Subcategories

  • Discussions and feedback related to this forum

    612 Topics
    3k Posts
    stephenw10S
    Yeah I usually nuke the content entirely these days just to make it cleaner but I think only admin can do that. I can at least clean that up.
  • Community Hiring and For Hire postings related to jobs that require pfSense software skills

    29 Topics
    117 Posts
    w0wW
    @sef1414 Name it "run.sh", copy to pf and chmod according documentation https://docs.netgate.com/pfsense/en/latest/development/boot-commands.html#shell-script-option You will see messages in the system log like those quoted in the script after logger command.
  • Traffic forwarding

    Locked
    6
    0 Votes
    6 Posts
    2k Views
    S
    Thanks ,Its working fine… ;D ;D ;D
  • HOW TO BLOCK AN LAN IP IN PFSENSE

    Locked
    5
    0 Votes
    5 Posts
    21k Views
    S
    Thanks ,its work for me.
  • 10GbE adapters and back to back?

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    S
    Thanks Podilarius!
  • Google Nexus 7

    Locked
    15
    0 Votes
    15 Posts
    9k Views
    C
    nice… i think i'm going to pull the tigger on the Infinity here shortly... I may get the Nexus for my wife tho.. She's been hinting for her own Kindle(she uses mine) and this would be a better upgrade then the Kindle Fire
  • 4 Nic's 1 WAN 1 Lan and 2 Vlan how to config?

    Locked
    7
    0 Votes
    7 Posts
    4k Views
    S
    Hand out DHCP from each NIC.  In the DHCP Configuration, specify the DNS server you want each segement to use.
  • Help network design

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    S
    The design you showed would work, but I always try to remember KISS - Keep It Simple, Steve!  ;D There's no real need for segmenting your LAN into VLANs.  VLANs should be used to segment network traffic.  If you have a small office, with ten or fewer PCs and a server or two, then you don't need to use VLANs.  VOIP phones would be another matter but I don't see any of those on your drawing. Instead of what you drew, I would connect the firewall, all the PCs, the server and the wireless configuration manager (if it is NOT also a WAP) into the Cisco.  Don't bother to set up VLANs, just let everything connect on the default VLAN (NOTE: if your office is bigger than it appears from your drawing, there is an arguement to be made about setting up a VLAN and letting the default VLAN alone, unconfigured, so that no one can connect a device to your network without you configuring the port, but if this is a small office and you control access to the patch panel/switch, that is not an issue).  This has the advantage that you don't have to configure anything and if the switch loses its configuration you don't have to reload from a backup. The wireless access points (and by extension, the devices that connect to them) I would put in an umanaged switch that connects back to an OPT interface on the pfSense firewall that serves as your DMZ.  This protects your network a little more than connecting your wireless devices directly to your internal LAN. Run DHCP from the firewall.  Everything routes out through there and it routes everything not directly connected to the Internet. Here is a diagram of how I would do it: [image: Drawing1.jpg] [image: Drawing1.jpg_thumb]
  • Manual load balancing setting

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    M
    If you have GW's already created, then this should do Create 2 aliases where you have bunch of hosts like hosts1 : 192.168.1.10-192.168.1.30 hosts2 : 192.168.1.31 - 192.168.1.60 and create firewall rules: pass * from hosts1 any to any any with gw1 (advanced option you can find it) pass * from hosts2 any to any any with gw2 This configuration has no failover at all.
  • [OFF-TOPIC] Happy System Administrator Appreciation Day

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    D
    Happy SysAdmin Day !!!  :D
  • Need to find the Media Server on pfsense 2.0.1

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    M
    If you use search, you'll find some answers. but here is shorten outcome: use separate boxes as best security practices says so. Look freenas if you like mediaserver
  • Router's LAN plugged directly into the Internet (its public WAN)

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    M
    At least ISP should be blocking private ip-areas and they should have protected dhcp services. Nevertheless that is always bad idea, unless you're having a router connected to public ip-area.
  • 'Owning' IP addresses - good or bad idea?

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    C
    @jimp: If you have your own AS, you can do provider-independent routing with BGP, so you aren't tied down to a single upstream. In general that's the reason. Though probably not with just a /29, anything smaller than a /24 is highly unlikely to make it in the global BGP routing table as many providers will filter out smaller routes than that.
  • 0 Votes
    2 Posts
    2k Views
    C
    哎 pfsense官方论坛看不懂中简体中文,呵呵 google翻译下 Hey the pfsense Forum to see do not know in Simplified Chinese, google translation
  • Running SSLSTRIP on a pfSense box

    Locked
    1
    0 Votes
    1 Posts
    6k Views
    No one has replied
  • FreeBSD 8.3 released?

    Locked
    11
    0 Votes
    11 Posts
    6k Views
    jimpJ
    Once 2.1 is done we'll start on 2.2. So help get 2.1 finished and then it'll be time to move on. :-)
  • Cant find attached device

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    Install the nmap package, then go to Diag > nmap Fill in your LAN subnet, pick the LAN interface, select ARP for the scan type, and fire away Things will only show up in your ARP table if you try to talk to them, so unless you do some kind of ping/arp scan you won't see devices like that.
  • No internet access from LAN

    Locked
    15
    0 Votes
    15 Posts
    17k Views
    C
    I have finally tracked down a Draytek Vigor 120 which has the pppoa to pppoe bridge.  Pfsense now connects directly to my isp using the modem in "dumb modem" mode. The TPLink will be getting auctioned at the earliest convenience!
  • Live streaming done not work via PFsense

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • IPsec VTI support for FreeBSD and Linux

    Locked
    1
    0 Votes
    1 Posts
    7k Views
    No one has replied
  • Nice use of FreeBSD by NetFlix

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    D
    You can check the whole thread at http://lists.freebsd.org/pipermail/freebsd-stable/2012-June/thread.html#68110
  • [SOLVED]Vlan config/setup

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    M
    Great to hear. You can edit first post and add to subject [SOLVED]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.