Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    N

    Can I use pgblockerng aliases in Haproxy?

    80758505-9bad-4dad-a80b-c159be1045a2-image.png

    If it was a firewall rule, typing pfb would produce a dropdown to select.

    Here it has to be written, but will it work? Is it supported?

  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB

    I saw where the Netgate kernel developer updated the Suricata package in the pfSense 25.07 development branch to work with the new kernel PPPoE driver. But so far as I know that updated package has not been migrated to 2.8 CE.

    Here is the commit into the DEVEL branch: https://github.com/pfsense/FreeBSD-ports/commit/68a06b3a33c690042b61fb4ccfe96f3138e83b72.

  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    571 Topics
    3k Posts
    K

    @pulsartiger
    The database name is vnstat.db and its location is under /var/db/vnstat.
    With "Backup Files/Dir" we are able to do backup or also with a cron.

  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    GertjanG

    @AlexK-0 said in Can't receive GeoIP databases updates anymore, banned:

    Days ago, I received from MaxMind an email, notifying me that my country has been banned to receive GeoLite City database updates.

    You've found a reason to use a VPN.

  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    99 Topics
    2k Posts
    K

    @elvisimprsntr thanks for your suggestion. I will give it a try.

  • Discussions about the ACME / Let’s Encrypt package for pfSense

    493 Topics
    3k Posts
    johnpozJ

    @MacUsers

    https://help.zerossl.com/hc/en-us/articles/360060119933-Certificate-Revocation

    edit: oh you prob out of luck

    You can revoke any certificate issued via the ZeroSSL portal. Currently, certificates issued via ACME can not be revoked from inside the portal - please follow the instructions of your ACME client for revoking those certificates.

    the gui in pfsense does not have the ability to revoke - you prob have to move the certs to something you have certbot installed to and revoke that way.

  • Discussions about the FRR Dynamic Routing package on pfSense

    294 Topics
    1k Posts
    R

    I had a similar issue with Routed VTI over IPsec recently. FRR lost its neighbors after rebooting or when a tunnel went down. It never re-discovered it automatically. Only restarting FRR (either in GUI or via CLI) brought the neighbors back.

    When I manually added those under the OSPF neighbors tab in the GUI it seems to solve the problem as well.

  • Discussions about the Tailscale package

    88 Topics
    573 Posts
    luckman212L

    For 25.07 RC, this worked for me (run sh first)

    [25.07-RC][root@r1.lan]/root: sh # export IGNORE_OSVERSION=yes # pkg add https://pkg.freebsd.org/FreeBSD:15:amd64/latest/All/tailscale-1.84.2.pkg # service tailscaled restart # tailscale up # tailscale version 1.84.2 go version: go1.24.4 # tailscaled -version 1.84.2 go version: go1.24.4
  • Discussions about WireGuard

    689 Topics
    4k Posts
    P

    @patient0 Thanks for further suggestions. The tunnel is definitely up and so I don't think this is a CGNAT issue after all. WAN firewall rule is in place for UDP on port 51823 (otherwise the tunnel wouldn't work, right?). I can ping from client 1 -> client 2 and visa versa and also ping all points in between like you suggest. I just can't open an HTTPS connection from pfSenseB from Client 1 using a browser. But I can do this the other way round i.e. from Client 2 to pfSenseA

    I will try and do some packet capture to see if that reveals anything.

  • SquidGuard Group ACL not applying; incorrect client IP address

    3
    0 Votes
    3 Posts
    5k Views
    P

    @srk3461:

    Is your client source is set correct !? Did you set any order pref!? Is your "Target Categories" set properly!

    In your "Target Rules" under "Groups ACL" did you set your desired group to "white-list"? Is your "default access" at the bottom of the same is set to "allow"!?

    Did you hit "save" bottom after all your configuration and then hit "apply" on general page of squid-guard!?

    Try clearing your browser cache before checking!

    I knew I forgot to hit apply; it officially works.  I double checked my configurations to see what the heck was going on; I forgot to add the LAN IP address in the whitelist.

    Group ACL names and source IP addresses:

    Ben: 10.0.0.1-10.0.0.4 (pfSense, my laptop, server, and FreeNAS)
    Wireless Clients: 10.0.0.1 10.0.0.5 (pfSense; Wireless Router*)

    not connected yet

    The space in between the 10.0.0.1 and 10.0.0.5 represents a separate IP address.

    Thanks for the info, man.

    Edit: When I change my laptop's IP address from 10.0.0.2 to 10.0.0.5 with every setting as the same (subnet mask, gateway, DNS1, and DNS2), the group ACL doesn't go from Ben to Wireless Clients, just stays at Ben.  What else did I do wrong?  Must be pfSense 2.1-RC0-i386 has bugs in it; I'm going to install pfSense-2.0.3-AMD64

  • Soliciting Feedback on Snort Package 2.6.x Multi-Engine Config GUI Design

    14
    0 Votes
    14 Posts
    3k Views
    E

    @adam65535:

    I just tested pf with defragmentation using hping from another system and pf does normalize the traffic before sending it out.  It actually normalizes the traffic before tcpdump can even see it.  If the packets are bad enough though and pf can not or does not reassemble them then tcpdump on pfsense does see those bad fragmented packets.  It does not send them to the destination of course. I can only assume snort has an input point into the network at a lower level than tcpdump so that it can see the raw fragment packets at all times but I do not know.

    It seems like we should always use BSD Target Type with frag3 when the admin does not disable the pfsense 'Disable Firewall Scrub' which is the default.

    no the scrubbing done by pfSense firewall is not related to snort.
    Since tpcudmp/pcap sees packets very early, before even stack has seen them.

  • Squid proxy seems to work properly but never hits..

    2
    0 Votes
    2 Posts
    3k Views
    N

    I am having the same problem with i386 pfsense 2.0.3 and squid3. It appears that the proxy is working, however I only see tcp_miss. Oddly, if an image has been missed once, it is not missed again when attempting to reload.

  • {inet} > [Squid Proxy (Parent)] > [HAVP] > {clients} 403 forbidden error

    1
    0 Votes
    1 Posts
    4k Views
    No one has replied
  • Squid3 spitting error

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Use pfsense as snort only box

    13
    0 Votes
    13 Posts
    9k Views
    ?

    @newbieuser1234:

    This sounds dumb,but how would I interact with the gui? what IP's would I assign on the WAN and opt.  Would the opt1 (the other side of the bridge) be the same IP as the router behind it? just a bit confused on the IP addressing. Thanks again for all your help with this.

    Sorry for taking so long to respond. Been a bit busy around here  ;D

    Interacting with the gui is done through the LAN interface. That's why I suggested "pfsense can easily be used as a transparent bridge, see http://forum.pfsense.org/index.php/topic,20917.0.html and adapt accordingly. Don't forget allow any>any on both interfaces, and DO NOT use the lan interface as a member of the bridge."
    pfsense works exactly the same (from a web gui USER's point of view) whether it's running as a bridge or a routing platform. As long as the LAN interface has a valid private ip and there is a rule allowing access to the webgui port, plugging something into the LAN will allow you to administer the box. The important thing to remember is that bridged interfaces have NO IPs, which means that you have to be careful with your rules (eg I have rules disallowing traffic not belonging to an interface's subnet from passing through the firewall, which wouldn't work with a bridge).
    A common use case for this is a fully transparent firewalling bridge, which allows for traffic control both ways of the bridge. The bonus is that the bridge is completely invisible on both sides of it (WAN/DMZ), unless you sift through each and every packet observing changes in the packet as it goes through the bridge (which no sane person will do). The LAN interface is used to monitor and administer the bridge, just like I said above. A random tip: do NOT try setting up a bridged CARP cluster without doing your research first.

    Back on track:

    pfsense box with snort plugin no ip assigned on WAN/OPT1 Bridge WAN/OPT1 and set up LAN interface with a valid private ip. webgui allow rule on LAN. Set up snort as mentioned above Enjoy :)

    EDIT: hit go button too soon. A few thoughts popped up in my head after posting:
    A fully transparent bridge should not be able to get on the internet. This means NO communications with the "outside world" which in turn means NO updates, NO snort rule updates (no ip assigned on the WAN, remember?  ;) )
    A transparent bridge with internet is a bit different. If you have multiple static IPs, just assign one to the wan and proceed with bridging (yes even if it has an IP, yes I've tested a Frankenstein hybrid routing/bridged monster and it works perfectly, even LAN to OPT1 which according to documentation shouldn't work). If you don't have multiple static IPs a bit of default routes/nat will be needed. Basically since pfsense has no sense of other networks when used as a bridge, packets coming from itself will not know where to go or where they are coming from, and need a little "push" to get "out there"  :D

  • FreeSwitch: sccp or chan_sccp: Cisco 79xx / Cisco 525g2, experiences?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Package status meanings

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ

    For HAproxy, the "-devel" variety is probably more like Beta.

    The "-full" variety needs to go away, but some people still rely on it. Its status should really be "Deprecated" or "Retired".

  • Lightsquid 403 outstanding error!

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Dansguardian - YouTube Videos with Ads not Streaming

    3
    0 Votes
    3 Posts
    5k Views
    E

    Well, as you can tell, I'm am noobie with this stuff.

    I've ended up adding:

    .c.youtube.com

    to the Exception Regular Expression section of the URL lists under ACL's for Dansguardian.

    Videos with ads on YouTube now stream.

    Hoping this fixes things, and I have  not ignorantly created a security risk in doing so.

    If anyone has any insights into this, let me know.

    Cheers,
    Paul.

  • [SOLVED] squid does not start, missing "libgssapi.so.10"

    4
    0 Votes
    4 Posts
    2k Views
    Z

    This proble with squid start is solved after I upgraded to pfSense 2.1-RC0 build from 20130622 (http://snapshots.pfsense.org/FreeBSD_RELENG_8_3/i386/pfSense_RELENG_2_1/updates/pfSense-Full-Update-2.1-RC0-i386-20130622-1453.tgz).

  • SQUID + JAVA PROBLEM

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Squidguard3 fails to install and gb nics are shown 100mbits only

    4
    0 Votes
    4 Posts
    2k Views
    Z

    @Tikimotel:

    I have a dual em NIC.
    I've set my LAN/WAN (under the advanced button) "Speed and duplex" settings to "Default (no preference, typically autoselect)".

    Yep, 'Default' was what was originally selected, I tried to change only when it didn't work. I defauted back and still no go!

    Pressing save in the WAN/LAN menu saves some changes regarding DHCPv4 vs. DHCPv6 in the overall config of pfSense, which helps when the interface goes down and backup (If i remember correctly).
    So this should solve your WAN dropping and only getting back after a reboot.

    I have no IPV6 enabled. I changed back to 'Defualt' and saved and rebooted, yet the internet keeps on dying (but WAN interface appears to be active).

  • [SOLVED] Zabbix 2.x + pfSense 2.1RC + CPU Temperature

    4
    0 Votes
    4 Posts
    3k Views
    S

    cheers for this dude.. just helped me

  • PfJailctl

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Squid - 3.3.5 not working?

    19
    0 Votes
    19 Posts
    14k Views
    D

    Right well a reboot of the firewall sorted out the problem.

    Have to say I didn't get along with squid.
    I found the performance tweaks here on the forum and through google.  Still not good IMO.

    Pages were taking too long to load, youtube (and other sites) videos were also affected slightly even though I hadn't turned on dynamic caching.

    So I have un-installed squid for now.  I might create a stand alone squid server at some point but who knows.

    Thanks for your time mate :)

  • Using Squid as a Transparent Proxy! Have I done it right?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort 2.9.4.6 Pkg v 2.5.9 - New Feature Screenshots and Explanation

    5
    0 Votes
    5 Posts
    3k Views
    bmeeksB

    Snort 2.9.4.6 Pkg ver 2.5.9

    Auto-Add Suppression Rules for Track By Source or Track By Destination from Alerts tab

    Additional icons will now show up on the Alerts tab under the SRC and DST columns for displayed alerts.  A plus (+) icon will appear under an IP address in the SRC or DST columns.  Clicking the plus (+) icon will automatically add the IP to the Suppress List for the interface using the "track by src ip" or "track by dst ip " form.  If the IP address is already present in the Suppress List, then a disabled icon will be displayed.

    This gives you three ways to suppress alerts.  By SRC IP, by DST IP, or by GID:SID.  The third method (by GID:SID) is global in that it will suppress the alert regardless of source or destination.  For this reason, when a global suppress list entry containing only the GID:SID with no other qualifiers is present, then no plus (+) icon will displayed for that alert under the SRC or DST columns.  This is because in the case of a globally suppressed alert, the IP addresses are irrelevant.

    Note also in the screen shot below that (X) icons are also displayed.  These have been available for quite some time in the GUI.  When present, they indicate the IP address is currently being blocked.  Clicking the (X) icon will remove the IP address from the blocking table.

    NewAlertsOptions.jpg
    NewAlertsOptions.jpg_thumb

  • LCDProc 0.5.5 and Temp?

    2
    0 Votes
    2 Posts
    2k Views
    L

    I too would like to have the temps displayed via LCDProc. I also have coretemp running with the temps displayed on the dashboard and a working lcdproc-dev package feeding a CFA-735. I agree with kilthro's placement too with having the temp displayed in the bottom, static region but since my CPU down-clocks when needed, i wouldn't want to lose that particular item but the states portion i could live without.

    So, in short, I second this request.

  • Squid & Sarge - more than port 80?

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ

    There isn't a way to store that info long-term on pfSense directly. ntop can get some but probably not the detail you want, it would be more for a summary or graphing.

    pfflowd (or softflowd, see the doc wiki) can export netflow data to a separate netflow server which then logs and records that information in a database, and you can then query or graph from there. The netflow server would be separate software, there have been several forum threads and mailing list threads discussing various free and commercial netflow server options.

    While ntop is capable of acting as a Netflow collector and server, I haven't had a ton of luck getting it to do what I wanted in the past. It's also fairly heavy in terms of dependencies and resource requirements.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.