Subcategories

  • Discussions about packages which handle caching and proxy functions such as squid, lightsquid, squidGuard, etc.

    4k Topics
    21k Posts
    E
    I even tried deleting and creating a new certificate. Any suggestions?
  • Discussions about packages whose functions are Intrusion Detection and Intrusion Prevention such as snort, suricata, etc.

    2k Topics
    16k Posts
    bmeeksB
    @NRgia said in Suricata on Pfsense: Your suggestion is preferred, but from I understood from you, nobody is interested or have the knowledge. Again thank you, for updating this package over the years. I'm sure there is someone here on the forum using the package that has the knowledge to maintain it. Another option if IDS/IPS is critical is to use the Linux package on a separate virtual machine or hardware appliance. Inline IPS performance would actually be very good using a Linux box (or even a FreeBSD box) with two separate NICs and configure true netmap hardware-to-hardware mode. That is many times more performant than the hardware-to-host mode that is required when using netmap within pfSense. Of course using a separate box would mean no GUI, but that's how the vast majority of the world uses Suricata already (without a GUI).
  • Discussions about packages that handle bandwidth and network traffic monitoring functions such as bandwidtd, ntopng, etc.

    572 Topics
    3k Posts
    keyserK
    @Antibiotic No it’s not possible with NtopNG as it is not a Netflow collector. You need nProbe for that which will “translate” recieved netflows into flows that NtopNG understands and can visualize (with very very little detail might I add as Netflows has no additonal information apart from sender/reciever and volume). The NtopNG package and the product in general is more geared towards visualising and recording traffic details from actual packet captures. This contains MUCH more metadata about the sessions than netflows (DNS names, protocol information and myriads of other things). But pffSense Plus has a builtin Netflow exporter if you have an external netflow collector on hand.
  • Discussions about the pfBlockerNG package

    3k Topics
    20k Posts
    High_VoltageH
    @wesley33taylor okay, now I have to ask, just due to being especially dense today, what and how did you do that? what do others need to change, so that there is written history for anyone else that might end up finding this thread and wanting to do the same, the usefulness of archival purposes and the desire to confirm I've done the same drive me to ask this. please advise.
  • Discussions about Network UPS Tools and APCUPSD packages for pfSense

    101 Topics
    2k Posts
    dennypageD
    @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: Interesting. I would have thought the initial reboot, which occurred as part of the upgrade, would have done the trick, but it took a second reboot, just now, to get things working. Glad you have it sorted. There was no difference in the output of usbconfig show_ifdrv at any point -- before or after unplugging/replugging the USB cable, nor after rebooting. ... Question: What would tell me whether or not a driver was loaded? If there were an attached driver, it should have shown up with the show_ifdrv command. If you use the command and look at the other usb devices, I think they will show attached drivers. I don't expect to see a driver attached to the ups, because there is a quirk that tells the OS to ignore that device (and not attach a driver). Look for idVendor and idProduct in the above output. The Vendor ID for your device is 0764, which corresponds to Cyber Power Systems, and the Product ID for your device is 0601, which is registered as "PR1500LCDRT2U UPS" (don't sweat an exact match for the name). You can see the quirk with the following command: [25.07-RC][root@fw]/root: usbconfig dump_device_quirks | grep 0764 VID=0x0764 PID=0x0005 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0501 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE VID=0x0764 PID=0x0601 REVLO=0x0000 REVHI=0xffff QUIRK=UQ_HID_IGNORE [25.07-RC][root@fw]/root: Your device is third on the list. The HID_IGNORE quirk says to ignore the device and not attach a driver. @jhg said in NUT fails to start after 2.7.2 -> 2.8.0 upgrade: You might consider adding this resolution to the release notes for 2.8. LOL... sorry, I don't have input to the release notes (I don't work here). While I wrote and maintain various packages, including NUT, I'm still just a volunteer. Most packages are actually written by volunteers.
  • Discussions about the ACME / Let’s Encrypt package for pfSense

    501 Topics
    3k Posts
    A
    Hi, Please help to forward / report the bugs in ACME 1.0 package. Thanks.
  • Discussions about the FRR Dynamic Routing package on pfSense

    295 Topics
    1k Posts
    J
    Anyone else happen to notice that when configuring BFD, if you create a peer and select a profile - after save, re-edit the peer and the Profile is not represented. It appears as "None". You have to check the raw config to determine if the profile was actually assigned to the peer. This is on 2.8.1 (all packages up to date as of the date/time of this post). UPDATE: if re-edit and save (without re-configuring the profile none to what you want) - the save will strip the profile from the peer.
  • Discussions about the Tailscale package

    91 Topics
    611 Posts
    T
    Hi All, I use HAProxy to redirect to a range of https internal resources, this works really well at the moment through the WAN where I have source limits set up, and I can connect to the internal resources from limited external IP Addresses. Given I have tailscale I would like to basically be able to put custom dns entries in to point these hostnames to my pfsense tailscale IP4 address (100.89.148.118) but I am not having any luck getting this working. At the moment, I am just trying to connect to HAProxy using https://100.89.148.118 but it is getting blocked by the firewall. Sep 11 11:55:58 tailscale0 Default deny rule IPv4 (1000000103) 100.89.148.10:53148 100.89.148.118:443 TCP:S I have tried with and without NAT redirecting internally to 127.0.0.1, and I also have rules set up to allow any traffic to and from my tailnets (defined in an alias) but I still keep getting these connections from my other tailscale machines being blocked on the pfsense machine. Can someone give me some pointers on what I am missing because I can see the requests are coming through to the pfsense machine, and in theory the rules should allow it through but I cant see why they don't. I do have tailscale ACL in place, but clearly that is not an issue as the requests are making it through to the firewall. 0/0 B IPv4+6 TCP/UDP TailNets * TailNets * * none Allow across Tailnets 0/0 B IPv4+6 TCP/UDP * * * 443 (HTTPS) * none Allow Tailscale IP4 I also tried adding a EasyRule but because the tailscale0 interface doesn't exist in pfsense it throws an error and won't let me add that rule. Appreciate any help or tips, Cheers.
  • Discussions about WireGuard

    701 Topics
    4k Posts
    QuantumParadoxQ
    resolved! Issue was the following I corrected a few things on your config: Your Outbound NAT configuration was malformed. I corrected it to utilize Hybrid mode and configured a single Outbound NAT for your Wireguard connection, which should be much cleaner. I updated your routing table to be Automatic and switched to Policy-based routing within the firewall rules under Firewall --> Rules --> LAN I updated the name of the interface for the Wireguard tunnel to be called TORGUARD and set the MSS clamping to 1350. This can probably be bumped back up to 1400, but I wanted to make sure the clamping was small enough to avoid fragmentation. I cleaned up some redundant firewall rules and a few other "odds and ends".
  • FreeRADIUS latest package upgrade

    25
    0 Votes
    25 Posts
    2k Views
    johnpozJ
    Ok - so that was an issue that it would auth, even without users in the freerad users.. And you fixed that. So now I just add them that match the CN on the certs.. Not a big deal.. Thanks!! All back to working for my 3 devices.. And it does make sense.. That users should also have to be listed in freerad to match the CN on the cert. And - makes it easy to just delete a user vs worried about revoking a cert, etc. etc.. Thanks again for looking into this so quickly and link to the other bug that was fixed.. That was causing my problem. edit: Project for this weekend maybe is moving to eap-tls via wpa3-enterprise.. I got wpa3 working on my psk ssids.. But have to do some reading - Not sure wpa3-enterprise really gets me all that much over wpa2-enterprise.. Can use a higher level encryption sure.. But not sure if makes any sense when using eap-tls.. Some reading to do.. But wpa3-psk is working nice.. Sad part is - with all these shitty iot devices, that don't support wpa3, you have to still run in wpa2/wpa3 mode..
  • tinc and UDP

    3
    0 Votes
    3 Posts
    803 Views
    N
    @viktor_g I had that. I left out one key bit of information which I was unaware was relevant at the time: That is, my SG-3100 was running multiWAN and my Tomato router was behind it. I had issues with NAT reflection requirements that I did not sort out completely before giving up on that configuration. I moved the Tomato router from behind the SG-3100 and put it directly on it's own WAN connection and then the Tinc UDP flowed fine in both directions. How was the bandwidth using iperf3? Not great. At 15mbps the single core of the Tomato router (an Asus RT-AC66U) was maxed out while one of the cores of the SG-3100 never exceeded 16% running tincd.
  • FreeRadius Sync?

    5
    0 Votes
    5 Posts
    962 Views
    J
    @jeffscott Oh... Duh, I get it... I didn't realize "configured backup server" was actually using the HA setup... Thanks for the clarification!
  • Can SquidGuard work without wpad or manual proxy setup on a client?

    8
    0 Votes
    8 Posts
    1k Views
    I
    @nick-loenders If you do not have servers, is it safe to assume there are minimal amount of clients? You can create the CA on the pfsense firewall and then export that certificate and install it in the root store of the devices in order to use SquidGuard with HTTPS/MITM functionality. Otherwise SquidGuard has to be configured as a proxy to use HTTPS filtering. The HTTP filtering alone doesn't require further client configurations but most connections these days are through SSL. Otherwise, you can configure the pfsense as DNS unbound resolver and utilize pfBlockerNG which can block TLD's, and connections based on source country/region (DNSBL). pfBlocker will also let you utilize lists such as Dshield and Spamhaus to filter out bad sites and domains by IP address. Short of all that 'hassle', you might be more interested in a next-gen layer 7 firewall from a different vendor, but they are considerably more expensive and require maintenance contracts to continue functioning properly.
  • Install packages offline

    7
    0 Votes
    7 Posts
    7k Views
    R
    @bmeeks Thank you for the link! I am not the OP but was interested in the topic.
  • Haproxy err_incomplete_chunked_encoding

    1
    0 Votes
    1 Posts
    728 Views
    No one has replied
  • Zabbix: Check access restrictions in agent

    2
    0 Votes
    2 Posts
    363 Views
    No one has replied
  • Reboot after installing new packages?

    4
    0 Votes
    4 Posts
    692 Views
    H
    @davidstoll somewhere in the status or diagnostic menu.... Can't remember, been years since I've last installed it
  • Downtime For Installing Packages?

    5
    0 Votes
    5 Posts
    1k Views
    I
    @kbohlken If you install new packages on a production firewall it should not cause downtime. However, if you are updating packages on a production firewall, those services related to the packages will be unavailable for a short period. If you have SquidGuard working for example, and decide to update the package, the squid service will be restarted and squid will stop blocking pages for a short period, usually less than a few minutes. I always have 2 firewalls in HA Sync, and when I do updates I will swap production firewalls and only work on the standby firewall. I also make it a habit to reboot the firewall after installing or updating a package as I've had issues updating squid/squidguard in the past.
  • Receiving duplicates packets for the radius request in Pfsense

    1
    0 Votes
    1 Posts
    508 Views
    No one has replied
  • Installing WireGuard VPN

    Locked
    49
    1 Votes
    49 Posts
    100k Views
    J
    This is now finished. At lease phase one is finished. https://www.netgate.com/blog/wireguard-for-pfsense-software.html
  • Does syslog-ng default install conflict?

    2
    0 Votes
    2 Posts
    462 Views
    kiokomanK
    @ar15usr short answer : no they are indipendent
  • about pfsense ipsec machine access

    1
    0 Votes
    1 Posts
    308 Views
    No one has replied
  • Just a quick question about BIND

    8
    0 Votes
    8 Posts
    1k Views
    X
    @gertjan Hello I build my infrastructure It is not large in hardware perspective, but I've started to to integration of many apps that will have to have to be on a separate domains. Until now the internal resolver did the job, but now ... I need actual dns server. This is strange everywhere I open a discussion about BIND and DNS all I am getting is go somewhere else!!!!!! Never had a straight answer like this functions is for that that function is for that or if you want to do this just do this and this !!!! Never mind. Typically, you should isolate such a program, set up a test bed network and 'play' with. That's what I am doing right now I have a downstream network behind an other pfSense Firewall and that's where I am testing it. I also have a Ubuntu server behind this firewall with Virtualmin and BIND9 package installed with few test websites, but what I am trying to understand is some terminology and functions of BIND. So... I set in the Settings to listen on: all vlans, but there is an option on the bottom "Forwarder Configuration" should I set this "Forwarder IPs" to my upstream resolver or, if this option is not enabled it will simply look what DNS Servers set on System/General Settings ???? and.... In "Views" I have created and called "localview" where Recursion - Yes match-clients - Any but... allow-recursion - currently set to ANY, but this will be used for local zones isn't more secure to be set to "localnets" then "any" no matter if that is my downstream or upstream pfsense Thank you
  • 1 Votes
    1 Posts
    364 Views
    No one has replied
  • problem configuring HAproxy with subdomains

    19
    0 Votes
    19 Posts
    2k Views
    B
    You're right, I delete certbot and install a selfsignated certificate. That works correctly. The problem come from LE. As the server is empty, I will reinstall it. Thank you for your help Benoit
  • xinetd doesn't read "included directory"

    4
    0 Votes
    4 Posts
    980 Views
    K
    @karls0 Just to remember it: After reloading filters, I get following in Status | System logs | General: Unable to read included directory: /opt/etc/xinetd.d [file=/var/etc/xinetd.conf] [line=1] When I tried "less" and typed in the whole path (without the Tab-key) I got the message "/opt/etc/xinetd.d/check_mk: No such file or directory" So there must be an invisible character in the path. Therefore I deleted the directory /opt/etc/xinetd.d and created it new. I copied the file "check_mk" back into it and now xinetd runs :-)) Sorry, I cannot mark my post as resolved - if anyone can, please do it.
  • How to configure Haproxy with multiple certificates

    Moved
    2
    0 Votes
    2 Posts
    2k Views
    M
    No answer, quite disappointed. I had time to lean on it lately and managed to do what I wanted. Here's some catch if it helps anyone. Create your certificate (I use the OVH API but it works with the other method): [image: 1610639766221-createcertificate.png] You can create as many certificates as necessary (Pay attention to the limit imposed by the ACME packge, see link below) Rate Limits [image: 1610639971033-createcertificate2.png] In Haproxy, go to the frontend which manages the domain name linked to the certificates created previously (the one ending with "site" for me, it depends on your configuration). [image: 1610640212863-frontend.png] In the "certificate" section, choose one of the certificates to create (any you need). Check the 2 boxes "Add ACL for certificate ...." [image: 1610640406182-frontend1.png] In the "additional certificates" section, add all the certificates you need. [image: 1610640536408-frontend2.png] Check the 2 ACL boxes again [image: 1610640576109-frontend3.png] Save and apply the configuration. Domains are now in HTTPS.
  • openvpn-client-export installation problem

    1
    0 Votes
    1 Posts
    344 Views
    No one has replied
  • DNS Resover stops running - Could not deliver signal HUP

    9
    0 Votes
    9 Posts
    1k Views
    AutourdupcA
    @gertjan I did the settings... All is fine. pfsense still running. Concerning BandwithD, it works also fine on my APU... pfsense usage is for personal use, with less than 20 devices on my Network. As you can see, CPU usage is low... (9%..30% depending on what I do). Only temp. is a little bit elevated due to the fact there is no cooling system. I also implemented zfs for better performances and reliability. [image: 1610618983081-82c53026-e1ea-4f4a-959a-bcaee1428221-image.png]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.