Subcategories

  • Discussions and feedback related to this forum

    612 Topics
    3k Posts
    stephenw10S
    Yeah I usually nuke the content entirely these days just to make it cleaner but I think only admin can do that. I can at least clean that up.
  • Community Hiring and For Hire postings related to jobs that require pfSense software skills

    29 Topics
    117 Posts
    w0wW
    @sef1414 Name it "run.sh", copy to pf and chmod according documentation https://docs.netgate.com/pfsense/en/latest/development/boot-commands.html#shell-script-option You will see messages in the system log like those quoted in the script after logger command.
  • Fibre Channel HBA advice

    2
    0 Votes
    2 Posts
    2k Views
    S
    The information obtained from this website its very helpful to me and I can put to use in everyday life
  • MOVED: Hello

    Locked
    1
    0 Votes
    1 Posts
    820 Views
    No one has replied
  • Is it possible to Limit certain user using Dansguardian.??

    4
    0 Votes
    4 Posts
    1k Views
    R
    @tbt_sysad: Good Day, i've tried to work around in dansguardian users but so far the result is failed, maybe you can share some ideas, any ideas will be much appreciated. thank you. squid+dansguardian tbt_syasd :) You've got to supply a little more information. How were you identifying the users? Dansguardian has several authentication modules or you can simply use IP address of the client…
  • Small question - About Adding files to a post

    7
    0 Votes
    7 Posts
    2k Views
    johnpozJ
    "Two pages open at the same time to copy paste" What??  You Crop and edit in whatever tool your using - its takes seconds to adjust what you want portion of the screen you want, and then tweak it how you want in the tool..  What are you using to take your screenies? This took all of a maybe 3 seconds to do, and its only 11k..  I could put almost 20 of them in 1 post vs if did the whole screen its 224K and would not fit. [image: examplepic.png] [image: examplepic.png_thumb]
  • Dhcp server fixed ip addresses

    1
    0 Votes
    1 Posts
    866 Views
    No one has replied
  • For Sale Ebay: Fabiatech FX5620 with 2.0.3

    2
    0 Votes
    2 Posts
    1k Views
    S
    I sold one at $36, I re listed again, so another chance for someone. http://www.ebay.com/itm/PFsense-Firewall-SFF-PC-FX5620-/171151443134?pt=US_Firewall_VPN_Devices&hash=item27d96bc4be
  • Technet going bye bye

    12
    0 Votes
    12 Posts
    5k Views
    C
    If your a partner you could always sign up to Microsoft Action Pack… MAPS?
  • Outlook.com not block but wont display login page

    2
    0 Votes
    2 Posts
    1k Views
    C
    Outlook.com uses more sub domain zones to load the page, so just unblocking outlook.com will not work. Under the code, its secretly pulling data from other website domains. Look at the code its requesting.. Do some network sniffing. Squid can sometimes be a paid. Try using TCPview from Microsoft on the client and try and understand what the client is requesting.
  • MOVED: Squid Porxy

    Locked
    1
    0 Votes
    1 Posts
    913 Views
    No one has replied
  • (to webadmin)News feed error on main webpage

    2
    0 Votes
    2 Posts
    1k Views
    jdillardJ
    Thanks for the heads up illern. Long story short, we are in a transition to a new website design (finally!) and hope to have it out soon for all to enjoy.
  • Dsl modem in transparent bridge mode with pfsense

    3
    0 Votes
    3 Posts
    10k Views
    W
    Thanks for the reply Steve.  That's what I was thinking, that there probably isn't any risk of anything breaking out of the tunnel between the ISP and the WAN connection on the pfsense box, but I wasn't sure. Thanks for the link as well.  I should have mentioned that I'd seen it, but it seemed easier to plug a cable between the modem and one of the switches on the LAN as no other changes were necessary.  I haven't made any changes for NAT on either the modem or the pfsense box, although may have turned it off on the modem a few years ago when I put it in bridge mode as it's turned off now.  I assume the modem is just passing the internet connection to pfsense and not doing any NAT and that pfsense is the only thing doing NAT. The reason I was thinking of using the modem for wireless is to segregate my Directv network from the LAN by creating a VLAN.  The Directv boxes are networked using coax, but they need to use wireless to get an internet connection without some other piece of hardware I don't have and would have to buy.  I don't like having boxes I don't control on the LAN but the WNDR WAP doesn't do VLAN's.  I could buy another access point, but since the modem's wireless isn't being used I figured why not, assuming I'm not opening up a security hole.  Since it's already working most of the configuration is already sorted out. Bill
  • How to block download extensions

    22
    0 Votes
    22 Posts
    10k Views
    T
    uhm sir kejianshi, im doing well with dansguardian, but i have this one scenario when on of users have an access which is not applicable to others, i've tried the users in dansguardian but the result is failed, is it really possible sir? tnx
  • Nice pfSense article with pictures

    4
    0 Votes
    4 Posts
    2k Views
    K
    Yep - Cool article.  I'm sure they will leave it there.  There is no rivalry.
  • Another Nessus thread… HIPAA/HITECH audits

    4
    0 Votes
    4 Posts
    2k Views
    D
    The results obtained from any vulnerability scanner are open to interpretation.  The fact is that Nessus, run from the inside, will find vulnerabilities.  My own healthcare clients are using a couple of different Unix/Linux firewalls and fare poorly against a Nessus scan - typically DNS vulnerabilities.  Nessus is a good starting point to for a risk assessment but its verdict on your vulnerabilities is not a verdict on your HIPAA compliance.  The best fit for Nessus and HIPAA is when it is used for regular monitoring and inventory - what's different about your network from yesterday or last year?  Nessus scans could have a place in your HIPAA policies, but its scans need to be considered within the overall culture and policy of your organization. HIPAA security assessments typically center on gap analysis - what are your security policies and are you adhering to them?  Do those policies meet or exceed the standards set by the government?  Have you documented all locations that contain ePHI, either at active or at rest?  Do you have a complete inventory of your information assets?  Do you have backup policies?  Are you adhering to your backup policies?  The law typically tells us what to do, but not how to do it, that's for each organization to define through their policies.  See http://scap.nist.gov/hipaa/ for a good assessment toolkit. Government HIPAA auditors usually are involved after the fact.  The real HIPAA police are the patients and the healthcare organizations themselves.  Fines await those who expose patient health or financial information.  The fines are not issued because you failed a Nessus scan but instead because you may not have done everything in your power to prevent the exposure of protected health or financial information.
  • Email alerts for keyword matches in logs

    3
    0 Votes
    3 Posts
    1k Views
    N
    Thanks Jim
  • MOVED: exclusion URL blocking

    Locked
    1
    0 Votes
    1 Posts
    968 Views
    No one has replied
  • 2.1 production date?

    8
    0 Votes
    8 Posts
    3k Views
    G
    Here it is! Many thanks and congratulations to all who are involved. [image: pfsense2.1RELEASE.jpg] [image: pfsense2.1RELEASE.jpg_thumb]
  • MOVED: help me pls..Pfsense wont boot up :(

    Locked
    1
    0 Votes
    1 Posts
    819 Views
    No one has replied
  • PFsense experts in Toronto

    1
    0 Votes
    1 Posts
    971 Views
    No one has replied
  • TOR Security issues

    7
    0 Votes
    7 Posts
    4k Views
    K
    You think most TLS cuts it? I wouldn't trust a key or a cert of any length or strength that I hadn't hand-carried and exchanged privately.  Especially when you consider that every packet from the initial handshake forward might be stored, replayed and picked apart if you believe the hype…  And I do. "The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher." ^^^^  You go ahead and trust that  ^^^^ Anyway - The things that I would do are appropriate for denying state-backed players.  Not necessarily something some guy trying to view porn anonymously would worry about.  I mean who really cares who is looking at what porn anyway? I think I like a world with secrets better than without.  I don't like the chilling effect that happens when the only entity that has any privacy are the police/government but not their subjects. http://www.youtube.com/watch?v=o66FUc61MvU  (funny...  but true)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.