as external and run into the problem of what IP it resolves to.. Change your local domain to say home.arpa or .internal or atleast something different than the public domain your using to point to pfsense wan IP on the public internet. You are shooting yourself in the foot trying to use the same domain externally as internally. There are ways around it, but they complicate the setup. For example you might be able to use views in unbound as one way to work around the problem. You could use only host entries for all your resources. But then again you run into a problem of using the fqdn for this service, now always pointing to your wan IP.. And that is great when you want to access the service haproxy is doing - but if you want to access that resource on some other service that haproxy doesn't handle - like say simple file sharing.. You are going to have problems. Since you clearly do not understand how any of this works - the simple solution is change the local domain you are using so it is not the same as the public domain you want to use to get to your nextcloud. This tone is outrageous directed at somebody who acknowledged right off the rip that English is not their first language. How many languages do you speak, John? And safely assuming it's only one—English of course—take it from a fellow English native that you'd do well to say more with less words. You otherwise were directing OP in the right direction in my opinion.
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    tinfoilmattT
    Here. I think. Referenced as "github.com: vendor-provided URL vendor-advisory" in your link.
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    573 Topics
    3k Posts
    dennypageD
    @kabeda If memory serves, that old version of ntopng did not run as user ntopng, but as user nobody. There are lots of problems in that old version. Anyway, check the ownership and permissions of /var/db/ntopng and make sure it matches the user that ntopng runs as. You may need to set ownership of the entire hierarchy. Example: /usr/sbin/chown -R nobody:nobody /var/db/ntopng However, the better choice would be to upgrade to a more recent version.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    tinfoilmattT
    @netboy said in is something wrong with pfBlockerNG?: After my post, I "changed" DNSBL -> DNSBL mode from "unbound python mode" to "unbound mode" and so far i have no issues. Terrible idea. Moving backwards in development history there.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    102 Topics
    3k Posts
    dennypageD
    @fjmp24 said in Notification: UPS ups battery is low: If I remove ignorelb directive, my UPS shuts down after 16 seconds This means your UPS is signaling a low battery. Either your battery is bad, or your UPS is bad. Most likely battery, but you never know. I suggest reaching out to Eaton support.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    503 Topics
    3k Posts
    M
    I am using the DNS-Update method I have to use a DNS-Sleep of 5 minutes to let the letsencrypt txt dns record update propagate. During this 5 minutes the acme-webgui times out. when the acme-webgui times out the Action list is NOT executed. How can I solve this ? Would it maybe be an idea to let the acme.sh script execute the actions in the action list as a post-hook instead of the web-gui? Or maybe add an option to add post-hooks in the webUI ?
  • Discussions about the FRR Dynamic Routing package on pfSense

    296 Topics
    1k Posts
    C
    This one has been tricky still not sure what to try. Any ideas?
  • Discussions about the Tailscale package

    93 Topics
    650 Posts
    C
    @luckman212 I had a nice chat with Netgate Support Bot, https://www.netgate.com/support. I added some highlights below: "Netgate Support Bot This is a known issue reported by multiple users: enabling Tailscale with sysrc tailscaled_enable="YES" does not always auto-start Tailscale after a pfSense reboot. The current workaround is to run the following after each reboot manually: service tailscaled stop && tailscale logout || true && service tailscaled start && tailscale up" "Netgate Support Bot Based on all available Netgate forum reports, there is no conclusive evidence that the failure to auto-start Tailscale after reboot when using sysrc tailscaled_enable="YES" is specifically due to Tailscale’s state being stored in a RAM disk. The root cause is still under investigation by the community. Most users confirm that a manual restart is required post-boot regardless of RAM disk settings." I will check the RAM Disk settings to learn more, but given others' lack of success, I will not experiment with it at this time. Here's what the Chatbot has to say: "Netgate Support Bot Yes, you can disable the RAM disk for /var to test if it helps persist Tailscale's state across reboots. Disabling the RAM disk for /var moves log files, RRD graph data, DHCP leases, and package data storage back to disk instead of volatile memory. Impacts and considerations: The firewall will write these files directly to disk, so settings and logs will persist through reboots and power losses. Packages that write to /var, including Tailscale and packages like pfBlockerNG, Snort, or Squid, will have better persistence. However, disk write activity will increase, especially for logging, RRD data, and DHCP leases. Disabling the RAM disk reduces the risk of data loss after an improper shutdown, but you may lose some of the benefits (e.g., lower disk wear) intended for devices with fragile storage (e.g., low-cost flash or SD cards). Some packages may behave differently on disk vs RAM disk and should be tested after reboot. To disable the RAM disk: Go to System > Advanced > Miscellaneous > RAM Disk Settings in pfSense. Uncheck 'Use RAM Disks' for /var, then Save and Reboot. If you use logging or packages that need persistent state (like VPNs, reporting, DHCP), disabling the RAM disk usually increases reliability but may wear storage more."" "Netgate Support Bot There is no direct evidence in available Netgate forum discussions that deleting the contents of /usr/local/pkg/tailscale/state resolves Tailscale's reboot persistence issue. Most reports focus on restarting the Tailscale service or re-running the 'tailscale up' command after reboot, rather than deleting state files. Deleting this directory could clear a corrupted state or force a fresh authentication. Still, it may also remove valid connections or authentication data, requiring you to re-authenticate Tailscale after reboot. This approach might temporarily resolve glitches caused by a stale state. It is still not an established solution for reboot persistence, and you should only try it with the expectation that re-authentication will likely be required afterward. Always back up any config or state you plan to remove, just in case."
  • Discussions about WireGuard

    715 Topics
    4k Posts
    L
    @subhan2k, I guess you only have issues with the domain name when trying to add the static route. What you could do is to add a static route like the following: us-bos.prod.surfshark.com resolves to 43.225.189.108 and 43.225.189.118. Regarding the static route in pfSense: destination network: 43.225.189.0 / 24 (/24 is the key here)
  • Suricata 2.0.4 pkg v2.1 Update – Release Notes

    16
    0 Votes
    16 Posts
    3k Views
    ?
    i3s belong in the "no-no"* category, so no testing for them. the flawed "if it aint broken don't fix it/production"** ** machines that are not in use in The Company, but installed by The Company for clients*** *** if those machines were ours, they would be long broken by now  ;D If we can't get a build working on those p4s, then a hardware upgrade is due. I know what it takes to support old/rarely used hardware/software, so I'm not adding to that if I can help it. Besides, I already got 5 years out of a €100 box (including the 2x dual pci-x intels), what else could I ask for? Oh yea, a pair of them in CARP ;D If only supermicro stopped pushing out motherboards (guess what motherboards those p4s are running on)… This http://www.supermicro.com.tw/products/motherboard/Atom/X10/A1SRM-LN7F-2758.cfm makes me want to shout "shut up and take my money already!" Since I always work using "the worst case scenario", I'll start planning for the upgrade soon.
  • HAVP error page

    2
    0 Votes
    2 Posts
    1k Views
    T
    nicely done. Thank you. It works also.. well looks ok.. not having ClamAV running yet in 2.2rc
  • Snort whitelist IP's not working, what I my doing wrong?

    25
    0 Votes
    25 Posts
    8k Views
    P
    I also observed that most (now I am even starting to think maybe ALL) sites are generating portscans but why, that remains a mystery to me..  What I ended up doing was to lower the preproc setting sensitivity to low on the snort interface, then allow a "running-in" period where I try to visit as many sites as I usually visit and let my systems contact whatever web services they need, then when an alert is generated I add it to an alias that I assigned to Snort's interfaces… May not be the best but it works.  All I need now is a real attack from one of those "legit and trusted" sites and snort wont pick it up.. Perfection doesnt exist I guess... This page also helped me a lot: http://manual.snort.org/node85.html Thanks Bill for your help once again!
  • MOVED: Postfix on 2.2

    Locked
    1
    0 Votes
    1 Posts
    568 Views
    No one has replied
  • 0 Votes
    1 Posts
    755 Views
    No one has replied
  • Suricata 2.0.4 fails to install

    13
    0 Votes
    13 Posts
    3k Views
    B
    Confirmed, everything runnin' now. Thanks again for the fast response and fix!
  • PfSense 2.1.5 + Zabbix Proxy 2.2.5 = not working?

    5
    0 Votes
    5 Posts
    2k Views
    D
    @gamefreaktegel: Is there a solution for this issue? I have a similar problem that after upgrading from 2.1.3 to 2.1.5 the Zabbix Agent on the pfSense is not working. Removing and Reinstall does not solve the issue. This thread is about Zabbix Proxy. What pfSense version are you running? Could you share your zabbix agent logs and your config? Thanks
  • Suricata 2.0.4 pkg v2.1.2 – Bug Fix Update Release Notes

    1
    0 Votes
    1 Posts
    610 Views
    No one has replied
  • Problems Configuring Squid3 for Redirects

    13
    0 Votes
    13 Posts
    3k Views
    K
    All is working fine now. As you suggested I deleted the 1:1 NAT for the Webmail site and changed the rule to point to the public IP instead of the private IP. Thank you for you help.
  • LightSquid Graph Report 500 error

    2
    0 Votes
    2 Posts
    950 Views
    K
    I was able to resolve the 500 error by uninstalling the conflicting Perl version 5.14.4 when installing the latest 5p-GD files which is using Perl 5.16 version
  • Long Term Solution for bind and "journal rollforward failed" ?

    1
    1 Votes
    1 Posts
    2k Views
    No one has replied
  • Avahi doesn't load service files.

    1
    0 Votes
    1 Posts
    775 Views
    No one has replied
  • Snort Unknown rule option: 'ssl_version'.

    10
    0 Votes
    10 Posts
    3k Views
    bmeeksB
    @Supermule: Did the same and the SSL Preproc came back online no issues. Glad it fixed yours as well.  Might be an issue of looking for "on" versus "enabled" in the code when checking if the preprocessor should be on or off.  I will investigate it further. Bill
  • Cannot remove squid

    8
    0 Votes
    8 Posts
    2k Views
    M
    Arhh, the Microsoft way 8)
  • Installing suricata never installs web menu

    7
    0 Votes
    7 Posts
    1k Views
    R
    Update: Upgraded to 2.2, and Suricata installs just fine. Thanks again. –------------ Thanks for you insights. I went to Diagnostics > Tables, and there were no entries in the snort2c tables. So ...nothing to clean out. I bought the kit from netgate, but didn't choose for them to do my install. Been using pfsense since 2010 (just before 1.2.3 releases), so I thought that doing the installation myself wasn't too bad. Successful clean install for sure. What i'll try next is doing an uninstall (completely) (not a reinstall). Then checking those tables (snort2c), and clearing them if possible. I might go as far as a re-install with the memstick method, but choosing a regular installation (not embedded kernel), and give the package a go again. Thank you again for looking into this.
  • Unbound package 1.5.1_2 issue

    4
    0 Votes
    4 Posts
    1k Views
    M
    Thank you very much for your prompt response, Renato! Deleting unbound 1.5.1_2 and installing 1.5.1_2_1 makes unbound work again on all four servers. Regards, Michael
  • Country Blocker no supported on 2.1.5?

    3
    0 Votes
    3 Posts
    1k Views
    W
    The upcoming pfBlockerNG package could be your answer. :)
  • FreeRADIUS - pfsense user privileges

    1
    0 Votes
    1 Posts
    869 Views
    No one has replied
  • Snort fatal error on start

    63
    0 Votes
    63 Posts
    17k Views
    bmeeksB
    @amiracle: I found that if you disable the HTTP Inspect component, that ignores the IIS Unicode map and starts Snort without issue. Here's how you disable it: Snort Interface -> Edit your Interface, (mine is named WAN)-> Select the <wan>Preprocs tab, navigate to the HTTP Inspect section and UNCHECK it. That will allow your snort IDS to start back up without issue. I'm running pfSense 2.1.5 with Snort 2.9.7.0 pkg v.3.2.1 on a 4GB CF Card. Additional Troubleshooting: I tried to just limit the webservers in the HTTP Inspect section to just inspect an Apache Web server, and ignore IIS completely.  That did not work and it just failed again, so I just disabled the HTTP inspect section entirely. Error Messages: After enabling Snort via the WebUI, I received the following error message - Dec 21 23:29:57 my.pfsensefirewall.com Dec 21 23:30:00 snort[99416]: FATAL ERROR: /usr/pbi/snort-amd64/etc/snort/snort_xxxx_em0/snort.conf(166) => Did not find specified IIS Unicode codemap in the specified IIS Unicode Map file. ```</wan> You are going to experience more issues with disabling the HTTP_INSPECT preprocessor.  Snort and Suricata are becoming too "big" to install and update reliably on Nano installs of pfSense.  I strongly encourage Snort and Suricata users to stick with full installs on either conventional hard disks or SSD.  Both packages need plenty of free disk space to work (and free RAM). Bill
  • Stunnel client config in GUI.

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.